{"schema":"https://pith.science/schemas/pith-integrity/v1.json","pith_number":"2605.04884","arxiv_id":"2605.04884","integrity":{"available":true,"endpoint":"/pith/2605.04884/integrity.json","summary":{"critical":3,"advisory":2,"informational":0,"by_detector":{"doi_compliance":{"total":5,"critical":3,"advisory":2,"informational":0}}},"clean":false,"detectors_run":[{"name":"ai_meta_artifact","version":"1.0.0","status":"completed","ran_at":"2026-05-20T10:42:15.279903Z","findings_count":0},{"name":"doi_title_agreement","version":"1.0.0","status":"completed","ran_at":"2026-05-19T22:01:23.942007Z","findings_count":0},{"name":"doi_compliance","version":"1.0.0","status":"completed","ran_at":"2026-05-19T14:04:33.019903Z","findings_count":5}],"findings":[{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1016/0167-6105(90) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1016/0167-6105(90","detected_arxiv_id":null,"ref_index":67,"audited_at":"2026-05-19T14:04:33.019903Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1016/j.apm.2008.02.019' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1016/j.apm.2008.02.019","detected_arxiv_id":null,"ref_index":66,"audited_at":"2026-05-19T14:04:33.019903Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1137/s0895479895281022' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1137/s0895479895281022","detected_arxiv_id":null,"ref_index":59,"audited_at":"2026-05-19T14:04:33.019903Z"},{"detector":"doi_compliance","finding_type":"unresolvable_identifier","severity":"critical","verdict_class":"cross_source","note":"Identifier '10.1093/imanum/11.1.83' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","detected_doi":"10.1093/imanum/11.1.83","detected_arxiv_id":null,"ref_index":60,"audited_at":"2026-05-19T14:04:33.019903Z"},{"detector":"doi_compliance","finding_type":"recoverable_identifier","severity":"advisory","verdict_class":"incontrovertible","note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/s00158-022-03220-1.A.Real) was visible in the surrounding text but could not be confirmed against doi.org as printed.","detected_doi":"10.1007/s00158-022-03220-1.A.Real","detected_arxiv_id":null,"ref_index":79,"audited_at":"2026-05-19T14:04:33.019903Z"}],"snapshot_sha256":"c7972bf57cd246b70d2159fd0df8576a0638560badec45e5e1361ccb54acb919"},"events":[{"event_id":1597,"event_type":"pith.integrity.v1","payload_sha256":"ff3a865eb801ed65aeba4bc1a3894028fccc1de95c9a76675c4aeb74e70e9eb5","signature_b64":"9bdKy+KPuUFKBQc4n0i7QGIJYMU0lh9UR15heW0hD5f3F8XRHa8aH9q1PTptM3SWoML+KoWZUE1HhQz1BZ6gCw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T14:07:06.309731+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1007/s00158-022-03220-1.A.Real) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Zhu, Y., Wang, Y., Zhang, X., and Kang, Z., “A New Form of Forbidden Frequency Band Constraint for Dynamic Topology Optimization,”Structural and Multidisciplinary Optimization, Vol. 65, No. 4, 2022. doi:10.1007/s00158- 022-03220-1. A. Real ","arxiv_id":"2605.04884","detector":"doi_compliance","evidence":{"ref_index":79,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Zhu, Y., Wang, Y., Zhang, X., and Kang, Z., “A New Form of Forbidden Frequency Band Constraint for Dynamic Topology Optimization,”Structural and Multidisciplinary Optimization, Vol. 65, No. 4, 2022. doi:10.1007/s00158- 022-03220-1. A. Real ","reconstructed_doi":"10.1007/s00158-022-03220-1.A.Real"},"severity":"advisory","ref_index":79,"audited_at":"2026-05-19T14:04:33.019903Z","event_type":"pith.integrity.v1","detected_doi":"10.1007/s00158-022-03220-1.A.Real","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"927fd3a863f772a9db0dbc17e44aaca8ea488a30b90d21a3e5905dc466237e3d","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":1596,"event_type":"pith.integrity.v1","payload_sha256":"a806ba3de3f2b7890a906e818be062a24114cce670973d8e9319fbdf25a67c49","signature_b64":"ubwP1LahiT/noOFgjEiZ6NEBDtwVjjwNSJjU4b6f9n53+azQ8O258Edeomb7bjEOOCCsw4vm3Z+VKqRG2fV5DA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T14:07:06.308612+00:00","payload":{"note":"DOI in the printed bibliography is fragmented by whitespace or line breaks. A longer candidate (10.1016/0167-6105(90) was visible in the surrounding text but could not be confirmed against doi.org as printed.","snippet":"Franke, R., Rodi, W., and Schönung, B., “Numerical Calculation of Laminar Vortex-Shedding Flow Past Cylin- ders,”Journal of Wind Engineering and Industrial Aerodynamics, Vol. 35, 1990, pp. 237–257. doi:10.1016/0167- 6105(90)90219-3","arxiv_id":"2605.04884","detector":"doi_compliance","evidence":{"ref_index":67,"verdict_class":"incontrovertible","resolved_title":null,"printed_excerpt":"Franke, R., Rodi, W., and Schönung, B., “Numerical Calculation of Laminar Vortex-Shedding Flow Past Cylin- ders,”Journal of Wind Engineering and Industrial Aerodynamics, Vol. 35, 1990, pp. 237–257. doi:10.1016/0167- 