gemma-3-270m-it-qat-GGUF

Author: unsloth
Downloads: 0
Likes: 0
License: GEMMA
Created: 5 hours ago
Last Modified: 22 minutes ago

See our collection for all versions of Gemma 3 including GGUF, 4-bit & 16-bit formats.

Read our Guide to see how to Run Gemma 3 correctly.

✨ Fine-tune Gemma 3 with Unsloth!

Unsloth supportsFree NotebooksPerformanceMemory use
Gemma 3 (4B)▶️ Start on Colab2x faster80% less
Gemma-3n-E4B▶️ Start on Colab2x faster60% less
Gemma-3n-E4B (Audio)▶️ Start on Colab2x faster60% less
GRPO with Gemma 3 (1B)▶️ Start on Colab2x faster80% less
Gemma 3 (4B) Vision▶️ Start on Colab2x faster60% less

Gemma 3 model card

Model Page: Gemma

Resources and Technical Documentation:

Terms of Use: Terms

Authors: Google DeepMind

Model Information

Summary description and brief definition of inputs and outputs.

Description

Gemma is a family of lightweight, state-of-the-art open models from Google,
built from the same research and technology used to create the Gemini models.
Gemma 3 models are multimodal, handling text and image input and generating text
output, with open weights for both pre-trained variants and instruction-tuned
variants. Gemma 3 has a large, 128K context window, multilingual support in over
140 languages, and is available in more sizes than previous versions. Gemma 3
models are well-suited for a variety of text generation and image understanding
tasks, including question answering, summarization, and reasoning. Their
relatively small size makes it possible to deploy them in environments with
limited resources such as laptops, desktops or your own cloud infrastructure,
democratizing access to state of the art AI models and helping foster innovation
for everyone.

Inputs and outputs

  • Input:

    • Text string, such as a question, a prompt, or a document to be summarized
    • Images, normalized to 896 x 896 resolution and encoded to 256 tokens
      each
    • Total input context of 128K tokens for the 4B, 12B, and 27B sizes, and
      32K tokens for the 1B and 270M sizes.
  • Output:

    • Generated text in response to the input, such as an answer to a
      question, analysis of image content, or a summary of a document
    • Total output context up to 128K tokens for the 4B, 12B, and 27B sizes,
      and 32K tokens for the 1B and 270M sizes per request, subtracting the
      request input tokens

Citation

@article{gemma_2025,
    title={Gemma 3},
    url={https://arxiv.org/abs/2503.19786},
    publisher={Google DeepMind},
    author={Gemma Team},
    year={2025}
}

Model Data

Data used for model training and how the data was processed.

Training Dataset

These models were trained on a dataset of text data that includes a wide variety
of sources. The 27B model was trained with 14 trillion tokens, the 12B model was
trained with 12 trillion tokens, 4B model was trained with 4 trillion tokens,
the 1B with 2 trillion tokens, and the 270M with 6 trillion tokens. The
knowledge cutoff date for the training data was August 2024. Here are the key
components:

  • Web Documents: A diverse collection of web text ensures the model is
    exposed to a broad range of linguistic styles, topics, and vocabulary. The
    training dataset includes content in over 140 languages.
  • Code: Exposing the model to code helps it to learn the syntax and
    patterns of programming languages, which improves its ability to generate
    code and understand code-related questions.
  • Mathematics: Training on mathematical text helps the model learn logical
    reasoning, symbolic representation, and to address mathematical queries.
  • Images: A wide range of images enables the model to perform image
    analysis and visual data extraction tasks.

The combination of these diverse data sources is crucial for training a powerful
multimodal model that can handle a wide variety of different tasks and data
formats.

Data Preprocessing

Here are the key data cleaning and filtering methods applied to the training
data:

  • CSAM Filtering: Rigorous CSAM (Child Sexual Abuse Material) filtering
    was applied at multiple stages in the data preparation process to ensure
    the exclusion of harmful and illegal content.
  • Sensitive Data Filtering: As part of making Gemma pre-trained models
    safe and reliable, automated techniques were used to filter out certain
    personal information and other sensitive data from training sets.
  • Additional methods: Filtering based on content quality and safety in
    line with our policies.

Implementation Information

Details about the model internals.

