vault backup: 2025-05-07 13:08:11

This commit is contained in:
Dane Sabo 2025-05-07 13:08:11 -04:00
parent 2cfa12c7ed
commit 39147b8e04
2 changed files with 234 additions and 42 deletions

View File

@ -6,21 +6,24 @@
"type": "split",
"children": [
{
"id": "d25dee43b3e54ec8",
"id": "8d03bf60de6ad4fa",
"type": "tabs",
"children": [
{
"id": "e2117c169fe11138",
"id": "9b4ec083e409fd37",
"type": "leaf",
"state": {
"type": "markdown",
"type": "canvas",
"state": {
"file": "spacemacs.md",
"mode": "preview",
"source": true
"file": "Neural Network Formal Methods/NNFM Ontology.canvas",
"viewState": {
"x": 9.425483367800382,
"y": -107.62412343531983,
"zoom": 0
}
},
"icon": "lucide-file",
"title": "spacemacs"
"icon": "lucide-layout-dashboard",
"title": "NNFM Ontology"
}
}
],
@ -77,8 +80,7 @@
"title": "Bookmarks"
}
}
],
"currentTab": 1
]
}
],
"direction": "horizontal",
@ -93,18 +95,18 @@
"type": "tabs",
"children": [
{
"id": "f2acfdc4f8875b73",
"id": "2ffc7552cae0cd12",
"type": "leaf",
"state": {
"type": "outline",
"state": {
"file": "9999 Personal/Italy Planning.md",
"file": "300s School/ME 2150 - High Assurance Cyber-Physical Systems/ME 2150 - High-Assurance Cyber-Physical Systems Final Report.md",
"followCursor": false,
"showSearch": false,
"searchQuery": ""
},
"icon": "lucide-list",
"title": "Outline of Italy Planning"
"title": "Outline of ME 2150 - High-Assurance Cyber-Physical Systems Final Report"
}
},
{
@ -136,8 +138,7 @@
"title": "Tags"
}
}
],
"currentTab": 1
]
},
{
"id": "5825c206eb7cbf2b",
@ -168,30 +169,21 @@
"state": {
"type": "outgoing-link",
"state": {
"file": "9999 Personal/Italy Planning.md",
"file": "300s School/ME 2150 - High Assurance Cyber-Physical Systems/ME 2150 - High-Assurance Cyber-Physical Systems Final Report.md",
"linksCollapsed": false,
"unlinkedCollapsed": true
},
"icon": "links-going-out",
"title": "Outgoing links from Italy Planning"
}
},
{
"id": "56fd59fa4566496a",
"type": "leaf",
"state": {
"type": "ReferenceListView",
"state": {},
"icon": "quote-glyph",
"title": "References"
"title": "Outgoing links from ME 2150 - High-Assurance Cyber-Physical Systems Final Report"
}
}
],
"currentTab": 2
"currentTab": 1
}
],
"direction": "horizontal",
"width": 300
"width": 300,
"collapsed": true
},
"left-ribbon": {
"hiddenItems": {
@ -202,12 +194,212 @@
"command-palette:Open command palette": false,
"workspaces:Manage workspace layouts": false,
"obsidian-git:Open Git source control": false,
"templater-obsidian:Templater": false
"templates:Insert template": false
}
},
"active": "e2117c169fe11138",
"mtime": "2025-04-22T17:34:14-04:00"
"active": "9b4ec083e409fd37",
"mtime": "2025-05-07T13:07:41-04:00"
},
"NNFM": {
"main": {
"id": "9acdaefd89bfd05b",
"type": "split",
"children": [
{
"id": "8d03bf60de6ad4fa",
"type": "tabs",
"children": [
{
"id": "9b4ec083e409fd37",
"type": "leaf",
"state": {
"type": "canvas",
"state": {
"file": "Neural Network Formal Methods/NNFM Ontology.canvas",
"viewState": {
"x": 9.425483367800382,
"y": -107.62412343531983,
"zoom": 0
}
},
"icon": "lucide-layout-dashboard",
"title": "NNFM Ontology"
}
}
],
"stacked": true
}
],
"direction": "vertical"
},
"left": {
"id": "e5fa84f508f70d4a",
"type": "split",
"children": [
{
"id": "7f6b5f16b83d9662",
"type": "tabs",
"children": [
{
"id": "ff6249d395c9b9c4",
"type": "leaf",
"state": {
"type": "file-explorer",
"state": {
"sortOrder": "alphabetical",
"autoReveal": false
},
"icon": "lucide-folder-closed",
"title": "Files"
}
},
{
"id": "5dcbb689e8ca2590",
"type": "leaf",
"state": {
"type": "search",
"state": {
"query": "",
"matchingCase": false,
"explainSearch": false,
"collapseAll": false,
"extraContext": false,
"sortOrder": "alphabetical"
},
"icon": "lucide-search",
"title": "Search"
}
},
{
"id": "52955ed22e885f54",
"type": "leaf",
"state": {
"type": "bookmarks",
"state": {},
"icon": "lucide-bookmark",
"title": "Bookmarks"
}
}
]
}
],
"direction": "horizontal",
"width": 264.5
},
"right": {
"id": "6fb573180b35203e",
"type": "split",
"children": [
{
"id": "d04fee9208814d29",
"type": "tabs",
"children": [
{
"id": "2ffc7552cae0cd12",
"type": "leaf",
"state": {
"type": "outline",
"state": {
"file": "300s School/ME 2150 - High Assurance Cyber-Physical Systems/ME 2150 - High-Assurance Cyber-Physical Systems Final Report.md",
"followCursor": false,
"showSearch": false,
"searchQuery": ""
},
"icon": "lucide-list",
"title": "Outline of ME 2150 - High-Assurance Cyber-Physical Systems Final Report"
}
},
{
"id": "662ac1a2deff5282",
"type": "leaf",
"state": {
"type": "all-properties",
"state": {
"sortOrder": "frequency",
"showSearch": false,
"searchQuery": ""
},
"icon": "lucide-archive",
"title": "All properties"
}
},
{
"id": "35618b9d56fe6ece",
"type": "leaf",
"state": {
"type": "tag",
"state": {
"sortOrder": "frequency",
"useHierarchy": true,
"showSearch": false,
"searchQuery": ""
},
"icon": "lucide-tags",
"title": "Tags"
}
}
]
},
{
"id": "5825c206eb7cbf2b",
"type": "tabs",
"children": [
{
"id": "9ac223f2f70c509e",
"type": "leaf",
"state": {
"type": "backlink",
"state": {
"file": "9999 Personal/Italy Planning.md",
"collapseAll": true,
"extraContext": false,
"sortOrder": "alphabetical",
"showSearch": false,
"searchQuery": "",
"backlinkCollapsed": false,
"unlinkedCollapsed": true
},
"icon": "links-coming-in",
"title": "Backlinks for Italy Planning"
}
},
{
"id": "eac2ce2689908506",
"type": "leaf",
"state": {
"type": "outgoing-link",
"state": {
"file": "300s School/ME 2150 - High Assurance Cyber-Physical Systems/ME 2150 - High-Assurance Cyber-Physical Systems Final Report.md",
"linksCollapsed": false,
"unlinkedCollapsed": true
},
"icon": "links-going-out",
"title": "Outgoing links from ME 2150 - High-Assurance Cyber-Physical Systems Final Report"
}
}
],
"currentTab": 1
}
],
"direction": "horizontal",
"width": 300,
"collapsed": true
},
"left-ribbon": {
"hiddenItems": {
"daily-notes:Open today's daily note": false,
"switcher:Open quick switcher": false,
"graph:Open graph view": false,
"canvas:Create new canvas": false,
"command-palette:Open command palette": false,
"workspaces:Manage workspace layouts": false,
"obsidian-git:Open Git source control": false,
"templates:Insert template": false
}
},
"active": "9b4ec083e409fd37",
"mtime": "2025-05-07T13:07:57-04:00"
}
},
"active": "task_master"
"active": "NNFM"
}

