{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2013:ZVBCPJ4TJNQX6LG57DIDZ7GYYR","short_pith_number":"pith:ZVBCPJ4T","canonical_record":{"source":{"id":"1309.4379","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2013-09-17T16:40:44Z","cross_cats_sorted":[],"title_canon_sha256":"e1c4ea1ad3cea989d539624030de869e7cd34ee953e81b7471d13a66f6167d17","abstract_canon_sha256":"1e7fbacd6d9355e22215d5f0b8b04a269a37cadaf6bcd521d1dbc0c532f47689"},"schema_version":"1.0"},"canonical_sha256":"cd4227a7934b617f2cddf8d03cfcd8c44cf9721da6f85e1f2e268cc534b1af60","source":{"kind":"arxiv","id":"1309.4379","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1309.4379","created_at":"2026-05-18T03:13:08Z"},{"alias_kind":"arxiv_version","alias_value":"1309.4379v1","created_at":"2026-05-18T03:13:08Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1309.4379","created_at":"2026-05-18T03:13:08Z"},{"alias_kind":"pith_short_12","alias_value":"ZVBCPJ4TJNQX","created_at":"2026-05-18T12:28:09Z"},{"alias_kind":"pith_short_16","alias_value":"ZVBCPJ4TJNQX6LG5","created_at":"2026-05-18T12:28:09Z"},{"alias_kind":"pith_short_8","alias_value":"ZVBCPJ4T","created_at":"2026-05-18T12:28:09Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2013:ZVBCPJ4TJNQX6LG57DIDZ7GYYR","target":"record","payload":{"canonical_record":{"source":{"id":"1309.4379","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2013-09-17T16:40:44Z","cross_cats_sorted":[],"title_canon_sha256":"e1c4ea1ad3cea989d539624030de869e7cd34ee953e81b7471d13a66f6167d17","abstract_canon_sha256":"1e7fbacd6d9355e22215d5f0b8b04a269a37cadaf6bcd521d1dbc0c532f47689"},"schema_version":"1.0"},"canonical_sha256":"cd4227a7934b617f2cddf8d03cfcd8c44cf9721da6f85e1f2e268cc534b1af60","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T03:13:08.889257Z","signature_b64":"zL66dp6m5Koxjcs1W0CoqnXVd7Lc3/A2RWPEC30lcUy2AQeJWihAj09n5tIVc8cV6qQIBAYASkN0Ji2SjHL3BQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"cd4227a7934b617f2cddf8d03cfcd8c44cf9721da6f85e1f2e268cc534b1af60","last_reissued_at":"2026-05-18T03:13:08.888571Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T03:13:08.888571Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1309.4379","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:13:08Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"srneVVAcnzYaRrhtLtnZXG6S7fcRZjRBhMGF8/S1u5ve/MT/lZZMF/d+HsR6z5oAidLTuXZw374J5z5Cv0KWCA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T21:59:49.880003Z"},"content_sha256":"4541e40140c873102a66eca881aa9fdafc19bdd4b450f355783ff10be80a0e1e","schema_version":"1.0","event_id":"sha256:4541e40140c873102a66eca881aa9fdafc19bdd4b450f355783ff10be80a0e1e"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2013:ZVBCPJ4TJNQX6LG57DIDZ7GYYR","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"iMOD LEACH: improved MODified LEACH Protocol for Wireless Sensor Networks","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.NI","authors_text":"A. Ahmad, A. Haider, M. Akbar, M. M. Sandhu, N. Amjad, N. Javaid, S.Ahmed, U. Qasim, Z. A. Khan","submitted_at":"2013-09-17T16:40:44Z","abstract_excerpt":"Increased use of Wireless sensor Networks (WSNs) in variety of applications has enabled the designers to create autonomous sensors, which can be deployed randomly, without human supervision, for the purpose of sensing and communicating valuable data. Many energy-efficient routing protocols are designed for WSNs based on clustering structure. In this paper, we have proposed iMODLEACH protocol which is an extension to the MODLEACH protocol. Simulation results indicate that iMODLEACH outperforms MODLEACH in terms of network life-time and packets transferred to base station. The mathematical analy"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1309.4379","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T03:13:08Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"2l+qNCw4gMTJh3VDkvN4Vm11bmBu0jZJNSYY5hglRV6pYcsFzDu4GvR8/c9PkY+kywnEFG+yViheFl4BTaQWDg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-23T21:59:49.880783Z"},"content_sha256":"96cba0094f6e86491c0f2b5f0b3fed7e921de27422c56c3fd262f394e2df7f7d","schema_version":"1.0","event_id":"sha256:96cba0094f6e86491c0f2b5f0b3fed7e921de27422c56c3fd262f394e2df7f7d"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/ZVBCPJ4TJNQX6LG57DIDZ7GYYR/bundle.json","state_url":"https://pith.