{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2026:RYY7YMPCV3KRGU3MWOTKIA5I43","short_pith_number":"pith:RYY7YMPC","canonical_record":{"source":{"id":"2605.17925","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.NE","submitted_at":"2026-05-18T06:31:38Z","cross_cats_sorted":[],"title_canon_sha256":"14126351bd5dd80f81afb8bc408dcac56636cb9776c8e40ae4aeb7d0ae164dfd","abstract_canon_sha256":"d2dd3bfdf0d90ea02479d05e481ee3fb90174066896625dfc3dcf8ef839271d4"},"schema_version":"1.0"},"canonical_sha256":"8e31fc31e2aed513536cb3a6a403a8e6ded1c67ac44addcdd65477cfa4c9bd2f","source":{"kind":"arxiv","id":"2605.17925","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.17925","created_at":"2026-05-20T00:05:06Z"},{"alias_kind":"arxiv_version","alias_value":"2605.17925v1","created_at":"2026-05-20T00:05:06Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.17925","created_at":"2026-05-20T00:05:06Z"},{"alias_kind":"pith_short_12","alias_value":"RYY7YMPCV3KR","created_at":"2026-05-20T00:05:06Z"},{"alias_kind":"pith_short_16","alias_value":"RYY7YMPCV3KRGU3M","created_at":"2026-05-20T00:05:06Z"},{"alias_kind":"pith_short_8","alias_value":"RYY7YMPC","created_at":"2026-05-20T00:05:06Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2026:RYY7YMPCV3KRGU3MWOTKIA5I43","target":"record","payload":{"canonical_record":{"source":{"id":"2605.17925","kind":"arxiv","version":1},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.NE","submitted_at":"2026-05-18T06:31:38Z","cross_cats_sorted":[],"title_canon_sha256":"14126351bd5dd80f81afb8bc408dcac56636cb9776c8e40ae4aeb7d0ae164dfd","abstract_canon_sha256":"d2dd3bfdf0d90ea02479d05e481ee3fb90174066896625dfc3dcf8ef839271d4"},"schema_version":"1.0"},"canonical_sha256":"8e31fc31e2aed513536cb3a6a403a8e6ded1c67ac44addcdd65477cfa4c9bd2f","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-20T00:05:06.340170Z","signature_b64":"dN5v4H+ajr6Fah2Fb1sDa6A1AcCa5uFfl+/GzalflUZ+T525mgFDeE7rXH3a1FyEgYNkeqNdP18yIME69ZChDw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"8e31fc31e2aed513536cb3a6a403a8e6ded1c67ac44addcdd65477cfa4c9bd2f","last_reissued_at":"2026-05-20T00:05:06.339407Z","signature_status":"signed_v1","first_computed_at":"2026-05-20T00:05:06.339407Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"2605.17925","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-20T00:05:06Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"OThx6H5WBVhpra/fxQx2izQkaXE4vyZSIwkORZPU+vnDHxjdfCbxPlmHKtegkmqk2GXIqVFZE0IeE59ajGQMCg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T02:50:41.850436Z"},"content_sha256":"ed224ac3a744f96038657a028079928a343d0171aa5d282e68668a2011c7bacf","schema_version":"1.0","event_id":"sha256:ed224ac3a744f96038657a028079928a343d0171aa5d282e68668a2011c7bacf"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2026:RYY7YMPCV3KRGU3MWOTKIA5I43","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Adaptive Stochastic Natural Gradient Method for Safe Optimization on Binary Space","license":"http://creativecommons.org/licenses/by/4.0/","headline":"","cross_cats":[],"primary_cat":"cs.NE","authors_text":"Kento Uchida, Masahiro Nomura, Ryoki Hamano, Shinichi Shirakawa","submitted_at":"2026-05-18T06:31:38Z","abstract_excerpt":"Optimization problems in real-world applications across the medical and engineering domains often involve potential risks when evaluating candidate solutions. Safe optimization aims to perform optimization while suppressing unsafe solution evaluations in such situations. For continuous search spaces, there exist safe optimization methods based on evolutionary computation. However, the algorithm development of safe optimization methods for binary search spaces has not been adequately addressed. In this study, we incorporate additional mechanisms for safe optimization into a binary optimization "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2605.17925","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"integrity":{"clean":true,"summary":{"advisory":0,"critical":0,"by_detector":{},"informational":0},"endpoint":"/pith/2605.17925/integrity.json","findings":[],"available":true,"detectors_run":[],"snapshot_sha256":"c28c3603d3b5d939e8dc4c7e95fa8dfce3d595e45f758748cecf8e644a296938"},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-20T00:05:06Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Yvj+7bWlJQsKmThoHJsJHpcK0WioycB5MRgC/r6//Gpzub8LJr+CW86sdre7r9UavTyuKp6SojVPkmnrZ+0yAA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T02:50:41.850871Z"},"content_sha256":"b6dd7d329cfc40143de4d83a5a2ab8746be4c778115d41615c203a6ca4ab63f5","schema_version":"1.0","event_id":"sha256:b6dd7d329cfc40143de4d83a5a2ab8746be4c778115d41615c203a6ca4ab63f5"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/RYY7YMPCV3KRGU3MWOTKIA5I43/bundle.json","state_url":"https