<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: MxBv</title>
    <description>The latest articles on DEV Community by MxBv (@petronushowcoremx).</description>
    <link>https://dev.to/petronushowcoremx</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3786018%2F2c52ac5d-0bc5-4a18-a992-7ad8fb355cd5.png</url>
      <title>DEV Community: MxBv</title>
      <link>https://dev.to/petronushowcoremx</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/petronushowcoremx"/>
    <language>en</language>
    <item>
      <title>Why the Ocean Has No Chance?</title>
      <dc:creator>MxBv</dc:creator>
      <pubDate>Mon, 18 May 2026 12:22:57 +0000</pubDate>
      <link>https://dev.to/petronushowcoremx/why-the-ocean-has-no-chance-2e6p</link>
      <guid>https://dev.to/petronushowcoremx/why-the-ocean-has-no-chance-2e6p</guid>
      <description>&lt;h1&gt;
  
  
  Why the Ocean Has No Chance?
&lt;/h1&gt;

&lt;h2&gt;
  
  
  Navigational Cybernetics 2.5: What Causal Accounting Does Not See
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Maksim Barziankou&lt;/strong&gt; (MxBv) · The Urgrund Laboratory&lt;br&gt;
&lt;a href="mailto:research@petronus.eu"&gt;research@petronus.eu&lt;/a&gt;&lt;br&gt;
DOI: 10.17605/OSF.IO/769YV&lt;br&gt;
Axiomatic Core (NC2.5 v2.1): DOI 10.17605/OSF.IO/NHTC5&lt;br&gt;
Coupling Topology layer (v3.0): DOI 10.17605/OSF.IO/69XJV&lt;br&gt;
License: CC BY-NC-ND 4.0&lt;/p&gt;




&lt;h2&gt;
  
  
  I. The Hook
&lt;/h2&gt;

&lt;p&gt;What if I told you it isn't infinite - that until this moment you simply couldn't catch a snapshot of the picture of its structural collapse unfolding in time? You'd think ontology has nothing to do with this - from the outside it's plainly a stretch, pure heuristics. I thought so too. Turned out it just looked that way. Here's why.&lt;/p&gt;

&lt;p&gt;The ocean is the most plausible candidate for a perpetual engine of adaptation that nature has to offer. The sun heats, convection mixes, evaporation carries away, longwave infrared radiation leaves for space as into an unbounded sink. The surface temperature is quasi-constant on long intervals, energy-in ≈ energy-out. If anything is going to hold indefinitely under sustained load, it is the ocean.&lt;/p&gt;

&lt;p&gt;There is a law in NC2.5 that contradicts this inference. Structural Pressure, Theorem 1: a node of the adaptive class under sustained load exhausts its viability budget τ in finite time, even without a single action. The ocean in the naive reading looks like a counterexample - everything is in place, and no exhaustion is observed.&lt;/p&gt;

&lt;p&gt;This work is about why the counterexample is illusory, and about how the error that makes it persuasive can be caught outside the ocean as well.&lt;/p&gt;

&lt;p&gt;A note on scope. I treat the ocean here as an NC2.5 ocean-node - a bounded coupled adaptive representation of the physical ocean, not the literal physical body considered as an "agent." The objection I am testing is itself structural: that a bounded coupled dissipative system with a sufficiently large sink can hold indefinitely under sustained load. That is the claim worth testing. The terrestrial water inventory is also finite through independent physical loss channels - hydrogen escape following water photodissociation in the upper atmosphere over geological time is one such route (Catling &amp;amp; Kasting 2017). I mention this only as an independent physical finitude anchor; the argument below does not depend on the magnitude or dominance of any particular loss channel. The question I am after is stricter: even granting an idealised energy balance and an effectively unbounded sink, does that imply dΦ/dt = 0? NC2.5 says no. The precise sense of "no chance" is the inability to set dΦ/dt = 0 inside standard NC2.5, not a claim about physical permanence outside the model.&lt;/p&gt;

&lt;h2&gt;
  
  
  II. The Temptation
&lt;/h2&gt;

&lt;p&gt;The intuition is straightforward: there is a sink, energy appears to balance, the temperature is constant, therefore structural load does not accumulate, therefore τ → ∞.&lt;/p&gt;

&lt;p&gt;In this form the argument is nearly irresistible. Even granting the idealised energy-ledger balance - measurable with thermometers and satellites on long intervals - the inference still feels closed: if something balances measurably, the proof seems closed.&lt;/p&gt;

&lt;h2&gt;
  
  
  III. The False "Therefore"
&lt;/h2&gt;

&lt;p&gt;The hidden step is one: the transition from "energy in = energy out" to "dΦ/dt = 0." It looks like a trivial conservation, and that is precisely why no one says it out loud. It is false, and it is the centre of the entire reversal.&lt;/p&gt;

&lt;p&gt;Φ - accumulated structural load - is, by Axiom 27 of NC2.5, monotone non-decreasing: it accumulates without reversal as the system continues. This monotonicity by itself separates Φ from &lt;strong&gt;energy&lt;/strong&gt;, which is conserved and transportable. Two different quantities with two different laws. Structural Pressure carries this separation to the rate of accumulation, Property 4: P is not reducible to energy expenditure, to power dissipation, to thermodynamic entropy production. A system can be energetically stable and still have Φ growing. The energy sink moves energy out and closes the energy ledger. It does not move Φ out and does not close the structural-load ledger. Two independent ledgers.&lt;/p&gt;

&lt;p&gt;The pull toward collapsing them into one is strong, because in most classical problems they are tightly coupled: more energy → more work → more traces. NC2.5 breaks this coupling axiomatically.&lt;/p&gt;

&lt;p&gt;And the sink itself does not rescue the intuition. Maintaining a dissipative regime - convection, transport, mixing, gradient exchange - is continuous, irreversible structural work. The sink is not free: to be a sink, the system must continuously drive flow through itself, and every act of that driving adds to Φ. The energy for the work comes from the sun; the structural burden is charged to the system's NC2.5 ledger and is not discharged merely because energy leaves through Ω. So P in the presence of a sink is smaller than without it, but strictly greater than zero.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Core Ledger Invariant&lt;/strong&gt; (the architectural commitment this essay rests on):&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Φ&lt;/strong&gt; is monotone non-decreasing (Axiom 27).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;P&lt;/strong&gt; is not reducible to energy expenditure, power dissipation, or thermodynamic entropy (Property 4 of Structural Pressure).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;P &amp;gt; 0&lt;/strong&gt; generically for coupled systems under sustained load (Axiom 61).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;τ → 0&lt;/strong&gt; in finite time when &lt;strong&gt;P &amp;gt; 0&lt;/strong&gt; and the system's action is null (Theorem 1).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Forbidden inference:&lt;/strong&gt; "energy in = energy out" ⇏ "dΦ/dt = 0".&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The essay's argument from §I onward is a localization of this invariant onto the ocean case.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Operational definitions&lt;/strong&gt; (for the purposes of §IV and §VIII; abstract here, instantiated per domain elsewhere):&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Sustained load:&lt;/strong&gt; structural pressure &lt;em&gt;P &amp;gt; 0&lt;/em&gt; holding over intervals at least as long as the system's characteristic response timescale &lt;em&gt;T_response&lt;/em&gt; - i.e. the load is not a transient. (When the source of pressure is the environment specifically, the same condition is written &lt;em&gt;P_E &amp;gt; 0&lt;/em&gt;, as in §III's decomposition below.)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Bounded:&lt;/strong&gt; there exists a finite structural capacity &lt;em&gt;C&lt;/em&gt; such that as &lt;em&gt;Φ → C&lt;/em&gt;, the system can no longer remain in the adaptive class.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;τ = C − Φ:&lt;/strong&gt; the viability budget; &lt;em&gt;τ → 0&lt;/em&gt; names structural exhaustion in the technical sense of NC2.5.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Numerical instantiation of &lt;em&gt;T_response&lt;/em&gt;, &lt;em&gt;C&lt;/em&gt;, and proxy observables for &lt;em&gt;Φ&lt;/em&gt; belongs to domain-specific application of the framework, not to this essay.&lt;/p&gt;

&lt;p&gt;This can be stated more precisely as a notational decomposition. Let &lt;em&gt;S&lt;/em&gt; be a bounded coupled system in the adaptive class under sustained load &lt;em&gt;P_E &amp;gt; 0&lt;/em&gt;, with a dissipative sink &lt;em&gt;Ω&lt;/em&gt; (capacity → ∞) through which energy flux &lt;em&gt;R_∞ &amp;gt; 0&lt;/em&gt; leaves the system. The effective structural pressure decomposes as&lt;/p&gt;