Hardware

Gemma was trained using Tensor Processing Unit (TPU) hardware (TPUv4p,
TPUv5p and TPUv5e). Training vision-language models (VLMS) requires significant
computational power. TPUs, designed specifically for matrix operations common in
machine learning, offer several advantages in this domain:

  • Performance: TPUs are specifically designed to handle the massive
    computations involved in training VLMs. They can speed up training
    considerably compared to CPUs.
  • Memory: TPUs often come with large amounts of high-bandwidth memory,
    allowing for the handling of large models and batch sizes during training.
    This can lead to better model quality.
  • Scalability: TPU Pods (large clusters of TPUs) provide a scalable
    solution for handling the growing complexity of large foundation models.
    You can distribute training across multiple TPU devices for faster and more
    efficient processing.
  • Cost-effectiveness: In many scenarios, TPUs can provide a more
    cost-effective solution for training large models compared to CPU-based
    infrastructure, especially when considering the time and resources saved
    due to faster training.
  • These advantages are aligned with
    Google's commitments to operate sustainably.

Software

Training was done using JAX and ML Pathways.

JAX allows researchers to take advantage of the latest generation of hardware,
including TPUs, for faster and more efficient training of large models. ML
Pathways is Google's latest effort to build artificially intelligent systems
capable of generalizing across multiple tasks. This is specially suitable for
foundation models, including large language models like these ones.

Together, JAX and ML Pathways are used as described in the
paper about the Gemini family of models; "the 'single
controller' programming model of Jax and Pathways allows a single Python
process to orchestrate the entire training run, dramatically simplifying the
development workflow."

Evaluation

Model evaluation metrics and results.

Benchmark Results

These models were evaluated against a large collection of different datasets and
metrics to cover different aspects of text generation. Evaluation results marked
with IT are for instruction-tuned models. Evaluation results marked with
PT are for pre-trained models.

Gemma 3 model card

Model Page: Gemma

Resources and Technical Documentation:

Terms of Use: Terms

Authors: Google DeepMind

Model Information

Summary description and brief definition of inputs and outputs.

Description

Gemma is a family of lightweight, state-of-the-art open models from Google,
built from the same research and technology used to create the Gemini models.
Gemma 3 models are multimodal, handling text and image input and generating text
output, with open weights for both pre-trained variants and instruction-tuned
variants. Gemma 3 has a large, 128K context window, multilingual support in over
140 languages, and is available in more sizes than previous versions. Gemma 3
models are well-suited for a variety of text generation and image understanding
tasks, including question answering, summarization, and reasoning. Their
relatively small size makes it possible to deploy them in environments with
limited resources such as laptops, desktops or your own cloud infrastructure,
democratizing access to state of the art AI models and helping foster innovation
for everyone.

Inputs and outputs

  • Input:

    • Text string, such as a question, a prompt, or a document to be summarized
    • Images, normalized to 896 x 896 resolution and encoded to 256 tokens
      each, for the 4B, 12B, and 27B sizes.
    • Total input context of 128K tokens for the 4B, 12B, and 27B sizes, and
      32K tokens for the 1B and 270M sizes.
  • Output:

    • Generated text in response to the input, such as an answer to a
      question, analysis of image content, or a summary of a document
    • Total output context up to 128K tokens for the 4B, 12B, and 27B sizes,
      and 32K tokens for the 1B and 270M sizes per request, subtracting the
      request input tokens

Citation

@article{gemma_2025,
    title={Gemma 3},
    url={https://arxiv.org/abs/2503.19786},
    publisher={Google DeepMind},
    author={Gemma Team},
    year={2025}
}

Model Data

Data used for model training and how the data was processed.

Training Dataset

These models were trained on a dataset of text data that includes a wide variety
of sources. The 27B model was trained with 14 trillion tokens, the 12B model was
trained with 12 trillion tokens, 4B model was trained with 4 trillion tokens,
the 1B with 2 trillion tokens, and the 270M with 6 trillion tokens. The
knowledge cutoff date for the training data was August 2024. Here are the key
components:

  • Web Documents: A diverse collection of web text ensures the model is
    exposed to a broad range of linguistic styles, topics, and vocabulary. The
    training dataset includes content in over 140 languages.
  • Code: Exposing the model to code helps it to learn the syntax and
    patterns of programming languages, which improves its ability to generate
    code and understand code-related questions.
  • Mathematics: Training on mathematical text helps the model learn logical
    reasoning, symbolic representation, and to address mathematical queries.
  • Images: A wide range of images enables the model to perform image
    analysis and visual data extraction tasks.