science/pith/ZVBCPJ4TJNQX6LG57DIDZ7GYYR/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/ZVBCPJ4TJNQX6LG57DIDZ7GYYR/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-23T21:59:49Z","links":{"resolver":"https://pith.science/pith/ZVBCPJ4TJNQX6LG57DIDZ7GYYR","bundle":"https://pith.science/pith/ZVBCPJ4TJNQX6LG57DIDZ7GYYR/bundle.json","state":"https://pith.science/pith/ZVBCPJ4TJNQX6LG57DIDZ7GYYR/state.json","well_known_bundle":"https://pith.science/.well-known/pith/ZVBCPJ4TJNQX6LG57DIDZ7GYYR/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2013:ZVBCPJ4TJNQX6LG57DIDZ7GYYR","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"1e7fbacd6d9355e22215d5f0b8b04a269a37cadaf6bcd521d1dbc0c532f47689","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2013-09-17T16:40:44Z","title_canon_sha256":"e1c4ea1ad3cea989d539624030de869e7cd34ee953e81b7471d13a66f6167d17"},"schema_version":"1.0","source":{"id":"1309.4379","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1309.4379","created_at":"2026-05-18T03:13:08Z"},{"alias_kind":"arxiv_version","alias_value":"1309.4379v1","created_at":"2026-05-18T03:13:08Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1309.4379","created_at":"2026-05-18T03:13:08Z"},{"alias_kind":"pith_short_12","alias_value":"ZVBCPJ4TJNQX","created_at":"2026-05-18T12:28:09Z"},{"alias_kind":"pith_short_16","alias_value":"ZVBCPJ4TJNQX6LG5","created_at":"2026-05-18T12:28:09Z"},{"alias_kind":"pith_short_8","alias_value":"ZVBCPJ4T","created_at":"2026-05-18T12:28:09Z"}],"graph_snapshots":[{"event_id":"sha256:96cba0094f6e86491c0f2b5f0b3fed7e921de27422c56c3fd262f394e2df7f7d","target":"graph","created_at":"2026-05-18T03:13:08Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Increased use of Wireless sensor Networks (WSNs) in variety of applications has enabled the designers to create autonomous sensors, which can be deployed randomly, without human supervision, for the purpose of sensing and communicating valuable data. Many energy-efficient routing protocols are designed for WSNs based on clustering structure. In this paper, we have proposed iMODLEACH protocol which is an extension to the MODLEACH protocol. Simulation results indicate that iMODLEACH outperforms MODLEACH in terms of network life-time and packets transferred to base station. The mathematical analy","authors_text":"A. Ahmad, A. Haider, M. Akbar, M. M. Sandhu, N. Amjad, N. Javaid, S.Ahmed, U. Qasim, Z. A. Khan","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2013-09-17T16:40:44Z","title":"iMOD LEACH: improved MODified LEACH Protocol for Wireless Sensor Networks"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1309.4379","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:4541e40140c873102a66eca881aa9fdafc19bdd4b450f355783ff10be80a0e1e","target":"record","created_at":"2026-05-18T03:13:08Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"1e7fbacd6d9355e22215d5f0b8b04a269a37cadaf6bcd521d1dbc0c532f47689","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2013-09-17T16:40:44Z","title_canon_sha256":"e1c4ea1ad3cea989d539624030de869e7cd34ee953e81b7471d13a66f6167d17"},"schema_version":"1.0","source":{"id":"1309.4379","kind":"arxiv","version":1}},"canonical_sha256":"cd4227a7934b617f2cddf8d03cfcd8c44cf9721da6f85e1f2e268cc534b1af60","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"cd4227a7934b617f2cddf8d03cfcd8c44cf9721da6f85e1f2e268cc534b1af60","first_computed_at":"2026-05-18T03:13:08.888571Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T03:13:08.888571Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"zL66dp6m5Koxjcs1W0CoqnXVd7Lc3/A2RWPEC30lcUy2AQeJWihAj09n5tIVc8cV6qQIBAYASkN0Ji2SjHL3BQ==","signature_status":"signed_v1","signed_at":"2026-05-18T03:13:08.889257Z","signed_message":"canonical_sha256_bytes"},"source_id":"1309.4379","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:4541e40140c873102a66eca881aa9fdafc19bdd4b450f355783ff10be80a0e1e","sha256:96cba0094f6e86491c0f2b5f0b3fed7e921de27422c56c3fd262f394e2df7f7d"],"state_sha256":"d70e1c3adba2e9f85ea8318a64b52ccc0e15f74f561f92b6acb8ecd13f71246e"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"u0C3XoXtlaZ94jnzUk2WA45aal1vGc9oDlxuJdPIZ0UpWu1CFyEcgEAABuuA/ZNZzXMFzyTgghaVi1G08mJbAw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-23T21:59:49.885177Z","bundle_sha256":"9e26a714e5fe317168b61374dd49a042d2898e6ac867cad35ccad45dc889acdd"}}