://pith.science/pith/RYY7YMPCV3KRGU3MWOTKIA5I43/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/RYY7YMPCV3KRGU3MWOTKIA5I43/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-24T02:50:41Z","links":{"resolver":"https://pith.science/pith/RYY7YMPCV3KRGU3MWOTKIA5I43","bundle":"https://pith.science/pith/RYY7YMPCV3KRGU3MWOTKIA5I43/bundle.json","state":"https://pith.science/pith/RYY7YMPCV3KRGU3MWOTKIA5I43/state.json","well_known_bundle":"https://pith.science/.well-known/pith/RYY7YMPCV3KRGU3MWOTKIA5I43/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2026:RYY7YMPCV3KRGU3MWOTKIA5I43","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"d2dd3bfdf0d90ea02479d05e481ee3fb90174066896625dfc3dcf8ef839271d4","cross_cats_sorted":[],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.NE","submitted_at":"2026-05-18T06:31:38Z","title_canon_sha256":"14126351bd5dd80f81afb8bc408dcac56636cb9776c8e40ae4aeb7d0ae164dfd"},"schema_version":"1.0","source":{"id":"2605.17925","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.17925","created_at":"2026-05-20T00:05:06Z"},{"alias_kind":"arxiv_version","alias_value":"2605.17925v1","created_at":"2026-05-20T00:05:06Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.17925","created_at":"2026-05-20T00:05:06Z"},{"alias_kind":"pith_short_12","alias_value":"RYY7YMPCV3KR","created_at":"2026-05-20T00:05:06Z"},{"alias_kind":"pith_short_16","alias_value":"RYY7YMPCV3KRGU3M","created_at":"2026-05-20T00:05:06Z"},{"alias_kind":"pith_short_8","alias_value":"RYY7YMPC","created_at":"2026-05-20T00:05:06Z"}],"graph_snapshots":[{"event_id":"sha256:b6dd7d329cfc40143de4d83a5a2ab8746be4c778115d41615c203a6ca4ab63f5","target":"graph","created_at":"2026-05-20T00:05:06Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"integrity":{"available":true,"clean":true,"detectors_run":[],"endpoint":"/pith/2605.17925/integrity.json","findings":[],"snapshot_sha256":"c28c3603d3b5d939e8dc4c7e95fa8dfce3d595e45f758748cecf8e644a296938","summary":{"advisory":0,"by_detector":{},"critical":0,"informational":0}},"paper":{"abstract_excerpt":"Optimization problems in real-world applications across the medical and engineering domains often involve potential risks when evaluating candidate solutions. Safe optimization aims to perform optimization while suppressing unsafe solution evaluations in such situations. For continuous search spaces, there exist safe optimization methods based on evolutionary computation. However, the algorithm development of safe optimization methods for binary search spaces has not been adequately addressed. In this study, we incorporate additional mechanisms for safe optimization into a binary optimization ","authors_text":"Kento Uchida, Masahiro Nomura, Ryoki Hamano, Shinichi Shirakawa","cross_cats":[],"headline":"","license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.NE","submitted_at":"2026-05-18T06:31:38Z","title":"Adaptive Stochastic Natural Gradient Method for Safe Optimization on Binary Space"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2605.17925","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:ed224ac3a744f96038657a028079928a343d0171aa5d282e68668a2011c7bacf","target":"record","created_at":"2026-05-20T00:05:06Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"d2dd3bfdf0d90ea02479d05e481ee3fb90174066896625dfc3dcf8ef839271d4","cross_cats_sorted":[],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.NE","submitted_at":"2026-05-18T06:31:38Z","title_canon_sha256":"14126351bd5dd80f81afb8bc408dcac56636cb9776c8e40ae4aeb7d0ae164dfd"},"schema_version":"1.0","source":{"id":"2605.17925","kind":"arxiv","version":1}},"canonical_sha256":"8e31fc31e2aed513536cb3a6a403a8e6ded1c67ac44addcdd65477cfa4c9bd2f","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"8e31fc31e2aed513536cb3a6a403a8e6ded1c67ac44addcdd65477cfa4c9bd2f","first_computed_at":"2026-05-20T00:05:06.339407Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-20T00:05:06.339407Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"dN5v4H+ajr6Fah2Fb1sDa6A1AcCa5uFfl+/GzalflUZ+T525mgFDeE7rXH3a1FyEgYNkeqNdP18yIME69ZChDw==","signature_status":"signed_v1","signed_at":"2026-05-20T00:05:06.340170Z","signed_message":"canonical_sha256_bytes"},"source_id":"2605.17925","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:ed224ac3a744f96038657a028079928a343d0171aa5d282e68668a2011c7bacf","sha256:b6dd7d329cfc40143de4d83a5a2ab8746be4c778115d41615c203a6ca4ab63f5"],"state_sha256":"8b2fce702c7232a8507fb0583072edd38b54caa73a2c56642c6613b54cc514a7"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"CrIU/73LOUxuXEWP+Kq6GgQU+vfrZgZGV5Cy/e0bt29pOaDPKzG7qs3r3LDNgQthkeC8wbw5vxZqBFJZMkPoAw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-24T02:50:41.855173Z","bundle_sha256":"a715c875c7b85249a3d5d535a623044fdb603dff117e11b809838cee44d50c1c"}}