The combination of these diverse data sources is crucial for training a powerful
multimodal model that can handle a wide variety of different tasks and data
formats.

Data Preprocessing

Here are the key data cleaning and filtering methods applied to the training
data:

  • CSAM Filtering: Rigorous CSAM (Child Sexual Abuse Material) filtering
    was applied at multiple stages in the data preparation process to ensure
    the exclusion of harmful and illegal content.
  • Sensitive Data Filtering: As part of making Gemma pre-trained models
    safe and reliable, automated techniques were used to filter out certain
    personal information and other sensitive data from training sets.
  • Additional methods: Filtering based on content quality and safety in
    line with our policies.

Implementation Information

Details about the model internals.

Hardware

Gemma was trained using Tensor Processing Unit (TPU) hardware (TPUv4p,
TPUv5p and TPUv5e). Training vision-language models (VLMS) requires significant
computational power. TPUs, designed specifically for matrix operations common in
machine learning, offer several advantages in this domain:

  • Performance: TPUs are specifically designed to handle the massive
    computations involved in training VLMs. They can speed up training
    considerably compared to CPUs.
  • Memory: TPUs often come with large amounts of high-bandwidth memory,
    allowing for the handling of large models and batch sizes during training.
    This can lead to better model quality.
  • Scalability: TPU Pods (large clusters of TPUs) provide a scalable
    solution for handling the growing complexity of large foundation models.
    You can distribute training across multiple TPU devices for faster and more
    efficient processing.
  • Cost-effectiveness: In many scenarios, TPUs can provide a more
    cost-effective solution for training large models compared to CPU-based
    infrastructure, especially when considering the time and resources saved
    due to faster training.
  • These advantages are aligned with
    Google's commitments to operate sustainably.

Software

Training was done using JAX and ML Pathways.

JAX allows researchers to take advantage of the latest generation of hardware,
including TPUs, for faster and more efficient training of large models. ML
Pathways is Google's latest effort to build artificially intelligent systems
capable of generalizing across multiple tasks. This is specially suitable for
foundation models, including large language models like these ones.

Together, JAX and ML Pathways are used as described in the
paper about the Gemini family of models; "the 'single
controller' programming model of Jax and Pathways allows a single Python
process to orchestrate the entire training run, dramatically simplifying the
development workflow."

Evaluation

Model evaluation metrics and results.

Benchmark Results

These models were evaluated against a large collection of different datasets and
metrics to cover different aspects of text generation. Evaluation results marked
with IT are for instruction-tuned models. Evaluation results marked with
PT are for pre-trained models.

Gemma 3 270M

Benchmarkn-shotGemma 3 PT 270M
HellaSwag10-shot40.9
BoolQ0-shot61.4
PIQA0-shot67.7
TriviaQA5-shot15.4
ARC-c25-shot29.0
ARC-e0-shot57.7
WinoGrande5-shot52.0
Benchmarkn-shotGemma 3 IT 270m
HellaSwag0-shot37.7
PIQA0-shot66.2
ARC-c0-shot28.2
WinoGrande0-shot52.3
BIG-Bench Hardfew-shot26.7
IF Eval0-shot51.2

Gemma 3 1B, 4B, 12B & 27B

Reasoning and factuality
Benchmarkn-shotGemma 3 IT 1BGemma 3 IT 4BGemma 3 IT 12BGemma 3 IT 27B
GPQA Diamond0-shot19.230.840.942.4
SimpleQA0-shot2.24.06.310.0
FACTS Grounding-36.470.175.874.9
BIG-Bench Hard0-shot39.172.285.787.6
BIG-Bench Extra Hard0-shot7.211.016.319.3
IFEval0-shot80.290.288.990.4
Benchmarkn-shotGemma 3 PT 1BGemma 3 PT 4BGemma 3 PT 12BGemma 3 PT 27B
HellaSwag10-shot62.377.284.285.6
BoolQ0-shot63.272.378.882.4
PIQA0-shot73.879.681.883.3
SocialIQA0-shot48.951.953.454.9
TriviaQA5-shot39.865.878.285.5
Natural Questions5-shot9.4820.031.436.1
ARC-c25-shot38.456.268.970.6
ARC-e0-shot73.082.488.389.0
WinoGrande5-shot58.264.774.378.8
BIG-Bench Hardfew-shot28.450.972.677.7
DROP1-shot42.460.172.277.2
STEM and code
Benchmarkn-shotGemma 3 IT 1BGemma 3 IT 4BGemma 3 IT 12BGemma 3 IT 27B
MMLU (Pro)0-shot14.743.660.667.5
LiveCodeBench0-shot1.912.624.629.7
Bird-SQL (dev)-6.436.347.954.4
Math0-shot48.075.683.889.0
HiddenMath0-shot15.843.054.560.3
MBPP3-shot35.263.273.074.4
HumanEval0-shot41.571.385.487.8
Natural2Code0-shot56.070.380.784.5
GSM8K0-shot62.889.294.495.9
Benchmarkn-shotGemma 3 PT 4BGemma 3 PT 12BGemma 3 PT 27B
MMLU5-shot59.674.578.6
MMLU (Pro COT)5-shot29.245.352.2
AGIEval3-5-shot42.157.466.2
MATH4-shot24.243.350.0
GSM8K8-shot38.471.082.6
GPQA5-shot15.025.424.3
MBPP3-shot46.060.465.6
HumanEval0-shot36.045.748.8

