{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.04735","arxiv_id":"2605.04735","integrity":{"available":true,"endpoint":"/pith/2605.04735/integrity.json","summary":{"critical":3,"advisory":0,"informational":0,"by_detector":{"doi_compliance":{"total":3,"critical":3,"advisory":0,"informational":0}}},"clean":false,"detectors_run":[{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-20T11:35:08.028167Z","findings_count":0},{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-19T22:31:19.674229Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T14:12:45.125376Z","findings_count":3}],"findings":[{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1016/s0045-7825(00' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1016/s0045-7825(00","detected_arxiv_id":null,"ref_index":18,"audited_at":"2026-05-19T14:12:45.125376Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.5281/zenodo.20024424.dataset' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.5281/zenodo.20024424.dataset","detected_arxiv_id":null,"ref_index":31,"audited_at":"2026-05-19T14:12:45.125376Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1016/s0045-7825(02' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1016/s0045-7825(02","detected_arxiv_id":null,"ref_index":61,"audited_at":"2026-05-19T14:12:45.125376Z"}],"snapshot_sha256":"642f1328d7bbf33529def6390a65e8d57187e105b30b2f98584c25a3d86b85cf"},"events":[{"event_id":1627,"event_type":"pith.integrity.v1","payload_sha256":"913123b05edd2654f0592ad420c17cc3ee8dfa6f5d6b471e541ce42b155464ce","signature_b64":"+AHk2sJqT7VYSPm/w2taoEW0PaLwbPluyqAmbdkxqDsadGlfUYj42d3wrAcL9Ic0VPEK1IBQkAnLA2g2lkafBA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T14:17:06.484539+00:00","payload":{"note":"Identifier '10.1016/s0045-7825(02' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Wang, M.Y., Wang, X., Guo, D., 2003. A level set method for structuraltopologyoptimization. ComputerMethodsinAppliedMe- chanics and Engineering 192, 227–246. doi:10.1016/S0045-7825(02) 00559-5","arxiv_id":"2605.04735","detector":"doi_compliance","evidence":{"doi":"10.1016/s0045-7825(02","arxiv_id":null,"ref_index":61,"raw_excerpt":"Wang, M.Y., Wang, X., Guo, D., 2003. A level set method for structuraltopologyoptimization. ComputerMethodsinAppliedMe- chanics and Engineering 192, 227–246. doi:10.1016/S0045-7825(02) 00559-5","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":61,"audited_at":"2026-05-19T14:12:45.125376Z","event_type":"pith.integrity.v1","detected_doi":"10.1016/s0045-7825(02","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"70aa4f29318e5e791465f0013a82337c36f6a58384e2115f30f6871e8df5fcdc","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":1626,"event_type":"pith.integrity.v1","payload_sha256":"8fff3fcf551980b032e8e3220e9227fbd43294e37901b74abebbf19dc5df2d68","signature_b64":"NqCDJKoKBGwuxvQ3hKdccX58aSNxk+JpVGAylOEIHAcH3KAaTw9NqXk1DBbdr8tZVqOqxeyU1EOBn+SYMoJCDw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T14:17:06.482372+00:00","payload":{"note":"Identifier '10.5281/zenodo.20024424.dataset' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Ježek, O., Kopačka, J., Isoz, M., Gabriel, D., 2026a. Data for: “Sequential topology optimization: SIMP initialization for level-set boundaryrefinement”.Zenodo.doi:10.5281/zenodo.20024424.dataset, v1.0.0","arxiv_id":"2605.04735","detector":"doi_compliance","evidence":{"doi":"10.5281/zenodo.20024424.dataset","arxiv_id":null,"ref_index":31,"raw_excerpt":"Ježek, O., Kopačka, J., Isoz, M., Gabriel, D., 2026a. Data for: “Sequential topology optimization: SIMP initialization for level-set boundaryrefinement”.Zenodo.doi:10.5281/zenodo.20024424.dataset, v1.0.0","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":31,"audited_at":"2026-05-19T14:12:45.125376Z","event_type":"pith.integrity.v1","detected_doi":"10.5281/zenodo.20024424.dataset","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"74a5df99f7eaf2ca7f0c9739b27a215b86dae307dfd86a8be84dec5b3c254d96","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":1625,"event_type":"pith.integrity.v1","payload_sha256":"8ca4d9da8f57dfaf4da05014791a409a9387aa28543bc024ffc3d691e7988447","signature_b64":"7GiOFcfQH3l0BMT9Vuls4O4gQ2V/zs3KiiSeqI55ayKTZlypdH7vR5Hpwnb3nbE4nIfQzI17Yo/WIaPyLWcKAQ==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T14:17:06.480077+00:00","payload":{"note":"Identifier '10.1016/s0045-7825(00' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Bruns, T.E., Tortorelli, D.A., 2001. Topology optimization of non-linear elastic structures and compliant mechanisms. Com- puter Methods in Applied Mechanics and Engineering 190, 3443–3459. URL:https://www.sciencedirect.com/science/article/","arxiv_id":"2605.04735","detector":"doi_compliance","evidence":{"doi":"10.1016/s0045-7825(00","arxiv_id":null,"ref_index":18,"raw_excerpt":"Bruns, T.E., Tortorelli, D.A., 2001. Topology optimization of non-linear elastic structures and compliant mechanisms. Com- puter Methods in Applied Mechanics and Engineering 190, 3443–3459. URL:https://www.sciencedirect.com/science/article/ pii/S0045782500002784, doi:https://doi.org/10.1016/S0045-7825(00) 00278-4","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":18,"audited_at":"2026-05-19T14:12:45.125376Z","event_type":"pith.integrity.v1","detected_doi":"10.1016/s0045-7825(00","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"ec9bddddac9a20129fef774571668e337026076750ded7168e17daa45a26509c","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.04735/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}