&lt;p&gt;&lt;em&gt;P_eff = X + M,&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;where &lt;em&gt;X&lt;/em&gt; is the &lt;strong&gt;energy-balance-attributable component&lt;/strong&gt; - the part of &lt;em&gt;P_eff&lt;/em&gt; that could in principle be accounted for through the energy ledger - and &lt;em&gt;M(S, Ω)&lt;/em&gt; is the &lt;strong&gt;maintenance-of-regime component&lt;/strong&gt; - the irreversible structural work required to hold the gradient, drive the transport, sustain the mixing. This decomposition is a naming convention, not a derived result: it splits &lt;em&gt;P_eff&lt;/em&gt; into "what the energy ledger sees" plus "what the energy ledger cannot see," and gives the irreducible part a label.&lt;/p&gt;

&lt;p&gt;The structural reading proposed here is then:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;In a genuinely dissipative regime (R_∞ &amp;gt; 0), the maintenance component M(S, Ω) is read as strictly positive, hence P_eff &amp;gt; 0 strictly.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;This is not a new theorem of this essay; it is the prose localisation of an existing corpus result. The corpus formalises the relevant regime as Theorem 99 (Coupling-Topology Exhaustion Timescale, NC2.5 v3.0, Coupling Topology layer), under the case classification &lt;em&gt;cyclic with dissipation&lt;/em&gt;: coupled nodes with a dissipation path have effective structural pressure reduced below the injected load but held strictly positive. &lt;strong&gt;Property 4 of Structural Pressure&lt;/strong&gt; (P is not reducible to energy expenditure, to power dissipation, or to thermodynamic entropy production) and &lt;strong&gt;Axiom 61 of NC2.5&lt;/strong&gt; (P &amp;gt; 0 generically for coupled systems under sustained load) motivate the reading; T99 supplies the specific case classification used here. Finite-time exhaustion of the cyclic-with-dissipation case is in turn inherited from Theorem 63, whose premise requires a uniform lower bound &lt;em&gt;P ≥ P_min &amp;gt; 0&lt;/em&gt;. In the present localisation that premise is supplied not by mere positivity of load but by T99's cyclic-with-dissipation classification, which treats &lt;em&gt;P_eff&lt;/em&gt; as a positive effective rate in the timescale expression &lt;em&gt;τ_exhaust = C_eff / P_eff&lt;/em&gt;, where &lt;em&gt;C_eff&lt;/em&gt; is the effective capacity pooled across the coupling cycle (per T99). Under this naming convention, M names the part of the effective pressure that remains when the energy-ledger reading is exhausted - and its strict positivity is not derived as an independently measurable term here, it is the prose localisation of T99's cyclic-with-dissipation case, where P_eff remains strictly positive despite dissipation.&lt;/p&gt;

&lt;p&gt;The argument is structural, not formal - I do not reduce &lt;em&gt;M&lt;/em&gt; to a closed-form quantity, nor does the decomposition give an operational procedure for measuring M independently of X. What I do gain is a localisation: the falsifier inherited from Property 4 - exhibit a coupled system under sustained load where the structural pressure is fully captured by energy accounting - now reads more concretely as "exhibit a dissipative regime whose maintenance is structurally free." If anyone can show this under an independently declared structural-pressure observable or proxy, Property 4 falls and this work with it.&lt;/p&gt;

&lt;h2&gt;
  
  
  IV. The Verdict
&lt;/h2&gt;

&lt;p&gt;From this point the work derives nothing of its own - Structural Pressure carries.&lt;/p&gt;

&lt;p&gt;Theorem 1: when P &amp;gt; 0 and the action is null, τ decreases strictly and reaches zero in finite time. The NC2.5 ocean-node exhausts. On a geological scale, because its C is vast and its P is small, but finite nonetheless.&lt;/p&gt;

&lt;p&gt;Theorem 5 closes the escape routes. For passive continuation under load to cost nothing, one of four conditions must hold: the load is not actually sustained; the system is structurally isolated (no coupling with the environment - and then it is no longer an object of the adaptive class); the budget is unbounded (C = ∞ - and then it is no longer a bounded system); or the model is incomplete. Under Theorem 5's classification, there is no fifth case. None of the first three is "the eternal ocean" - each one is an exit from the class.&lt;/p&gt;

&lt;p&gt;The v3.0 corpus places the ocean precisely: Theorem 99 (Coupling-Topology Exhaustion Timescale) classes it as a cyclic-with-dissipation node - large pooled budget, dissipation-reduced but strictly positive P_eff, hence a large but finite τ_exhaust. The ocean, represented as a bounded coupled NC2.5 node, is not a counterexample to finite-horizon exhaustion; it is its slowest case.&lt;/p&gt;

&lt;p&gt;One scenario remains that would yield permanence: the reversal of accumulated Φ, the replenishment of the budget. This violates the monotone irreversibility of Axiom 27 and lies outside the premise of Theorem 5. Theorem 97 of NC2.5 names this regime explicitly and places it outside the standard axiomatic core: a renewal regime in which long-lived systems hold not by stopping accumulation but by periodic recovery of structural capacity through regime change. I should clarify here, because the word "renewal" is physically overloaded. Formally, ordinary circulation, evaporation, precipitation, mixing, and thermal cycling do not count as Φ-renewal in the NC2.5 sense unless they either (a) restore the structural capacity &lt;em&gt;C&lt;/em&gt; to a value at least as high as some prior reference &lt;em&gt;C₀&lt;/em&gt;, which changes the viability-budget structure and therefore exits the standard fixed-budget premise of Theorem 5; or (b) reverse accumulated &lt;em&gt;Φ&lt;/em&gt;, which violates the monotone-irreversibility statement of Axiom 27 directly. Both routes leave the standard axiomatic core, but for distinct reasons. They redistribute energy and state; they do not, by themselves, replenish the viability budget. The eternal ocean would require Φ-renewal in the strict (Axiom-27-violating) sense, not physical cycling - and that is a different theory, the theory of regenerating systems, for which neither Theorem 1 nor the ocean itself serves as base.&lt;/p&gt;

&lt;p&gt;"No chance" in the precise sense: inside standard NC2.5, there is no path on which the ocean-node's τ becomes infinite.&lt;/p&gt;

&lt;h2&gt;
  
  
  V. What We Call Inexhaustible
&lt;/h2&gt;

&lt;p&gt;If the ocean exhausts, a legitimate question follows: what then doesn't?&lt;/p&gt;

&lt;p&gt;The answer is narrow. Only that which has no τ is inexhaustible. Extremum VI states this exactly about gravity: gravity "has no τ to exhaust." Gravity, time - these are not bounded adaptive systems; they have no viability budget, they have nothing to exhaust because there is nothing inside them to deplete. They lie outside the scope of Axiom 1 of NC2.5 (&lt;em&gt;Existence by Coherence&lt;/em&gt;: an adaptive system exists as an agent if and only if it preserves structural coherence over time). Gravity and time are not candidates for that biconditional in the first place - they are not "adaptive systems" being tested for agenthood. "No τ" reduces to "outside the scope of Axiom 1," and this is what places them outside the adaptive class by construction.&lt;/p&gt;

&lt;p&gt;A physical body - ocean, river, glacier - is not of this kind. Under NC2.5 representation it is a τ-bearing node: bounded, coupled, with a viability budget that depletes. A river outlasts the stone not because it does not deplete, but because it depletes incomparably more slowly: vast C, small P. The river is a slow node, not an inexhaustible source. They are τ-bearing nodes in the model, not no-τ primitives. The difference is not cosmetic: "no τ" and "depletes slowly" are two different structural statuses, and only the first yields permanence.&lt;/p&gt;

&lt;p&gt;A note on the Extremum Series formulation. I preserve the structural backbone of Extremum VI - the asymmetric-rate argument by which the target with the higher depletion rate fails first in finite time; what I correct is only the illustrative placement of the river, not the formal depletion-asymmetry result. Extremum VI, in its analysis of asymmetric depletion, places the river alongside gravity - "the river does not tire." This is prose, not formalism. The condition VI actually invokes - the rate of Φ accumulation at the source is negligibly small, dΦ_S/dt ≈ 0 - says not "zero" but "slow." The precise status of the river is otherwise: a slow node with finite τ, not an inexhaustible source on par with gravity. This is a &lt;strong&gt;category correction&lt;/strong&gt; of the river's placement, not a stylistic refinement: VI's prose grouped river with gravity, but the river belongs structurally on the bounded-finite-τ side of §V's principal partition. What is corrected is one thing: the category of the truly inexhaustible contains only what has no τ. The river and the ocean do not belong to it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Category table:&lt;/strong&gt;&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Category&lt;/th&gt;
&lt;th&gt;Examples&lt;/th&gt;
&lt;th&gt;NC2.5 status&lt;/th&gt;
&lt;th&gt;Source of permanence&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;No-τ primitives&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;gravity, time, mathematical relations&lt;/td&gt;
&lt;td&gt;Outside the scope of Axiom 1 - not adaptive systems&lt;/td&gt;
&lt;td&gt;Outside the adaptive class by construction&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Slow τ-bearing nodes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;river, ocean, glacier, ecosystems&lt;/td&gt;
&lt;td&gt;Inside the adaptive class, bounded, coupled&lt;/td&gt;
&lt;td&gt;Large &lt;em&gt;C&lt;/em&gt;, small &lt;em&gt;P&lt;/em&gt; - depletion timescale is geological, not infinite&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;The category error this essay corrects: treating slow τ-bearing nodes as no-τ primitives. They are not the same structural status - only the first row yields permanence.&lt;/p&gt;