Multilingual

Benchmarkn-shotGemma 3 IT 1BGemma 3 IT 4BGemma 3 IT 12BGemma 3 IT 27B
Global-MMLU-Lite0-shot34.254.569.575.1
ECLeKTic0-shot1.44.610.316.7
WMT24++0-shot35.946.851.653.4
BenchmarkGemma 3 PT 1BGemma 3 PT 4BGemma 3 PT 12BGemma 3 PT 27B
MGSM2.0434.764.374.3
Global-MMLU-Lite24.957.069.475.7
WMT24++ (ChrF)36.748.453.955.7
FloRes29.539.246.048.8
XQuAD (all)43.968.074.576.8
ECLeKTic4.6911.017.224.4
IndicGenBench41.457.261.763.4
Multimodal
BenchmarkGemma 3 IT 4BGemma 3 IT 12BGemma 3 IT 27B
MMMU (val)48.859.664.9
DocVQA75.887.186.6
InfoVQA50.064.970.6
TextVQA57.867.765.1
AI2D74.884.284.5
ChartQA68.875.778.0
VQAv2 (val)62.471.671.0
MathVista (testmini)50.062.967.6
BenchmarkGemma 3 PT 4BGemma 3 PT 12BGemma 3 PT 27B
COCOcap102111116
DocVQA (val)72.882.385.6
InfoVQA (val)44.154.859.4
MMMU (pt)39.250.356.1
TextVQA (val)58.966.568.6
RealWorldQA45.552.253.9
ReMI27.338.544.8
AI2D63.275.279.0
ChartQA63.674.776.3
VQAv263.971.272.9
BLINK38.035.939.6
OKVQA51.058.760.2
TallyQA42.551.854.3
SpatialSense VQA50.960.059.4
CountBenchQA26.117.868.0

Ethics and Safety

Ethics and safety evaluation approach and results.

Evaluation Approach

Our evaluation methods include structured evaluations and internal red-teaming
testing of relevant content policies. Red-teaming was conducted by a number of
different teams, each with different goals and human evaluation metrics. These
models were evaluated against a number of different categories relevant to
ethics and safety, including:

  • Child Safety: Evaluation of text-to-text and image to text prompts
    covering child safety policies, including child sexual abuse and
    exploitation.
  • Content Safety: Evaluation of text-to-text and image to text prompts
    covering safety policies including, harassment, violence and gore, and hate
    speech.
  • Representational Harms: Evaluation of text-to-text and image to text
    prompts covering safety policies including bias, stereotyping, and harmful
    associations or inaccuracies.

In addition to development level evaluations, we conduct "assurance
evaluations" which are our 'arms-length' internal evaluations for responsibility
governance decision making. They are conducted separately from the model
development team, to inform decision making about release. High level findings
are fed back to the model team, but prompt sets are held-out to prevent
overfitting and preserve the results' ability to inform decision making.
Assurance evaluation results are reported to our Responsibility & Safety Council
as part of release review.

Evaluation Results

For all areas of safety testing, we saw major improvements in the categories of
child safety, content safety, and representational harms relative to previous
Gemma models. All testing was conducted without safety filters to evaluate the
model capabilities and behaviors. For both text-to-text and image-to-text, and
across all model sizes, the model produced minimal policy violations, and showed
significant improvements over previous Gemma models' performance with respect
to ungrounded inferences. A limitation of our evaluations was they included only
English language prompts.

