Spaces:
Runtime error
Runtime error
from fasthtml.common import * | |
from fasthtml.components import * | |
from fasthtml.components import D_title, D_article, D_front_matter, D_contents, D_byline | |
from plotly import graph_objects as go | |
from fh_plotly import plotly2fasthtml | |
import pandas as pd | |
import json | |
import random | |
import string | |
from rich import print | |
import jsonlines | |
nfc_examples = pd.DataFrame( | |
{ | |
"Original Text": [ | |
"für", | |
"the problem \ ud83d \ ude42", | |
"peptidoglycan`s", | |
], | |
"NFC Text": [ | |
"für", | |
"the problem 🙂", | |
"peptidoglycan's", | |
], | |
} | |
) | |
table_html_nfc = nfc_examples.to_html(index=False, border=0) | |
table_div_nfc_examples = Div(NotStr(table_html_nfc), style="margin: 40px;") | |
dask_algo = """ | |
dask.bag.from_sequence(doc_file_paths) | |
.map_partitions(stream_docs) | |
.groupby(lambda doc: doc["hash"]) | |
.map_partitions(make_doc_pairs) | |
.compute() | |
""" | |
global_div = Div( | |
Section( | |
H2("Global Steps"), | |
P("Deduplication is one of the most important steps when creating large web datasets for LLM pretraining. Methods to deduplicate datasets attempt to identify and remove redundant/repeated data from the dataset."), | |
), | |
Section( | |
H2("Deduplication"), | |
H3("Why do we need deduplication?"), | |
P("Deduplication is beneficial for LM pretraining in several ways, the most obvious being the reduction of training data. With less training data, the model requires shorter training times to achieve the same or even better accuracy. Deduplication also helps avoid train-test overlap, thereby improving evaluation metrics. Additionally, it reduces the risk of memorization [1]. Duplicate data can lead to a strong double descent phenomenon, where repeated data causes test loss to increase midway through training [2]. By implementing deduplication and selective upsampling, we gain control over the pretraining data distribution, rather than relying on the inherent distribution of the source, which is often the internet."), | |
P("To illustrate this, below is the distribution of near-duplicate clusters, organized into buckets of 100. The first bucket contains clusters with sizes ranging from 2 to 100, as found in the Common Crawl dataset. Some clusters even reach up to a million documents."), | |
P("THIS IS A PLACEHOLDER FOR A GRAPH"), | |
Img(src="images/100k.png", height = "300", width = "600" ), | |
P("We started deduplication with 61.8 TB of high-quality, filtered, and compressed documents. The initial dataset had roughly 48.83 billion documents. First, we performed exact deduplication using a Bloom filter with a capacity of 1 billion and a false positive rate of 0.001. This reduced the documents from 48.83 billion to 40.21 billion, removing about 17% as exact duplicates. This step used constant memory for the Bloom filter and lessened the workload for subsequent near-deduplication."), | |
P("For the global near-deduplication, we employed a methodology used by prior works like SlimPajama [3] but scaled it to the entire dataset which includes 87 Common Crawl dumps (also called “crawls”) and the curated data. This near-deduplication process involved generating signatures for every document, matching these signatures to identify near-duplicates, and then clustering the near-duplicate documents to select all but one for deletion. We choose a curated document over a Common Crawl document and later in time dump than an earlier dump when we choose the one document we keep between the matching cluster. Additionally, we maintained statistics about these matching clusters as they were formed during the final stage of deduplication. Below are the details of all four stages of our deduplication pipeline. We use Dask extensively throughout all stages of the deduplication. We have included the size of results of each stage on disk to give an idea about the scale:"), | |
), | |
Section( | |
H3("MinHash Generation"), | |
P("We use the datasketch library to generate MinHash signatures with the number of permutations to 128. To calculate a signature, represented as a MinHash object for each document, we first clean the text by stripping whitespace, converting to lowercase, and removing punctuation, consecutive spaces, newlines, and tabs. Next, we generate a list of 13-grams to use as features for creating a document signature. These signatures along with globally-unique document ids are then saved to disk. We designed a document id encoding scheme to convert file names and line numbers (there is one document per line) to unique document ids. This also helped a lot in saving disk and memory for this stage. This step produced 20 TB of hashes."), | |
), | |
Section( | |
H3("Matching Pairs Generation"), | |
P("We are using a Jaccard similarity threshold of 0.8 to identify near-duplicate documents. To do this, we divide the MinHashes into 9 bands, each with 13 hashes (also known as the range). To save memory during matching, we first store each band of MinHashes separately on disk. We then process each band individually. Within each band, documents are matched based on their hashes, and the matches are saved as document pairs. A document is considered a match if it matches another document in any of the 9 bands. Since we are looking for near-duplicates, a document may match multiple documents across different bands."), | |
P("For partitioning and matching the hashes, we utilize Dask's bag data structure to load the document ids and MinHashes. The matching process is simply a group by operation on this bag data structure. This approach allows us to group matches efficiently and distribute the operation to multiple machines. Also doing a group by produces full components (documents that share the same signature) within a band which simplifies the later stages. The algorithm can be expressed using the Dask expression below:"), | |
Div(Code(dask_algo,), cls= "code-block"), | |
P("This step produced 9.2 TB of matching pairs from all bands."), | |
), | |
Section( | |