View File

@ -1,16 +1,16 @@
{
"nodes":[
{"id":"5e184d3db8adc84a","x":-1000,"y":-585,"width":250,"height":60,"type":"text","text":"NEWER"},
{"id":"ce7357ee8c8c4a0c","x":-330,"y":1400,"width":250,"height":60,"type":"text","text":""},
{"id":"bbe4a58a5af748eb","x":-1000,"y":920,"width":250,"height":60,"type":"text","text":"OLDER"},
{"id":"6b62b3a19b06fc0a","type":"file","file":"Literature Notes/A Review of Formal Methods applied to Machine Learning.md","x":490,"y":-120,"width":420,"height":400,"color":"3"},
{"id":"bac68ab8fa2c1c9b","type":"file","file":"Literature Notes/Formal verification of neural network controlled autonomous systems.md","x":-40,"y":520,"width":400,"height":400,"color":"1"},
{"id":"5e184d3db8adc84a","type":"text","text":"NEWER","x":-1000,"y":-585,"width":250,"height":60},
{"id":"ce7357ee8c8c4a0c","type":"text","text":"","x":-330,"y":1400,"width":250,"height":60},
{"id":"bbe4a58a5af748eb","type":"text","text":"OLDER","x":-1000,"y":920,"width":250,"height":60},
{"id":"35eebdf6214c8c88","type":"text","text":"# Machine Learning","x":185,"y":-760,"width":440,"height":80},
{"id":"cdbcb13db184af6e","type":"text","text":"## Neural Networks","x":185,"y":-312,"width":250,"height":100},
{"id":"bcc9c2b5dc701338","type":"text","text":"# Formal Methods","x":-480,"y":-759,"width":440,"height":80},
{"id":"684196d797ac66e3","type":"file","file":"Literature Notes/Enhancing Cyber-Physical System Dependability via Synthesis - Challenges and Future Directions.md","x":-720,"y":-462,"width":480,"height":400,"color":"3"},
{"id":"f9208a6e4a7ef241","x":-653,"y":-592,"width":346,"height":74,"type":"text","text":"## Linear Temporal Logic"},
{"id":"6d8080147062d756","type":"text","text":"## Control Systems","x":-80,"y":-640,"width":250,"height":85}
{"id":"f9208a6e4a7ef241","type":"text","text":"## Linear Temporal Logic","x":-653,"y":-592,"width":346,"height":74},
{"id":"6d8080147062d756","type":"text","text":"## Control Systems","x":-80,"y":-640,"width":250,"height":85},
{"id":"cdbcb13db184af6e","type":"text","text":"## Neural Networks","x":235,"y":-568,"width":250,"height":100},
{"id":"6b62b3a19b06fc0a","type":"file","file":"Literature Notes/A Review of Formal Methods applied to Machine Learning.md","x":415,"y":-300,"width":420,"height":400,"color":"3"},
{"id":"bac68ab8fa2c1c9b","type":"file","file":"Literature Notes/Formal verification of neural network controlled autonomous systems.md","x":-165,"y":-380,"width":485,"height":360,"color":"1"},
{"id":"684196d797ac66e3","type":"file","file":"Literature Notes/Enhancing Cyber-Physical System Dependability via Synthesis - Challenges and Future Directions.md","x":-720,"y":-420,"width":480,"height":400,"color":"3"}
],
"edges":[
{"id":"96f75a4631d60661","fromNode":"bcc9c2b5dc701338","fromSide":"bottom","toNode":"6b62b3a19b06fc0a","toSide":"top"},