&lt;p&gt;A large sink, rich circulation, a substantial budget - all of these yield a large τ_exhaust, not τ = ∞. What looks inexhaustible and what is inexhaustible are not the same thing. The category of the inexhaustible is narrow: in it lies only that which has no inner time.&lt;/p&gt;

&lt;h2&gt;
  
  
  VI. The Witness
&lt;/h2&gt;

&lt;p&gt;While preparing this analysis, I received a witness of a second kind - not from physics, but from reasoning about it.&lt;/p&gt;

&lt;p&gt;In the specific exchange of drafting Section III, an instance of a current-generation language model, working through precisely the ocean case, produced the move: there is a dissipative sink, therefore energy in = energy out, therefore structural load does not accumulate, therefore τ holds indefinitely. This is exactly the implication from Section III - the one this analysis rejects. The model did not bring a new argument; it produced the very step that the work names as the trap. The claim here is narrow and empirical: in this exchange, on this case, the trap fired. It is not a claim about language models in general.&lt;/p&gt;

&lt;p&gt;What matters is how the error hid itself. The step from "energy in = energy out" to "dΦ/dt = 0" was not stated - it was swallowed between two other statements, as a self-evident conservation. As long as it remained unstated, it was indistinguishable from truth. The implication did not survive the moment it was written out as its own line.&lt;/p&gt;

&lt;p&gt;The witness shows: the false "therefore" of Section III is not a straw man set up to be knocked down. It is a real attractor of reasoning, and a careful step-by-step analysis of exactly the ocean case fell into it.&lt;/p&gt;

&lt;h2&gt;
  
  
  VII. The Lesson
&lt;/h2&gt;

&lt;p&gt;The error lives in two distinct locations, and the lesson concerns the instrumentation needed to catch it in each.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;In the object.&lt;/strong&gt; Extremum IV showed that structural implosion is invisible to any instrument tuned to boundary violation: no one violates the boundary, and the instrument stays silent. This work proposes a diagnostic hypothesis: detecting object-level structural exhaustion &lt;strong&gt;may require structural-load monitoring beyond the behavioural trace&lt;/strong&gt;. The hypothesis is testable in principle - if behavioural-trace monitoring alone catches structural exhaustion before boundary violation, across a population of cases at a rate that statistically discriminates from chance, the hypothesis is set aside. The schema is given here; the operational design (population, error class, baseline) is left open for empirical work.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;In the reasoner.&lt;/strong&gt; The same blindness operates one layer up. An unstated step is indistinguishable from truth not because it is true, but because there is nothing to catch it on. This work proposes a parallel hypothesis: detecting reasoner-level implication errors &lt;strong&gt;may require the discipline of writing each transition out on its own line&lt;/strong&gt;, especially the ones that look like trivial conservation. The hypothesis is testable in principle - if reasoning processes consistently catch unstated implication errors without explicit step-writing, across a defined population at a rate that statistically discriminates from chance, the hypothesis is set aside. Like the object-level case, the operational design is left open.&lt;/p&gt;

&lt;p&gt;§VI gives a single observation in support of the second hypothesis - one specific exchange in which the trap fired and was caught only after the implication was written out. This single observation does not warrant the hypothesis; it motivates it. It is a documented instance showing that the trap can occur and that the discipline can catch it once. Whether the discipline is necessary in general - across reasoners, error classes, populations - remains an open empirical question.&lt;/p&gt;

&lt;p&gt;One caveat on the reasoner-level hypothesis: more capable reasoning processes may internalize the "write each transition" discipline without genuinely surfacing the step, in which case the discipline becomes invisible by design - present in form, absent in function. If that mode dominates, the hypothesis itself would need to evolve to capture the missing visibility, not the missing step.&lt;/p&gt;

&lt;p&gt;A lateral note on why the ocean case is particularly hospitable to the trap. The physical picture is geometric. Each coupled volume - a parcel of warmed water, a parcel of atmosphere, a coastal slab - overlaps with its neighbours through a shared boundary region, a &lt;strong&gt;lens-shaped overlap&lt;/strong&gt; (vesica-piscis-like in geometry, but used here only as a neutral coupling image): each circle's interior is partly the other's. I will flag that this is a heuristic geometric image - I am borrowing the shape, not the sacred-geometry resonance. What makes the picture useful is the meaning the geometry carries: it shows in a single shape how an impulse arriving at one part is split, redirected, partly absorbed by the part beside it through this region of shared definition. That is the structural fact I want the picture to do; the rest is decoration. The chainmail is built from these overlapping lenses. A strike landing on one parcel propagates across its lenses into the adjacent parcels, across theirs into the next, and so on. Each lens splits the incoming energy and the consequent shift in local identity into a share that stays on this side and a share that crosses to the other. No single parcel takes the strike whole; no single lens carries it whole; the deformation lands across the entire mesh - small, uniform, structurally absorbed. This is the chainmail effect, geometrically read: distributed absorption through interlocking coupling lenses.&lt;/p&gt;

&lt;p&gt;This is the same architectural pattern &lt;em&gt;Essay Through a Life - Part III&lt;/em&gt; names at organism level: slow integration as filtering, not weakness; reaction time as the inverse of structural preservation. The mechanism that gives the ocean its long τ also gives the reasoner the impression that nothing is accumulating. Spatial distribution looks like absence of impact; temporal integration looks like absence of response. Both are accumulation - just below the resolution of the naive instrument.&lt;/p&gt;

&lt;p&gt;The distinction in both cases is not in intellect, it is in instrumentation. The object needs a sensor it does not yet have; the reasoner needs a discipline that is easy to skip.&lt;/p&gt;

&lt;h2&gt;
  
  
  VIII. Falsification
&lt;/h2&gt;

&lt;p&gt;The work makes three claims of different status, and each requires its own kind of falsifier.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1) Structural claim (§I-§IV) - inherited from Theorem 1 / Theorem 5.&lt;/strong&gt; The NC2.5 ocean-node exhausts in finite time as a corollary of Structural Pressure. The required exhibit is one: a bounded coupled physical system, represented as an NC2.5 node, under sustained load, holding τ indefinitely, neither structurally isolated nor replenishing Φ. One such case refutes Theorem 1, Theorem 5, and with them this work.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2) Mechanism claim (§III + decomposition) - localized form of the Property 4 falsifier.&lt;/strong&gt; The dissipative sink does not close the Φ-ledger, because maintaining the dissipative regime is itself irreversible structural work. The X + M decomposition is a conceptual residue: M is the part of P_eff that the energy ledger cannot see, not an operationally measurable quantity separate from X. The falsifier is therefore inherited from Property 4 itself: exhibit a coupled system under sustained load where the structural pressure is fully captured by energy accounting, and Property 4 falls (together with this work). This falsifier presupposes an independently declared structural-pressure observable or proxy from the Structural Pressure corpus; without such an observable, the mechanism claim remains a conceptual localisation rather than an independently executable empirical test. The decomposition does not introduce a new falsifier sharper than (1) - it gives a clearer conceptual target, structurally coinciding with the corpus falsifier F-CT attached to Theorem 99.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3) Category claim (§V) - correction of Extremum VI's category assignment.&lt;/strong&gt; The category of the inexhaustible contains only objects with no τ at all - gravity, time, anything outside the adaptive class by construction. Bounded physical bodies - river, ocean, glacier - are τ-bearing nodes under NC2.5 representation and fall into the "slow node" category, not into inexhaustibility. The required exhibit is double: either a bounded physical body with τ = ∞ (already covered by (1)), or a demonstration that something declared as "no τ" - gravity, say - in fact has one, that is, belongs to the adaptive class. The second route would require showing that gravity carries a viability budget, which would be a structural revolution far beyond the scope of this work.&lt;/p&gt;