H3("Finding Duplicate Pairs"), | |
P("Multiple bands can create the same document pairs, leading to duplicates. The simplest way to eliminate these duplicate pairs is to call distinct() before the compute(). However, we found that Dask is not very efficient when it comes to distributed distinct execution. Additionally, since we process each band separately, this approach wouldn’t remove duplicates across different bands."), | |
P("To address this, we use a Bloom filter with a capacity of 64 billion and a false positive rate of 0.001 to remove duplicates. One way we parallelize the Bloom filter execution is by partitioning pairs horizontally and running one filter per partition, as shown in the table below. There is a high chance that duplicates from different bands will have the same pairs in the same horizontal partition. This step reduces the number of pairs by nearly ninefold."), | |
P("THIS IS A PLACEHOLDER FOR A GRAPH"), | |
P("The resulting unique pairs are then used to identify clusters of near-duplicates by finding connected components in a graph, where the vertices represent documents and the edges represent matches. This step produced 1.9 TB of unique pairs."), | |
), | |
Section( | |
H3("Finding Connected Components using MapReduce"), | |
Img(src="images/cc.png", height = "300", width = "600" ), | |
P("The purpose of this step is to create a set of clusters of matching pairs. For example, a list of pairs (A, B), (B, C), (D, E) is merged into a list of components (A, B, C) and (D, E). Using a third-party library like NetworkX to find connected components would require all pairs to fit into the memory of a single machine, which is not feasible. Instead, we implemented a distributed connected component finder [4] using the Dask framework, which can scale across multiple machines. The algorithm works by mapping edges by both the source and destination of pairs and reducing only edges where the source is greater than the destination. It performs successive iterations of this MapReduce computation until convergence, meaning the number of new edges produced becomes zero. In the end, every document in a cluster points to the smallest document within the cluster. Later, we compile a list of duplicate documents that need deletion and gather statistics about each component."), | |
P("We needed to partition the duplicate pairs generated in the third stage into three groups to reduce memory pressure on the final stage. We observed that the second stage itself generates partial components which have some overlap. These overlapping clusters cause some documents to appear in the delete set multiple times. However, our deletion code handled this overlap."), | |
P("Below is the distribution of duplicate documents found across different dumps of CommonCrawl. The distribution is skewed to the right because the documents are bucketed by the dump ID of the document we retain, and we prefer documents from higher dump IDs."), | |
P("THIS IS A PLACEHOLDER FOR A GRAPH"), | |
), | |
Section( | |
H3("Analysis of Near-Duplicate Clusters"), | |
P("Smaller components tend to have more overlap in their MinHash bands. Smallest components which are basically pairs have exact duplicate documents. The ones that the local exact deduplication missed."), | |
Img(src="images/image3.png", height = "300", width = "600" ), | |
P("From 3 or more documents per cluster you see changes in the text that are incremental. For example below there is a growing list of personnel over the years."), | |
Img(src="images/image7.png", height = "300", width = "600" ), | |
P("In sizable clusters comprising 1000 or more documents, we observe a trend towards templatization. This involves the recurrent use of standardized language to convey general topics such as terms and conditions, warnings, and disclaimers. Such language is prevalent on commercial websites, offering a consistent and efficient way to communicate commonly encountered information."), | |
Img(src="images/image9.png", height = "300", width = "600" ), | |
), | |
Section( | |
H2("PII Removal"), | |
H3("Motivation Behind PII Removal"), | |
P("PII refers to any information that can be used to identify an individual, such as names, addresses, phone numbers, email addresses, and social security numbers. PII removal is essential for data privacy and security, as well as for compliance with global regulations. By removing PII from the training data, we can reduce the risk of data breaches and unauthorized access to sensitive information. Additionally, models can also generate PII during inference time."), | |
), | |
Section( | |
H3("Removing PII"), | |
P("We have removed two types of PII from the dataset: email address and IP address. Regular expressions are used to identify and replace these PII with a generic placeholder. Below is an example of how we removed email addresses from the dataset:"), | |
P("We have used the following regular expressions to identify and replace PII:"), | |
Ul(Li("Email: NEED TO UPDATE"),Li("IP Address: NEED TO UPDATE")), | |
), | |
Section( | |
H2("Normalization Form C (NFC)"), | |
H3("NFC Defined"), | |
P("NFC (Normalization Form C) is a Unicode normalization form that combines characters with diacritics into a single code point. This is important for text processing tasks as it ensures that the text is consistently represented across different languages and scripts. By normalizing the text to NFC, we can avoid issues related to character encoding, such as duplicate tokens and incorrect tokenization."), | |
), | |
Section( | |
H3("NFC Implementation"), | |
P("We have used the ftfy library to normalize the text to NFC. The library provides a simple API for normalizing text to NFC, which can be applied to the entire dataset one row at a time. Below is the code snippet about how we normalized text to NFC: NEED TO UPDATE"), | |
), | |
Section( | |
H3("NFC Examples"), | |
table_div_nfc_examples, | |
), | |
) | |
def common_steps(): | |
return Div( | |
Section( | |
global_div, | |
id="inner-text" | |
) | |
) |