{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2013:YE7P3TAMTL7NRK2XL2EFTNSYFF","short_pith_number":"pith:YE7P3TAM","canonical_record":{"source":{"id":"1309.3841","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2013-09-16T07:42:02Z","cross_cats_sorted":[],"title_canon_sha256":"a7a73fad37f4a77ff048d3828d59b783af33180d6f0d190395f6d2f2aa0b4b45","abstract_canon_sha256":"c9ad0373ad65d61c0ba5236513200cbd9808e30be1309ed8b973ad6ceee2b8c2"},"schema_version":"1.0"},"canonical_sha256":"c13efdcc0c9afed8ab575e8859b6582944aa7981806df08725e7ff8411c483d8","source":{"kind":"arxiv","id":"1309.3841","version":2},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1309.3841","created_at":"2026-05-18T00:57:52Z"},{"alias_kind":"arxiv_version","alias_value":"1309.3841v2","created_at":"2026-05-18T00:57:52Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1309.3841","created_at":"2026-05-18T00:57:52Z"},{"alias_kind":"pith_short_12","alias_value":"YE7P3TAMTL7N","created_at":"2026-05-18T12:28:06Z"},{"alias_kind":"pith_short_16","alias_value":"YE7P3TAMTL7NRK2X","created_at":"2026-05-18T12:28:06Z"},{"alias_kind":"pith_short_8","alias_value":"YE7P3TAM","created_at":"2026-05-18T12:28:06Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2013:YE7P3TAMTL7NRK2XL2EFTNSYFF","target":"record","payload":{"canonical_record":{"source":{"id":"1309.3841","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2013-09-16T07:42:02Z","cross_cats_sorted":[],"title_canon_sha256":"a7a73fad37f4a77ff048d3828d59b783af33180d6f0d190395f6d2f2aa0b4b45","abstract_canon_sha256":"c9ad0373ad65d61c0ba5236513200cbd9808e30be1309ed8b973ad6ceee2b8c2"},"schema_version":"1.0"},"canonical_sha256":"c13efdcc0c9afed8ab575e8859b6582944aa7981806df08725e7ff8411c483d8","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:57:52.706458Z","signature_b64":"lF5jpP3NUeIKlXnVL3ReO1tWyDV6oPnkuTnlnEj1Mvk0kdOgCnclHXKtfOaIM5WkSTtxqQOS0SU+0BKtxCTaBw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"c13efdcc0c9afed8ab575e8859b6582944aa7981806df08725e7ff8411c483d8","last_reissued_at":"2026-05-18T00:57:52.705810Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:57:52.705810Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1309.3841","source_version":2,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:57:52Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"pGSjg6Nw9/N0l9LfronK7xx0k3NFr4bL2a6NfCwJ11glTPuAdPH8CrTACOWZMyDOKzwzWmel0QjN3bbqJft2BQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T14:41:30.583761Z"},"content_sha256":"db5b27f089608d5589cc9a420a704f41fd3ea048de08185a20729e309fd9f457","schema_version":"1.0","event_id":"sha256:db5b27f089608d5589cc9a420a704f41fd3ea048de08185a20729e309fd9f457"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2013:YE7P3TAMTL7NRK2XL2EFTNSYFF","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"A Trust Based Fuzzy Algorithm for Congestion Control in Wireless Multimedia Sensor Networks (TFCC)","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.NI","authors_text":"Anupam Karmakar, Arpita Chakraborty, Mrinal Kanti Naskar, Srinjoy Ganguly","submitted_at":"2013-09-16T07:42:02Z","abstract_excerpt":"Network congestion has become a critical issue for resource constrained Wireless Sensor Networks (WSNs), especially for Wireless Multimedia Sensor Networks (WMSNs)where large volume of multimedia data is transmitted through the network. If the traffic load is greater than the available capacity of the sensor network, congestion occurs and it causes buffer overflow, packet drop, deterioration of network throughput and quality of service (QoS). Again, the faulty nodes of the network also aggravate congestion by diffusing useless packets or retransmitting the same packet several times. This resul"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1309.3841","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:57:52Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"8RLY7CBt3htj10WJO1ny86Pfi7LEs4HxvQR4weD9kcS6OMyfUDkxC6fSBy9+ZZKNnxUgXcOGCW99ezs+Q+OIDQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T14:41:30.584115Z"},"content_sha256":"76076cb6cb4220848d3a7b553894092d905168d0a6781cdaad02e3f7c56e4578","schema_version":"1.0","event_id":"sha256:76076cb6cb4220848d3a7b553894092d905168d0a6781cdaad02e3f7c56e4578"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/YE7P3TAMTL7NRK2XL2EFTNSYFF/bundle.json","state_url":"https://pith.science/pith/YE7P3TAMTL