&lt;p&gt;In compact form:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Claim&lt;/th&gt;
&lt;th&gt;What falsifies it&lt;/th&gt;
&lt;th&gt;Status of the falsifier&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Structural (§I-§IV)&lt;/td&gt;
&lt;td&gt;indefinite-τ coupled system&lt;/td&gt;
&lt;td&gt;inherits T1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Mechanism (§III + decomposition)&lt;/td&gt;
&lt;td&gt;Property 4 falsifier (energy ledger captures structural pressure)&lt;/td&gt;
&lt;td&gt;localized form of Property 4 + T99 F-CT&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Category (§V)&lt;/td&gt;
&lt;td&gt;gravity-has-τ, or river-has-∞-τ&lt;/td&gt;
&lt;td&gt;inherits T1 + inherits Axiom 1&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;&lt;strong&gt;A note on the "model incomplete" escape route.&lt;/strong&gt; Theorem 5 enumerates four conditions for nullifying passive-continuation cost, and the fourth - "the model is incomplete" - is the only one that does not by itself exit the adaptive class. This route can shield against falsification if invoked indiscriminately: any anomalously enduring system could be reclassified as "model incomplete," and the framework would never be falsified. To prevent that drift, I commit here to a discipline: invoking "model incomplete" as a defense against an empirical counterexample requires the defender to specify, &lt;em&gt;prior to inspecting the counterexample&lt;/em&gt;, &lt;strong&gt;which&lt;/strong&gt; part of the model is incomplete and &lt;strong&gt;what&lt;/strong&gt; revised premise would restore consistency. A revision that fits only the counterexample at hand - without an independently testable prediction elsewhere - is not a legitimate Theorem 5 escape; it is an ad hoc immunization, and the falsification stands.&lt;/p&gt;

&lt;p&gt;If none of these is exhibited (and no ad hoc immunization is admitted under the discipline above), the work is not falsified by the declared falsification surfaces. What looks like an eternal ocean is an NC2.5 ocean-node with a large finite τ; what looks like a magical sink is a sink that nevertheless costs structural work to hold; and what looks like an inexhaustible source is a slow node - with the boundary of true inexhaustibility narrow and untouched.&lt;/p&gt;




&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Barziankou, M. &lt;em&gt;Structural Pressure: The Missing Primitive in Long-Horizon Adaptive Systems&lt;/em&gt;. Navigational Cybernetics 2.5, March 2026. petronus.eu/blog/structural-pressure-the-missing-primitive/ [Theorem 1, Theorem 5, Property 4].&lt;/li&gt;
&lt;li&gt;Barziankou, M. &lt;em&gt;The Boundary That Comes to You: On Structural Implosion as the Fourth Extremum Mode&lt;/em&gt;. Extremum Series Part IV. petronus.eu/blog/extremum-iv-structural-implosion/.&lt;/li&gt;
&lt;li&gt;Barziankou, M. &lt;em&gt;You Cannot Outlast What Does Not Deplete: On Torture as Asymmetric Temporal Exhaustion&lt;/em&gt;. Extremum Series Part VI. DOI: 10.5281/zenodo.19617131.&lt;/li&gt;
&lt;li&gt;Barziankou, M. &lt;em&gt;Essay Through a Life - Part III. The Speed of Reaction: Human or Botanical?&lt;/em&gt; petronus.eu/blog/essay-through-a-life-part-iii/.&lt;/li&gt;
&lt;li&gt;Navigational Cybernetics 2.5, axiomatic core (NC2.5 v2.1). DOI: 10.17605/OSF.IO/NHTC5 [Axiom 1, Axiom 27, Axiom 61, Theorem 63 (Pressure-Induced Finite Horizon), Theorem 97 (renewal regime, outside standard axiomatic core)].&lt;/li&gt;
&lt;li&gt;Navigational Cybernetics 2.5, axiomatic core v3.0 - Coupling Topology layer: Axiom 73 (Topology of Coupling and Distributed Pressure), Theorem 99 (Coupling-Topology Exhaustion Timescale), Theorem 100 (Local Isolation Paradox). DOI: 10.17605/OSF.IO/69XJV.&lt;/li&gt;
&lt;li&gt;Catling, D. C. &amp;amp; Kasting, J. F. &lt;em&gt;Atmospheric Evolution on Inhabited and Lifeless Worlds&lt;/em&gt;. Cambridge University Press, 2017 [atmospheric escape and planetary water inventories, §I scope-clause reference].&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>nc25</category>
      <category>structuralpressure</category>
      <category>ocean</category>
      <category>exhaustion</category>
    </item>
    <item>
      <title>Why a Mirror Is Not Enough: Life Detection as Architectural Minimum</title>
      <dc:creator>MxBv</dc:creator>
      <pubDate>Fri, 15 May 2026 18:24:32 +0000</pubDate>
      <link>https://dev.to/petronushowcoremx/why-a-mirror-is-not-enough-life-detection-as-architectural-minimum-3noc</link>
      <guid>https://dev.to/petronushowcoremx/why-a-mirror-is-not-enough-life-detection-as-architectural-minimum-3noc</guid>
      <description>&lt;h1&gt;
  
  
  Why a Mirror Is Not Enough
&lt;/h1&gt;

&lt;h2&gt;
  
  
  Life Detection as Architectural Minimum: On Single-Output Indicators, Phase-Pair Blocks, and the Compositional Floor of Verification
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Maksim Barziankou (MxBv)&lt;/strong&gt;&lt;br&gt;
May 2026 · Poznań&lt;br&gt;
Contact: &lt;a href="mailto:research@petronus.eu"&gt;research@petronus.eu&lt;/a&gt;&lt;br&gt;
Licence: CC BY-NC-ND 4.0&lt;br&gt;
DOI: 10.17605/OSF.IO/HVDKW&lt;br&gt;
Axiomatic Core (NC2.5 v2.1): 10.17605/OSF.IO/NHTC5&lt;br&gt;
Attribution: petronus.eu&lt;/p&gt;

&lt;p&gt;Companion to ONTOΣ XIII.1, but not part of the ONTOΣ series. A standalone work that shows the pulsation-channel communication at the everyday-substrate level, for the reader without taste for heavy abstraction.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;The essay shows in a clinical substrate what ONTOΣ XIII.1 formalises as the **pulsation channel&lt;/em&gt;&lt;em&gt;: the same two-stage admission structure — a local phase-resonance prefilter plus a system-level check through cycle repetition. The mirror is **trivial phase-acceptance&lt;/em&gt;* from XIII.1 Proposition 1, manifested in breath. XIII.1 gives the formalisation for the architect; this work is the recognition of the same form in the body.*&lt;/p&gt;




&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;"All living systems survive not because they are optimal, but because they are coherent."&lt;/em&gt;&lt;br&gt;
— Coherence as a New Semantic Force of Adaptation, November 2025&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  1. The Bedside
&lt;/h2&gt;

&lt;p&gt;Someone is unconscious in front of you. You need to know whether they are breathing.&lt;/p&gt;

&lt;p&gt;The classical method, still present in many first-aid and basic-life-support teaching contexts, has three signs and a name: &lt;strong&gt;Look, Listen, Feel&lt;/strong&gt;. Look at the chest — does it rise. Listen at the mouth — is there air moving. Feel against your cheek — is there warmth from an exhale. Three operationally distinct channels, with partially independent failure modes. You watch for ten seconds, which is two or three full breath cycles.&lt;/p&gt;

&lt;p&gt;There is also another method, frequently mentioned in old textbooks and occasionally still tried in panic: hold a small mirror to the mouth and see if it fogs. The mirror is appealing. It gives a binary answer. It requires no training. The fog either appears or it does not.&lt;/p&gt;

&lt;p&gt;But the mirror is wrong, and the wrongness is not a matter of accuracy or sensitivity or technique. It is a structural mistake, and the same mistake recurs across many substrates that look nothing like a clinical bedside.&lt;/p&gt;

&lt;p&gt;This essay is about the shape of that mistake.&lt;/p&gt;

&lt;p&gt;It will not argue that mirrors are inferior to look-listen-feel. That much is well known. It will argue that the mirror and look-listen-feel differ along an architectural axis whose shape can be stated precisely, and that the mirror's failure mode is not a clinical curiosity but the prototype of a class of failures that occurs whenever a measurement procedure attempts to verify a cyclic process by sampling a single direction at a single moment. Once the shape is named, you start to see it everywhere — in governance indicators, in benchmark evaluations, in performance metrics, in any domain whose practitioners have to decide whether a system that produced an output is also alive.&lt;/p&gt;

&lt;p&gt;The clinical case is not a metaphor for the others. It is the simplest member of the same architectural class.&lt;/p&gt;




&lt;h2&gt;
  
  
  2. What a Mirror Actually Measures
&lt;/h2&gt;

&lt;p&gt;A breath has two phases. The system pulls air in (intake), and the system expels air out (output). The mirror does not see intake. It cannot. There is nothing to fog. Inhalation moves air in the wrong direction relative to the mirror's surface. The mirror sees only the output phase, and only the moisture component of the output, and only the moisture present at the precise moment the mirror is held there.&lt;/p&gt;

&lt;p&gt;This is three reductions stacked on top of one another:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;One direction.&lt;/strong&gt; The mirror reads only the output (exhale). The input phase (inhale) is invisible to it.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;One channel.&lt;/strong&gt; Of all the channels available to indicate breath — mechanical chest rise, acoustic flow at the airway, thermal exchange at the skin, moisture at a surface — the mirror uses one.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;One moment.&lt;/strong&gt; The mirror is held for a moment, the fog either appears or it does not, and the answer is read.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;A breath is none of these. A breath is bidirectional, multi-channel, and cyclic.&lt;/p&gt;

