{ "main": { "id": "9c5b007ab74924bc", "type": "split", "children": [ { "id": "126da1a2d2b29212", "type": "tabs", "children": [ { "id": "802d9ec58484849d", "type": "leaf", "state": { "type": "pdf", "state": { "file": "Data and Network Security/slides/2025 - DNS - Lecture 1.pdf", "page": 1, "left": -14, "top": 409, "zoom": 1.0802083333333334 }, "icon": "lucide-file-text", "title": "2025 - DNS - Lecture 1" } } ] } ], "direction": "vertical" }, "left": { "id": "e2078ffa3de56c07", "type": "split", "children": [ { "id": "d86cb8d8115f9e4b", "type": "tabs", "children": [ { "id": "2b2245f56092006e", "type": "leaf", "state": { "type": "file-explorer", "state": { "sortOrder": "alphabetical", "autoReveal": false }, "icon": "lucide-folder-closed", "title": "Files" } }, { "id": "954699747dc12b5e", "type": "leaf", "state": { "type": "search", "state": { "query": "", "matchingCase": false, "explainSearch": false, "collapseAll": false, "extraContext": false, "sortOrder": "alphabetical" }, "icon": "lucide-search", "title": "Search" } }, { "id": "71e92c2ed6f6f21c", "type": "leaf", "state": { "type": "bookmarks", "state": {}, "icon": "lucide-bookmark", "title": "Segnalibri" } } ] } ], "direction": "horizontal", "width": 307.5 }, "right": { "id": "bc4b945ded1926e3", "type": "split", "children": [ { "id": "00a3201508c9b6f7", "type": "tabs", "children": [ { "id": "34cc5dc90419b254", "type": "leaf", "state": { "type": "backlink", "state": { "file": "Autonomous Networking/notes/q&a.md", "collapseAll": false, "extraContext": false, "sortOrder": "alphabetical", "showSearch": false, "searchQuery": "", "backlinkCollapsed": false, "unlinkedCollapsed": true }, "icon": "links-coming-in", "title": "Backlinks for q&a" } }, { "id": "f4a0915b879a43cd", "type": "leaf", "state": { "type": "outgoing-link", "state": { "file": "Autonomous Networking/notes/q&a.md", "linksCollapsed": false, "unlinkedCollapsed": true }, "icon": "links-going-out", "title": "Outgoing links from q&a" } }, { "id": "c12ba700d0604b95", "type": "leaf", "state": { "type": "tag", "state": { "sortOrder": "frequency", "useHierarchy": true }, "icon": "lucide-tags", "title": "Tags" } }, { "id": "77997770a5699d72", "type": "leaf", "state": { "type": "outline", "state": { "file": "Autonomous Networking/notes/q&a.md" }, "icon": "lucide-list", "title": "Outline of q&a" } }, { "id": "0d5325c0f9289cea", "type": "leaf", "state": { "type": "git-view", "state": {}, "icon": "git-pull-request", "title": "Source Control" } }, { "id": "cbc4870b4c7598e1", "type": "leaf", "state": { "type": "chat-view", "state": { "file": "Chats/New Chat.md" }, "icon": "lucide-file", "title": "Plugin no longer active" } } ], "currentTab": 4 } ], "direction": "horizontal", "width": 604.5, "collapsed": true }, "left-ribbon": { "hiddenItems": { "switcher:Open quick switcher": false, "graph:Open graph view": false, "canvas:Create new canvas": false, "daily-notes:Open today's daily note": false, "templates:Insert template": false, "command-palette:Open command palette": false, "obsidian-ocr:Search OCR": false, "pdf-plus:PDF++: Toggle auto-copy": false, "pdf-plus:PDF++: Toggle auto-focus": false, "pdf-plus:PDF++: Toggle auto-paste": false, "obsidian-git:Open Git source control": false, "smart-second-brain:Open S2B Chat": false, "companion:Toggle completion": false } }, "active": "802d9ec58484849d", "lastOpenFiles": [ "Concurrent Systems/notes/images/Pasted image 20250303093116.png", "Data and Network Security/slides/2025 - DNS - Lecture 1.pdf", "Data and Network Security/notes/images", "Data and Network Security/notes", "Data and Network Security/slides", "Concurrent Systems/notes/Lezione1.md", "Data and Network Security", "Concurrent Systems/notes/images/Pasted image 20250303100953.png", "Concurrent Systems/notes/images/Pasted image 20250303100721.png", "Concurrent Systems/notes/images", "Concurrent Systems/notes/images/Pasted image 20250303090135.png", "Concurrent Systems/slides/class 1.pdf", "Concurrent Systems/notes", "Concurrent Systems/slides", "Concurrent Systems", "Foundation of data science/notes/1 CV Basics.md", "Foundation of data science/notes/7 Autoencoders.md", "Foundation of data science/notes/6 PCA.md", "Foundation of data science/notes/5 Neural Networks.md", "Foundation of data science/notes/8 Variational Autoencoders.md", "Foundation of data science/notes/3 Logistic Regression.md", "Foundation of data science/notes/3.1 Multi Class Logistic Regression.md", "Foundation of data science/notes/4 L1 and L2 normalization - Lasso and Ridge.md", "Foundation of data science/notes/3.2 LLM generated from notes.md", "Foundation of data science/notes/2 Linear Regression.md", "Biometric Systems/notes/6. Face recognition 2D.md", "Biometric Systems/notes/7. Face recognition 3D.md", "Biometric Systems/frequently asked questions/BS_questions.txt.md", "Biometric Systems/notes/9. Ear recognition.md", "Biometric Systems/notes/13. Multi biometric.md", "Biometric Systems/notes/4. Face detection.md", "Biometric Systems/frequently asked questions/BS_oral_questions_16022021.md", "Biometric Systems/notes/12. Iris recognition.md", "Biometric Systems/notes/11. Fingerprints.md", "Foundation of data science/notes/9 Decision tree.md", "Biometric Systems/notes/2. Performance indexes.md", "Biometric Systems/notes/8 Face anti spoofing.md", "Biometric Systems/notes/1. Introduction.md", "Biometric Systems/notes/3. Recognition Reliability.md", "Biometric Systems/images/Pasted image 20241228171617.png", "Biometric Systems/images/Pasted image 20241228174722.png", "Biometric Systems/images/Pasted image 20241217025904.png", "Biometric Systems/images/Pasted image 20241217030157.png", "Biometric Systems/images/Pasted image 20241212094046.png", "Biometric Systems/images/Pasted image 20241212094016.png", "Senza nome.canvas" ] }