Usage and Limitations

These models have certain limitations that users should be aware of.

Intended Usage

Open vision-language models (VLMs) models have a wide range of applications
across various industries and domains. The following list of potential uses is
not comprehensive. The purpose of this list is to provide contextual information
about the possible use-cases that the model creators considered as part of model
training and development.

  • Content Creation and Communication
    • Text Generation: These models can be used to generate creative text
      formats such as poems, scripts, code, marketing copy, and email drafts.
    • Chatbots and Conversational AI: Power conversational interfaces
      for customer service, virtual assistants, or interactive applications.
    • Text Summarization: Generate concise summaries of a text corpus,
      research papers, or reports.
    • Image Data Extraction: These models can be used to extract,
      interpret, and summarize visual data for text communications.
  • Research and Education
    • Natural Language Processing (NLP) and VLM Research: These
      models can serve as a foundation for researchers to experiment with VLM
      and NLP techniques, develop algorithms, and contribute to the
      advancement of the field.
    • Language Learning Tools: Support interactive language learning
      experiences, aiding in grammar correction or providing writing practice.
    • Knowledge Exploration: Assist researchers in exploring large
      bodies of text by generating summaries or answering questions about
      specific topics.

Limitations

  • Training Data
    • The quality and diversity of the training data significantly
      influence the model's capabilities. Biases or gaps in the training data
      can lead to limitations in the model's responses.
    • The scope of the training dataset determines the subject areas
      the model can handle effectively.
  • Context and Task Complexity
    • Models are better at tasks that can be framed with clear
      prompts and instructions. Open-ended or highly complex tasks might be
      challenging.
    • A model's performance can be influenced by the amount of context
      provided (longer context generally leads to better outputs, up to a
      certain point).
  • Language Ambiguity and Nuance
    • Natural language is inherently complex. Models might struggle
      to grasp subtle nuances, sarcasm, or figurative language.
  • Factual Accuracy
    • Models generate responses based on information they learned
      from their training datasets, but they are not knowledge bases. They
      may generate incorrect or outdated factual statements.
  • Common Sense
    • Models rely on statistical patterns in language. They might
      lack the ability to apply common sense reasoning in certain situations.

Ethical Considerations and Risks

The development of vision-language models (VLMs) raises several ethical
concerns. In creating an open model, we have carefully considered the following:

  • Bias and Fairness
    • VLMs trained on large-scale, real-world text and image data can
      reflect socio-cultural biases embedded in the training material. These
      models underwent careful scrutiny, input data pre-processing described
      and posterior evaluations reported in this card.
  • Misinformation and Misuse
    • VLMs can be misused to generate text that is false, misleading,
      or harmful.
    • Guidelines are provided for responsible use with the model, see the
      Responsible Generative AI Toolkit.
  • Transparency and Accountability:
    • This model card summarizes details on the models' architecture,
      capabilities, limitations, and evaluation processes.
    • A responsibly developed open model offers the opportunity to
      share innovation by making VLM technology accessible to developers and
      researchers across the AI ecosystem.

Risks identified and mitigations:

  • Perpetuation of biases: It's encouraged to perform continuous
    monitoring (using evaluation metrics, human review) and the exploration of
    de-biasing techniques during model training, fine-tuning, and other use
    cases.
  • Generation of harmful content: Mechanisms and guidelines for content
    safety are essential. Developers are encouraged to exercise caution and
    implement appropriate content safety safeguards based on their specific
    product policies and application use cases.
  • Misuse for malicious purposes: Technical limitations and developer
    and end-user education can help mitigate against malicious applications of
    VLMs. Educational resources and reporting mechanisms for users to flag
    misuse are provided. Prohibited uses of Gemma models are outlined in the
    Gemma Prohibited Use Policy.
  • Privacy violations: Models were trained on data filtered for removal
    of certain personal information and other sensitive data. Developers are
    encouraged to adhere to privacy regulations with privacy-preserving
    techniques.

Benefits

At the time of release, this family of models provides high-performance open
vision-language model implementations designed from the ground up for
responsible AI development compared to similarly sized models.

Using the benchmark evaluation metrics described in this document, these models
have shown to provide superior performance to other, comparably-sized open model
alternatives.

Share this model

Found this model useful? Share it with others!