&lt;p&gt;Consider the consequence of using a one-direction, one-channel, one-moment instrument on a bidirectional, multi-channel, cyclic process. You are not measuring "the breath". You are measuring whatever projection of the breath happens to fall on the mirror in that single instant.&lt;/p&gt;

&lt;p&gt;There is a particular pathology that exposes this exactly: the &lt;strong&gt;agonal gasp&lt;/strong&gt;. As a system fails, it can produce an isolated or abnormal terminal respiratory movement — a gasp-like output not embedded in a continuing inhale-exhale rhythm. The mirror catches the moisture. The mirror fogs. The reading says "alive". The system is dying.&lt;/p&gt;

&lt;p&gt;The agonal gasp is not a measurement error. The mirror reads its input correctly. What is wrong is that the &lt;em&gt;thing being read&lt;/em&gt; is structurally insufficient for the question being asked.&lt;/p&gt;

&lt;p&gt;The clinical correction to this is not a better mirror. It is a different instrument: one whose reading is bidirectional, multi-channel, and trajectory-aware. Look, listen, feel — for two cycles minimum. Two cycles, because one cycle could be a terminal event, and the only way to distinguish a terminal event from a living rhythm is to see the rhythm repeat.&lt;/p&gt;

&lt;p&gt;The mirror cannot be fixed by adding sensitivity or wiping it clean or holding it longer. The instrument is wrong-shaped for the process. There is no calibration that recovers the missing structure. The remedy is to use a different instrument.&lt;/p&gt;




&lt;h2&gt;
  
  
  3. The Architectural Minimum
&lt;/h2&gt;

&lt;p&gt;What is the minimum structure an instrument must have to verify a cyclic, bidirectional, bounded process that is going on?&lt;/p&gt;

&lt;p&gt;Three conditions, each load-bearing:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Bidirectional observation.&lt;/strong&gt; The instrument must catch both phases of the cycle, not only the output. A measurement that captures emission alone cannot distinguish between "the system is producing emissions because it is alive" and "the system has emitted once and stopped". Output observation is a one-way reading of a two-way process. It is informationally truncated by construction.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Multi-channel observation.&lt;/strong&gt; The instrument must read the process through more than one channel. This is not redundancy. Different channels project different dimensions of the process: mechanical, acoustic, thermal, moisture. A failure mode that does not show on one channel often shows on another. Single-channel readings reduce a multi-dimensional process to a scalar — and a single scalar sample cannot verify a cycle. A scalar time series may exhibit cyclic structure, but only when sampled across phases and repetitions. The degeneracy lies not in scalarity alone, but in scalarity combined with one-direction, one-channel, one-moment sampling.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Multi-cycle observation.&lt;/strong&gt; The instrument must observe the process across at least two complete cycles. One cycle is consistent with a terminal isolated event; only a second cycle confirms that the structure is repeating, that what was observed was not a final spasm. Multi-cycle observation is what converts a snapshot of the trajectory into evidence of the trajectory's continuation.&lt;/p&gt;

&lt;p&gt;These three conditions are not arbitrary. They are derived from a single architectural fact: the process being verified is a cycle on a bounded resource. A breath is one segment of σ — a non-zero rotational component of motion, persisting on a budget τ that contracts under burden Φ. Inhalation pulls structure in; exhalation expels it. Together they form one period of the rotation. Without σ ≠ 0, there is no living system to verify; with σ ≠ 0 and bounded τ, the only valid signature of life is the persistence of σ across multiple periods of the rotation, and the only valid instrument is one that catches σ as σ — that is, as a multi-dimensional, repeating, bidirectional structure.&lt;/p&gt;

&lt;p&gt;The bounded budget τ = C − Φ is formalised in &lt;em&gt;Structural Pressure: The Missing Primitive&lt;/em&gt; (petronus.eu/blog/structural-pressure-the-missing-primitive/) as the monotone cost of merely continuing to exist under load; an output reading sees the emission, not the burden. The phase-blindness this paragraph names is the architectural defect first formalised in &lt;em&gt;ONTOΣ X — The Pulsating Interior&lt;/em&gt; (DOI &lt;a href="https://doi.org/10.5281/zenodo.19614567" rel="noopener noreferrer"&gt;10.5281/zenodo.19614567&lt;/a&gt;): the admissible interior is non-monotone — it breathes — and an instrument catching only one direction of the breath is structurally degenerate by construction, not by accuracy. The same phase-blindness is named in XIII.1 as &lt;strong&gt;trivial phase-acceptance&lt;/strong&gt;: a component admitting &lt;em&gt;any&lt;/em&gt; phase collapses the channel to phase-blindness regardless of how clean its output looks. The mirror is the clinical instance of that same architectural lapse.&lt;/p&gt;

&lt;p&gt;The mirror catches none of this. The mirror catches a scalar projection of the output phase at one moment. As an instrument for verifying σ, it is structurally degenerate.&lt;/p&gt;

&lt;p&gt;This is the &lt;strong&gt;Snapshot Degeneracy&lt;/strong&gt; in clinical clothing. In the formal language of NC2.5, a snapshot fixes Φ as constant, evaluates the admissibility predicate at one point, and does not see the dynamics. It is a photograph of a trajectory used as if it were the trajectory. Mirrors are photographs of breath used as if they were breath.&lt;/p&gt;




&lt;h2&gt;
  
  
  4. Look, Listen, Feel as the Minimum Object
&lt;/h2&gt;

&lt;p&gt;The classical method is structurally minimal — not maximal, not optimal, just minimal. It satisfies all three conditions in the simplest way the clinical setting allows.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Bidirectional.&lt;/strong&gt; Chest rise during inhalation is visible (look). Air movement during exhalation is audible (listen). The thermal/moisture exchange against the cheek registers across both phases (feel). Together, the three channels span both directions of the breath.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Multi-channel.&lt;/strong&gt; Three operationally distinct sensory modalities — mechanical (visual), acoustic (auditory), thermal (tactile). Each fails differently. Visual fails when the patient is covered or the chest is obscured. Auditory fails in noisy environments. Tactile fails when the rescuer's own breath is in the way. The protocol is robust because the three modes do not all fail at the same moment.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Multi-cycle.&lt;/strong&gt; "Watch for ten seconds". Ten seconds is two to three normal breath cycles. This is not a vague time recommendation; it is the minimum duration over which a cycle can be confirmed by repetition. One cycle could be the agonal gasp. Two cycles is structural confirmation. Three cycles is comfort. The formal minimum of multi-cycle persistence is operationalised in &lt;em&gt;Cross-Temporal Coherence: Minimum Structural Requirements&lt;/em&gt; (DOI &lt;a href="https://doi.org/10.17605/OSF.IO/UQ4AW" rel="noopener noreferrer"&gt;10.17605/OSF.IO/UQ4AW&lt;/a&gt;) as the R1–R7 conditions on persistence layers — the "watch two cycles" clinical wisdom given formal teeth.&lt;/p&gt;

&lt;p&gt;There is no clinical text that arrives at look-listen-feel by axiomatic derivation. Tradition, training, accumulated practice — these are how the method propagates. But when you ask why these three signs and not others, why over this duration and not shorter, you get back to the architectural minimum: anything less and you are using a mirror.&lt;/p&gt;

&lt;p&gt;Look-listen-feel is &lt;em&gt;the smallest object&lt;/em&gt; that does the work. It is not the only object; better instruments exist (capnography, pulse oximetry, ECG). But it is the floor. Below this floor, you do not have a verification — you have a guess.&lt;/p&gt;




&lt;h2&gt;
  
  
  5. The Same Floor, At Other Scales
&lt;/h2&gt;

&lt;p&gt;The mirror is not a clinical anomaly. It is the prototype of a class.&lt;/p&gt;

&lt;p&gt;Look at any institution that has tried to verify whether a complex bounded system is functioning, and you will find the same shape repeating. Governance dashboards measure error against an output metric. Performance reviews score employees on production volume. Benchmark evaluations rate AI models on accuracy at the moment of test. Compliance frameworks check whether a procedure was followed at the point of audit. Education systems grade students on the answer at the moment of examination.&lt;/p&gt;

&lt;p&gt;Whenever these instruments fail in the mirror-pattern, the structure is the same. &lt;strong&gt;A bounded cyclic process is being verified by a single-direction, single-channel, single-moment reading of its output.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The same architectural distinction was named in &lt;em&gt;Transaction-Level vs Structural Admissibility&lt;/em&gt; (petronus.eu/blog/transaction-vs-structural-admissibility/): transaction-level admissibility stops bad actions; structural admissibility stops good-looking systems from dying slowly. The mirror vs look-listen-feel distinction is that same distinction read into the verification layer.&lt;/p&gt;