6105(90)90219-3","reconstructed_doi":"10.1016/0167-6105(90"},"severity":"advisory","ref_index":67,"audited_at":"2026-05-19T14:04:33.019903Z","event_type":"pith.integrity.v1","detected_doi":"10.1016/0167-6105(90","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"recoverable_identifier","evidence_hash":"af6f3243f84f3626f461be3cf2fbe57c71d2a0c2022488c9a090764f36d2ca93","paper_version":1,"verdict_class":"incontrovertible","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":1595,"event_type":"pith.integrity.v1","payload_sha256":"c6d7f32766387aa4a9777d40b8ac0d6c00c7dd03b0dc47496d7494d536b41a9c","signature_b64":"3j54J1zVW7kzB1j7UgkCxon1ZRhIvsnyZoiqCyvn9ALsDbBrDyCOqc+jenVT02G5Qxf8YzmnXmep0sMizEnOCA==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T14:07:06.307472+00:00","payload":{"note":"Identifier '10.1016/j.apm.2008.02.019' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Rajani, B. N., Kandasamy, A., and Majumdar, S., “Numerical Simulation of Laminar Flow Past a Circular Cylinder,”Applied Mathematical Modelling, Vol. 33, No. 3, 2009, pp. 1228–1247. doi:10.1016/j.apm.2008.02.019","arxiv_id":"2605.04884","detector":"doi_compliance","evidence":{"doi":"10.1016/j.apm.2008.02.019","arxiv_id":null,"ref_index":66,"raw_excerpt":"Rajani, B. N., Kandasamy, A., and Majumdar, S., “Numerical Simulation of Laminar Flow Past a Circular Cylinder,”Applied Mathematical Modelling, Vol. 33, No. 3, 2009, pp. 1228–1247. doi:10.1016/j.apm.2008.02.019","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":66,"audited_at":"2026-05-19T14:04:33.019903Z","event_type":"pith.integrity.v1","detected_doi":"10.1016/j.apm.2008.02.019","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"653b392995340529a0b1c939484a6f670c022337dc61a418a912f097f5322d0e","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":1594,"event_type":"pith.integrity.v1","payload_sha256":"6ebfac7a9dd53d78239b210cecaaaf4a0207ce6912405a5b8c35a6400dfd5980","signature_b64":"67jvISoUSsQEVlyDwbDNOc05HXqESYUcoW1+wd6CzDwgO3oYTmfLmMJQx5Me8Y97iWXuRxKMYTuJ0+RFgM20Cw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T14:07:06.306130+00:00","payload":{"note":"Identifier '10.1093/imanum/11.1.83' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Garratt, T. J., Moore, G., and Spence, A., “Two methods for the numerical detection of Hopf bifurcations,”IMA Journal of Numerical Analysis, Vol. 11, No. 1, 1991, pp. 83–108. doi:10.1093/imanum/11.1.83","arxiv_id":"2605.04884","detector":"doi_compliance","evidence":{"doi":"10.1093/imanum/11.1.83","arxiv_id":null,"ref_index":60,"raw_excerpt":"Garratt, T. J., Moore, G., and Spence, A., “Two methods for the numerical detection of Hopf bifurcations,”IMA Journal of Numerical Analysis, Vol. 11, No. 1, 1991, pp. 83–108. doi:10.1093/imanum/11.1.83","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":60,"audited_at":"2026-05-19T14:04:33.019903Z","event_type":"pith.integrity.v1","detected_doi":"10.1093/imanum/11.1.83","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"e1f76c90fec785a90aaf7c3e3832131502028b98004a0084a7ef12d0df99dc52","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}},{"event_id":1593,"event_type":"pith.integrity.v1","payload_sha256":"6660fb85a2441b75366e02c97a60942f7ecd6018e5aa992d026654c376848565","signature_b64":"ztqQRKV9T1VTJgmUI5T8IOji8/To+J+1QdCJpZ0x/4AAbPP+XwYxB8wkZNL+SCdDHjnQPVVOWVj0cLUQYoCaDw==","signing_key_id":"pith-v1-2026-05","created_at":"2026-05-19T14:07:06.304884+00:00","payload":{"note":"Identifier '10.1137/s0895479895281022' is syntactically valid but the DOI registry (doi.org) returned 404, and Crossref / OpenAlex / internal corpus also have no record. The cited work could not be located through any authoritative source.","snippet":"Meerbergen, K., and Roose, D., “The restarted Arnoldi method applied to iterative linear system solvers for the computation of rightmost eigenvalues,”SIAM Journal on Matrix Analysis and Applications, Vol. 18, No. 1, 1997, pp. 1–20. doi:10.1","arxiv_id":"2605.04884","detector":"doi_compliance","evidence":{"doi":"10.1137/s0895479895281022","arxiv_id":null,"ref_index":59,"raw_excerpt":"Meerbergen, K., and Roose, D., “The restarted Arnoldi method applied to iterative linear system solvers for the computation of rightmost eigenvalues,”SIAM Journal on Matrix Analysis and Applications, Vol. 18, No. 1, 1997, pp. 1–20. doi:10.1137/S0895479895281022","verdict_class":"cross_source","checked_sources":["crossref_by_doi","openalex_by_doi","doi_org_head"]},"severity":"critical","ref_index":59,"audited_at":"2026-05-19T14:04:33.019903Z","event_type":"pith.integrity.v1","detected_doi":"10.1137/s0895479895281022","detector_url":"https://pith.science/pith-integrity-protocol#doi_compliance","external_url":null,"finding_type":"unresolvable_identifier","evidence_hash":"7647bf6777576f17d29b5ddf4623211ddecf0ddd524ebd3e8af68d18a2212524","paper_version":1,"verdict_class":"cross_source","resolved_title":null,"detector_version":"1.0.0","detected_arxiv_id":null}}],"endpoint_self":"/pith/2605.04884/integrity.json","protocol_url":"https://pith.science/pith-integrity-protocol"}