7NRK2XL2EFTNSYFF/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/YE7P3TAMTL7NRK2XL2EFTNSYFF/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-20T14:41:30Z","links":{"resolver":"https://pith.science/pith/YE7P3TAMTL7NRK2XL2EFTNSYFF","bundle":"https://pith.science/pith/YE7P3TAMTL7NRK2XL2EFTNSYFF/bundle.json","state":"https://pith.science/pith/YE7P3TAMTL7NRK2XL2EFTNSYFF/state.json","well_known_bundle":"https://pith.science/.well-known/pith/YE7P3TAMTL7NRK2XL2EFTNSYFF/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2013:YE7P3TAMTL7NRK2XL2EFTNSYFF","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"c9ad0373ad65d61c0ba5236513200cbd9808e30be1309ed8b973ad6ceee2b8c2","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2013-09-16T07:42:02Z","title_canon_sha256":"a7a73fad37f4a77ff048d3828d59b783af33180d6f0d190395f6d2f2aa0b4b45"},"schema_version":"1.0","source":{"id":"1309.3841","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1309.3841","created_at":"2026-05-18T00:57:52Z"},{"alias_kind":"arxiv_version","alias_value":"1309.3841v2","created_at":"2026-05-18T00:57:52Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1309.3841","created_at":"2026-05-18T00:57:52Z"},{"alias_kind":"pith_short_12","alias_value":"YE7P3TAMTL7N","created_at":"2026-05-18T12:28:06Z"},{"alias_kind":"pith_short_16","alias_value":"YE7P3TAMTL7NRK2X","created_at":"2026-05-18T12:28:06Z"},{"alias_kind":"pith_short_8","alias_value":"YE7P3TAM","created_at":"2026-05-18T12:28:06Z"}],"graph_snapshots":[{"event_id":"sha256:76076cb6cb4220848d3a7b553894092d905168d0a6781cdaad02e3f7c56e4578","target":"graph","created_at":"2026-05-18T00:57:52Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Network congestion has become a critical issue for resource constrained Wireless Sensor Networks (WSNs), especially for Wireless Multimedia Sensor Networks (WMSNs)where large volume of multimedia data is transmitted through the network. If the traffic load is greater than the available capacity of the sensor network, congestion occurs and it causes buffer overflow, packet drop, deterioration of network throughput and quality of service (QoS). Again, the faulty nodes of the network also aggravate congestion by diffusing useless packets or retransmitting the same packet several times. This resul","authors_text":"Anupam Karmakar, Arpita Chakraborty, Mrinal Kanti Naskar, Srinjoy Ganguly","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2013-09-16T07:42:02Z","title":"A Trust Based Fuzzy Algorithm for Congestion Control in Wireless Multimedia Sensor Networks (TFCC)"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1309.3841","kind":"arxiv","version":2},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:db5b27f089608d5589cc9a420a704f41fd3ea048de08185a20729e309fd9f457","target":"record","created_at":"2026-05-18T00:57:52Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"c9ad0373ad65d61c0ba5236513200cbd9808e30be1309ed8b973ad6ceee2b8c2","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2013-09-16T07:42:02Z","title_canon_sha256":"a7a73fad37f4a77ff048d3828d59b783af33180d6f0d190395f6d2f2aa0b4b45"},"schema_version":"1.0","source":{"id":"1309.3841","kind":"arxiv","version":2}},"canonical_sha256":"c13efdcc0c9afed8ab575e8859b6582944aa7981806df08725e7ff8411c483d8","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"c13efdcc0c9afed8ab575e8859b6582944aa7981806df08725e7ff8411c483d8","first_computed_at":"2026-05-18T00:57:52.705810Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:57:52.705810Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"lF5jpP3NUeIKlXnVL3ReO1tWyDV6oPnkuTnlnEj1Mvk0kdOgCnclHXKtfOaIM5WkSTtxqQOS0SU+0BKtxCTaBw==","signature_status":"signed_v1","signed_at":"2026-05-18T00:57:52.706458Z","signed_message":"canonical_sha256_bytes"},"source_id":"1309.3841","source_kind":"arxiv","source_version":2}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:db5b27f089608d5589cc9a420a704f41fd3ea048de08185a20729e309fd9f457","sha256:76076cb6cb4220848d3a7b553894092d905168d0a6781cdaad02e3f7c56e4578"],"state_sha256":"cf10982e5d308fe8f91dbbe63a9660c29f250ed9688b31f14a904096ae70aafc"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"oN8JUgEaCwqhDhvc5jDLcywNai1P/foWhrnt3CLBFFj6FQ58sJa+/DnsQBxmv2kvW1V1YdqXfpswJyi/dOweCw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-20T14:41:30.586366Z","bundle_sha256":"56a30508aeeb1294dddd068c6ce0023f280e1fdeda7276584861e3b10223afd7"}}