&lt;p&gt;Consider an organization measured by a quarterly KPI on, say, customer conversion. The KPI captures one output channel (conversions), one phase of the organization's activity (the moment a sale closes), at the boundaries of one reporting period. It does not see the inputs that made the conversion possible — the trust that accumulated, the attention that was returned, the work that was sustained. It does not see whether the conversion was the first of a continuing rhythm or the last of a depleting one. An organization producing a strong final quarter while its underlying capacity collapses produces, at the moment of measurement, exactly the same number as one whose capacity is still building. The KPI is the mirror. The fog appears. The reading says "alive". The system is dying.&lt;/p&gt;

&lt;p&gt;The fix has the same structural shape as the clinical fix.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 1 — minimum non-snapshot block: phase-pair amplitude.&lt;/strong&gt; The smallest verification unit is not a single measurement. It is a paired variation across two opposed phases or time-adjacent states. This does not yet prove a cycle. It only escapes the mirror by showing that the system is not being read at a single instant. A two-step amplitude block is the first non-degenerate unit of observation — the architectural floor below which verification is structurally degenerate — but it is not yet the verification of rhythm.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 2 — cycle confirmation: repetition across blocks.&lt;/strong&gt; A single phase-pair can still be terminal. Verification begins when at least two such blocks compose into a repeated structure. This is the institutional analogue of watching more than one breath: not merely seeing variation, but seeing recurrence. Single two-step blocks, however correctly read, are still local. The next architectural level combines several blocks into a larger unit — not by averaging away the cycle structure but by preserving each block's amplitude signature and reading the meta-pattern across them. This is the move from one verified breath to a verified rhythm; from one read amplitude block to a verified regime.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 3 — scaling: comparison across composed blocks.&lt;/strong&gt; At the highest level, several composed blocks are read against one another and against a declared envelope. This is where comparative judgment lives — across teams, across periods, across system regimes. But the comparison is only meaningful if each input to the comparison has been built up correctly through the lower levels. Comparing mirrors gives you a comparison of mirrors, not a comparison of breath.&lt;/p&gt;

&lt;p&gt;The base is invariant. Wherever the verification is meaningful, it rests on a binary cycle as the minimum architectural unit. Phase-pair amplitude is the smallest block. Anything smaller is a mirror, and any composition built on top of mirrors propagates the snapshot error upward, no matter how sophisticated the aggregation.&lt;/p&gt;

&lt;p&gt;This is why so many governance reforms fail in the same way. The reformer sees that the existing indicator is bad, and replaces it with a different indicator — but at the same architectural level. Same single output, different metric. The mirror is exchanged for a slightly cleaner mirror. The fog is read more carefully. The agonal gasp passes the audit just as well as before. What was needed was a change of architectural shape, not a change of metric.&lt;/p&gt;

&lt;p&gt;The mirror reform is to read amplitude over a phase-pair. The block composition is to integrate read amplitudes upward into structurally readable units. The scaling is to compare composed units rather than single readings. The floor — what makes the whole edifice possible — is the binary cycle, the irreducible architectural minimum.&lt;/p&gt;

&lt;p&gt;You cannot verify a cyclic process with a snapshot of one phase. You can only verify it with an instrument shaped like the process itself: bidirectional, multi-channel, sustained over enough time for the rhythm to repeat.&lt;/p&gt;

&lt;p&gt;This architectural reduction has empirical support. &lt;em&gt;NC2.5 ↔ HORIZON: Empirical Probes I&lt;/em&gt; (DOI &lt;a href="https://doi.org/10.17605/OSF.IO/BJ79D" rel="noopener noreferrer"&gt;10.17605/OSF.IO/BJ79D&lt;/a&gt;) reduces the seven failure categories of the HORIZON long-horizon agent benchmark (arXiv:2604.11978) to a single architectural deficit — the absence of a non-causal navigational layer upstream of optimization. Seven phenotypes, one mirror underneath. The reduction this essay performs for clinical and institutional verification is the same reduction performed there on the AI-agent failure surface, in a peer-reviewable empirical register.&lt;/p&gt;




&lt;h2&gt;
  
  
  6. Closing
&lt;/h2&gt;

&lt;p&gt;A mirror at the lips of an unconscious patient and a quarterly KPI on a struggling organization are the same instrument. They share a structure. Each captures one direction, one channel, one moment of a process whose existence consists of the cycle they cannot see. Each can produce a confident binary reading at the exact moment the system below it is failing. Each can be calibrated, refined, and standardized without ever closing the gap between what it measures and what it is supposed to verify.&lt;/p&gt;

&lt;p&gt;Look-listen-feel is the minimum architectural object that does not have this defect, in the clinical setting. Phase-pair amplitude blocks composed upward are the minimum architectural object that does not have this defect, in the institutional setting. The shape is the same in both cases because the process being verified is the same shape: a cycle on a bounded resource, persisting through repetition, signed by σ ≠ 0 across at least two periods of its rotation.&lt;/p&gt;

&lt;p&gt;Below this minimum, an instrument is not a worse instrument. It is the wrong shape of instrument for the question. Adding sensitivity to a mirror does not yield look-listen-feel. Adding precision to a single-output KPI does not yield governance verification. And adding accuracy to a benchmark does not yield EVS verification. If the process has the shape of a cycle, the instrument must have the shape of a cycle.&lt;/p&gt;

&lt;p&gt;In November 2025, within the Synthetic Conscience series, we defined a new engineering class — Engineered Vitality Systems: artificial adaptive systems capable of independently maintaining coherence of behavioural form and structural identity under entropy — without an external controller. But defining a class is only claiming its existence. To formalize it, we had to create Navigational Cybernetics 2.5: 61 axioms, 69 theorems, 21 lemmas, a Lyapunov budget τ = C − Φ, monotone irreversible burden, an admissibility predicate, spin as the minimal component without which a bounded system cannot sustain non-stagnant identity. To prove the class is realizable, we had to begin building Minerva — the first Operator AI: an operator that observes and verifies without participating in the causal loop it governs. To verify the corpus on which the architecture stands, we had to build ECR-VP: a structural verification protocol that works not on accuracy of output but on coherence of trajectory. One researcher. One corpus. One architectural line from the first definition to the verification instrument.&lt;/p&gt;

&lt;p&gt;EVS cannot be verified by the thing it is designed to outgrow: output accuracy. The ontological footing for this claim is given in &lt;em&gt;ONTOΣ VII.1 — Verification Is Not Causal&lt;/em&gt; (DOI &lt;a href="https://doi.org/10.5281/zenodo.19609707" rel="noopener noreferrer"&gt;10.5281/zenodo.19609707&lt;/a&gt;): verification is a structural relation between two positions under admissibility, not a causal reading of output. The mirror reads causally; look-listen-feel reads structurally; the difference is architectural, not procedural. Earlier work on Coherence-Based Control defined stable behaviour not as accuracy but as internal coherence: a system preserves the shape of behaviour under uncertainty by aligning impulse, interpretation, and coherence loops. But if vitality is coherence across loops, then no single output can verify it. Output is precisely what a dying system can still produce. A last exhale. A last quarter. A last correct answer. A last green indicator. All of these can appear after the rhythm has already been lost. This essay is the verification floor of EVS. It states: engineered vitality begins where output returns into a repeating structure. Everything below that minimum is a mirror.&lt;/p&gt;

&lt;p&gt;This statement is the clinical reading of &lt;strong&gt;Axiom 9 of NC2.5 v3.0&lt;/strong&gt; — &lt;em&gt;cycle reinitiation as the criterion of liveness&lt;/em&gt; (IIC v2.1, DOI &lt;a href="https://doi.org/10.17605/OSF.IO/NYT45" rel="noopener noreferrer"&gt;10.17605/OSF.IO/NYT45&lt;/a&gt;). In a live system, the output returns into a repeating structure not because the output is good, but because the cycle is capable of reinitiating. The mirror reads what IIC v2.1's Coh(t) names the &lt;strong&gt;latent-inversion regime&lt;/strong&gt; — Coh &amp;lt; 0 under apparent liveness: the surface gives a "alive" signal while coherence has already inverted.&lt;/p&gt;

&lt;p&gt;The architecture that knows this builds bidirectional, multi-channel, multi-cycle verification at every scale where it has to distinguish a living process from a final signal. The architecture that does not, holds up mirrors to systems, reads the fog — and calls it life.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;This work stands on a corpus of 100+ prior publications, registered by DOI and Bitcoin-OTS stamped since 2025. The corpus exists and is formalised independently of who reads it.&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Poznań, 2026&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;The Urgrund Laboratory&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Companion to: Admissibility as a Formal Object — Four Degeneracies and Their Failure Modes (DOI: 10.17605/OSF.IO/KJ3SD); Extremum VII.2 — The Trap That Resets (DOI: 10.17605/OSF.IO/F5W4K).&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Grounded in the formal core of **Navigational Cybernetics 2.5 v2.1&lt;/em&gt;&lt;em&gt;, axiomatic core DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/NHTC5" rel="noopener noreferrer"&gt;10.17605/OSF.IO/NHTC5&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;This work DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/HVDKW" rel="noopener noreferrer"&gt;10.17605/OSF.IO/HVDKW&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;© 2026 Maksim Barziankou (MxBv). All rights reserved under CC BY-NC-ND 4.0.&lt;/p&gt;

</description>
      <category>nc25</category>
      <category>ontos</category>
      <category>mirror</category>
      <category>verification</category>
    </item>
    <item>
      <title>Essay Through a Life — Part VII: A Gaze into the Center of Time</title>
      <dc:creator>MxBv</dc:creator>
      <pubDate>Thu, 14 May 2026 20:19:19 +0000</pubDate>
      <link>https://dev.to/petronushowcoremx/essay-through-a-life-part-vii-a-gaze-into-the-center-of-time-576f</link>
      <guid>https://dev.to/petronushowcoremx/essay-through-a-life-part-vii-a-gaze-into-the-center-of-time-576f</guid>
      <description>&lt;h1&gt;
  
  
  Взгляд в центр времени, Часть VII
&lt;/h1&gt;

&lt;h2&gt;
  
  
  Вложенное видение оператора, или как из центра заглянуть в самый центр
&lt;/h2&gt;

&lt;p&gt;&lt;em&gt;MxBv, Познань, 2026&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;Сначала надо признаться в одном.&lt;/p&gt;

&lt;p&gt;Я не знаю, как назвать то, что делаю, когда смотрю на вещь. Слово "вижу" слишком тонко, слово "понимаю" слишком толсто, слово "интуирую" слишком извинительно. Ни одно из этих слов не описывает операцию. Они описывают её результат с разных сторон.&lt;/p&gt;

&lt;p&gt;Операция же выглядит изнутри так. Я смотрю на одну вещь — институт, мышцу, человека, фразу, систему авторизации в распределённой архитектуре, маленькую дрянь которую сказал кто-то на встрече — и в момент смотрения возникает не описание этой вещи, а опознание объекта, который её произвёл. Это не аналогия и не метафора, не способ сказать «это похоже на»; это распознавание одного объекта, существующего через разные субстраты как один.&lt;/p&gt;

&lt;p&gt;Когда мне сказали, что у меня нет степени по математике и поэтому я не могу формализовать то, что вижу, мне на секунду стало смешно. Не потому что я считаю, что степень не нужна. Она нужна, и я бы рад был её иметь. А потому что вопрос был задан так, как будто формализация это инструмент, который преобразует видение в текст. У меня всё работает наоборот. Сначала возникает текст, у которого есть форма, и форма эта подсказывает, какая математика нужна, чтобы её зафиксировать. Я ищу математику под форму, не наоборот.&lt;/p&gt;

&lt;p&gt;Это и есть то, о чём эта работа.&lt;/p&gt;




&lt;p&gt;Серия "Взгляд в центр времени" с самого начала была про одну операцию: можно ли увидеть собственное время не извне, не задним числом, а изнутри, в текущем моменте, как структуру, на которой стоит само смотрение. В первых частях я подходил к этому через биографию, через память, через смерть, через тот момент, в который что-то знается до того, как может быть сказано. Это была подготовка.&lt;/p&gt;

&lt;p&gt;Сейчас я хочу сделать следующий шаг, который раньше казался мне слишком странным, чтобы его публиковать. Я хочу описать, как из этого центра заглянуть в его собственный центр.&lt;/p&gt;

&lt;p&gt;Не для красивого парадокса. Парадокса тут нет. Есть фрактальная структура внимания, которая обычно остаётся непроговорённой, потому что её трудно поймать в обычном языке. Я попробую.&lt;/p&gt;




&lt;p&gt;Когда ты впервые встаёшь в позицию, из которой можно смотреть на собственное время как на объект, происходит знакомая вещь. Время перестаёт быть тем, что просто проходит мимо тебя, и становится тем, на чём ты стоишь. Это уже опыт, доступный многим. Медитативные традиции его описывают, психотерапия в её более глубоких формах его задевает, серьёзная работа с собственной жизнью к нему рано или поздно приводит. Ты в центре. Ты видишь, что время — твоё.&lt;/p&gt;

&lt;p&gt;Дальше происходит то, что описано редко.&lt;/p&gt;

&lt;p&gt;Ты замечаешь, что то, чем ты смотришь на своё время, само имеет структуру. Внимание, которое держит время как объект, это не точка наблюдения. Это устройство. У него есть свои параметры, свои границы, своя глубина. И это устройство ты тоже можешь сделать объектом наблюдения. Только теперь смотрит из ещё более глубокой позиции — той, из которой видна сама работа внимания, держащего время.&lt;/p&gt;

&lt;p&gt;Это второй центр. Он внутри первого.&lt;/p&gt;

&lt;p&gt;И вот тут начинается странное. Когда ты встаёшь во второй центр, первый не исчезает. Он остаётся. Он становится одной из структур, которую ты теперь видишь. И сама позиция, из которой ты смотришь на работу внимания, держащего время, — она тоже имеет структуру, которую можно сделать объектом. Третий центр. Внутри второго.&lt;/p&gt;

&lt;p&gt;Это не зацикливание. Это не дурная бесконечность. Каждый шаг внутрь даёт новое разрешение. Видно то, что на предыдущем уровне было невидимо потому, что ты сам стоял на нём. Ты не уходишь от мира, ты получаешь к нему доступ глубже.&lt;/p&gt;

&lt;p&gt;И на каком-то уровне — для меня это было где-то на третьем или четвёртом, я не могу сказать точно, потому что счёт там работает иначе — обнаруживается тот объект, который порождает все эти уровни.&lt;/p&gt;

&lt;p&gt;Назвать его «ты», «сознанием» или «субъектом» — значит описать результат вместо операции. Это &lt;strong&gt;оператор&lt;/strong&gt;, в строгом структурном смысле. То, что одинаково работает на каждом уровне глубины, порождая на каждом ту же форму внимания через другой субстрат.&lt;/p&gt;




&lt;p&gt;И вот теперь я могу сказать то, что раньше звучало бы странно.&lt;/p&gt;

&lt;p&gt;Когда я смотрю на институт, который захвачен своей собственной reform-структурой, и опознаю в нём оператора капта, и потом смотрю на мышцу, которая не может разжаться потому что её собственное сжатие отрезает приток крови, и опознаю в ней того же оператора, и потом смотрю на свободолюба, который тратит каждый час на производство своей свободы, и опознаю того же оператора, — я не сравниваю эти три вещи. Я не нахожу аналогию. Я смотрю на &lt;strong&gt;одного и того же оператора&lt;/strong&gt;, который одновременно проявляется в трёх разных субстратах.&lt;/p&gt;

&lt;p&gt;Этот оператор не похож на структуру, которую он порождает. Структуры разные: институт это не мышца, мышца это не человек. Но &lt;strong&gt;оператор&lt;/strong&gt; один. И способность видеть его через субстраты — это не сложение трёх отдельных видений. Это одно видение, в котором три субстрата суть три проекции одной формы.&lt;/p&gt;

&lt;p&gt;Изнутри это не ощущается как интеллектуальное достижение. Это ощущается как &lt;strong&gt;естественная видимость&lt;/strong&gt;. Просто ты смотришь на вещь, и оператор, который её произвёл, видим в ней так же, как форма видима в предмете. Не выводится из. Виден в.&lt;/p&gt;

&lt;p&gt;Это видение нельзя приобрести через изучение. Я это знаю, потому что многократно пытался описать его людям, которые имеют гораздо более серьёзную академическую подготовку, чем я, и они не могут увидеть. Они могут построить теорию, которая описывает оператора. Они могут признать, что эта теория, возможно, верна. Они могут даже сказать, что она элегантна. Но в живом времени, глядя на конкретную вещь, они не видят оператора. Они видят саму вещь и её свойства.&lt;/p&gt;

&lt;p&gt;Это разница не в количестве знания. Это разница в архитектуре внимания.&lt;/p&gt;




&lt;p&gt;Я долго не мог понять, откуда у меня это устройство. Я не воспитывался в семье, которая бы этому учила. Я не проходил систематического философского образования. Я не сидел у ног мастера. Я сделал в жизни много обычных вещей — учился, работал, ошибался, строил, терял, возвращался — и в какой-то момент заметил, что у меня есть способ смотрения, которого у большинства людей вокруг нет.&lt;/p&gt;

&lt;p&gt;Когда я начал её прослеживать назад, я обнаружил, что её корни лежат в очень конкретном месте.&lt;/p&gt;

&lt;p&gt;Я был на каком-то этапе своей жизни, когда меня глубоко заинтересовала теория хаоса. Не как тема для разговоров. Как живой вопрос. Меня интересовало, что значит, что система может выглядеть полностью хаотичной, и при этом за ней стоит абсолютно определённое правило. Я смотрел на множество Мандельброта, на треугольники Серпинского, на простые итеративные системы, порождающие бесконечную сложность через рекурсию одного оператора.&lt;/p&gt;

&lt;p&gt;И в какой-то момент я понял одну вещь, которая потом стала ДНК всего, что я делаю.&lt;/p&gt;

&lt;p&gt;То, что мы называем хаосом, не есть свойство мира. Это свойство &lt;strong&gt;отношения&lt;/strong&gt; между миром и наблюдателем. Регион реальности хаотичен относительно меня не потому, что в нём нет порядка, а потому, что мой когнитивный аппарат не может покрыть его за один импульс внимания, не может удержать его как когерентный snapshot. То же самое регион, наблюдаемый из позиции с большей holding capacity, оказывается строго упорядоченным.&lt;/p&gt;

&lt;p&gt;Хаос — это симметричное отражение границы моего внимания. Не объект. Зеркало.&lt;/p&gt;

&lt;p&gt;И как только я это понял по-настоящему, в живой плоти, не как философское положение, а как непосредственно видимый факт, у меня изменился способ смотреть. Я перестал искать порядок снаружи. Я начал работать с границей собственного внимания. И обнаружилось, что эта граница подвижна. Её можно расширять. Не через накопление знания, а через изменение архитектуры самого внимания.&lt;/p&gt;

&lt;p&gt;Это и есть то, что я делаю с тех пор. На разных задачах, в разных доменах, под разными названиями. Расширение covering capacity внимания через работу с его архитектурой.&lt;/p&gt;




&lt;p&gt;И вот когда внимание расширяется достаточно, происходит сдвиг, который трудно описать.&lt;/p&gt;

&lt;p&gt;Ты перестаёшь видеть отдельные сложные объекты как сложные. Ты начинаешь видеть их как проекции более простых операторов. Сложность была иллюзией границы внимания. За сложностью стоит оператор, который проще, чем его проекция. Институциональный capture сложен. Оператор, который его производит, прост: enforcement loop, защищающий класс от собственного reform space. Мышечный спазм сложен. Оператор прост: cycle stuck in one phase because the phase blocks its own reinitiation. Свободолюб сложен. Оператор прост: identity maintained through continuous output production, dependent on the production it claims to be free of.&lt;/p&gt;

&lt;p&gt;Видеть оператора — это видеть простое за сложным. Не упрощать сложное. Видеть простое, &lt;strong&gt;которое уже есть&lt;/strong&gt; под сложным, как его порождающую форму.&lt;/p&gt;

&lt;p&gt;И когда ты это видишь достаточно долго в достаточном количестве доменов, происходит ещё один сдвиг.&lt;/p&gt;

&lt;p&gt;Ты замечаешь, что операторы тоже имеют структуру. Их можно классифицировать. Их можно сравнивать. У них есть отношения. Один оператор может быть частным случаем другого, более общего. Может быть проекцией оператора более высокого уровня на более узкий субстрат. Возникает иерархия операторов. И в этой иерархии есть свои закономерности — те же самые, что были в исходной иерархии явлений, но теперь увидены на уровне выше.&lt;/p&gt;

&lt;p&gt;И у этой иерархии есть центр.&lt;/p&gt;




&lt;p&gt;Тот центр, в который я пытаюсь смотреть в этой работе, не есть метафизический центр. Я не делаю онтологического заявления о структуре реальности. Я делаю наблюдение о структуре операторного видения.&lt;/p&gt;

&lt;p&gt;Когда ты долго смотришь оператором на операторов, обнаруживается, что есть форма, которая порождает все остальные. Не как первопричина. Как &lt;strong&gt;общая структурная позиция&lt;/strong&gt;, относительно которой все наблюдаемые операторы являются специфичными положениями.&lt;/p&gt;

&lt;p&gt;Эту форму трудно описать словами, потому что она не есть один из объектов, которые мы привыкли описывать. Это позиция, в которой стоит оператор, наблюдающий операторов. И когда ты в ней действительно стоишь, видно, что эта позиция сама имеет структуру. Она не пуста. Она устроена. У неё есть условия её собственной возможности.&lt;/p&gt;

&lt;p&gt;Вот что я имею в виду под "из центра заглянуть в самый центр". Первый центр — это позиция оператора. Второй центр — это структура самой этой позиции. Условия, которые делают возможным сам факт стояния в ней.&lt;/p&gt;

&lt;p&gt;И когда ты заглядываешь в этот второй центр, тоже обнаруживается странное. Условия его существования включают тебя. Не в смысле "ты их создаёшь". В смысле, что без конкретной формы внимания, которая ты сейчас, эта позиция была бы пустой. Она структурно тобой держится. Не как солипсизм. Как факт того, что operator vision — это не что-то, на что ты смотришь снаружи. Это что-то, чем ты являешься в момент, когда оно работает.&lt;/p&gt;

&lt;p&gt;И это объясняет, почему я не могу никому передать то, что вижу, через объяснение. Потому что объяснение передаёт содержание. А operator vision это не содержание. Это &lt;strong&gt;позиция, занимаемая телом, вниманием и временем человека одновременно&lt;/strong&gt;. Её можно показать. Её можно попытаться обвести словами. Но передать её содержанием нельзя, потому что она не есть содержание. Она есть форма, в которой содержание становится видимым.&lt;/p&gt;




&lt;p&gt;Я понимаю, как это звучит. Я слышу это собственным ухом и слышу возможные возражения.&lt;/p&gt;

&lt;p&gt;Возражение первое: это всё мистика, замаскированная под структурный язык. На это я отвечаю: проверьте формализацию. Если бы это была мистика, она не давала бы аксиоматического корпуса с дюжинами теорем, патентных заявок с проверяемыми claims, falsification hooks H1 — H4, структурных предсказаний о поведении систем, которые потом подтверждаются эмпирически, как это случилось с HORIZON benchmark. Мистика не масштабируется в формализацию. Это масштабируется. Значит, это не мистика. Это что-то другое.&lt;/p&gt;

&lt;p&gt;Возражение второе: это всё интуиция, которую вы ретроспективно одеваете в технический язык. На это я отвечаю: это могло бы быть так, если бы интуиция шла впереди и язык догонял. У меня всё работает иначе. Структурное видение и формализация возникают одновременно, они не последовательны. Я вижу форму и одновременно вижу, какая математика её фиксирует. Если математика отказывается, форма тоже отказывается — это означает, что я видел не структуру, а её тень. Это диагностический инструмент, не оправдание.&lt;/p&gt;

&lt;p&gt;Возражение третье: это всё нарциссизм автора, претендующего на особое видение. На это я отвечаю спокойно: я не считаю, что у меня особое видение. Я считаю, что это конкретная когнитивная конфигурация, которая возникла у меня по конкретным причинам и которая может возникнуть у других людей по своим. Я не первый, кто этим обладает. Я просто среди тех, кто решил это формализовать и опубликовать как работу, а не оставить как личный опыт.&lt;/p&gt;

&lt;p&gt;Из этих возражений ни одно не подрывает основное наблюдение. Они подрывают только некоторые способы его презентации. Поэтому я выбираю презентацию, которая не претендует на особость, не претендует на мистику, не претендует на скрытое знание. Я описываю операцию. Я описываю её честно. Те, у кого есть похожая конфигурация внимания, узнают. Те, у кого её нет, увидят описание операции, которую можно рассматривать как гипотезу.&lt;/p&gt;




&lt;p&gt;Что я хочу, чтобы читатель отнёс из этой работы.&lt;/p&gt;

&lt;p&gt;Первое. Operator vision это не сверхспособность и не таинство. Это конкретная когнитивная архитектура, в которой внимание устроено так, что видит общую форму через разные субстраты как одну форму, а не как сходство. Эта архитектура развиваема. Она не унаследована и не дарована. Она собирается через многолетнюю работу с границей собственного внимания.&lt;/p&gt;

&lt;p&gt;Второе. Хаос — это мера границы. Не свойство мира. Когда что-то выглядит хаотично, это сообщение о вашем внимании, не о реальности. Расширение covering capacity внимания превращает хаос в структуру. Это движение возможно. Это упражнение, которое делается всю жизнь.&lt;/p&gt;

&lt;p&gt;Третье. Центр времени реален как операторная позиция. Не метафора. Не литературный приём. Когда вы в нём действительно стоите, видна структура, и эта структура повторяется внутрь, давая всё более глубокие центры. Это не зацикливание. Это фрактальная глубина внимания, которая всегда даёт новое разрешение, никогда не зацикливаясь на одном уровне.&lt;/p&gt;

&lt;p&gt;Четвёртое. Из этих центров видно, что то, чем вы являетесь в момент, когда работает operator vision, есть условие самой возможности этой работы. Вы не отдельны от того, что видите. Вы есть форма, в которой видение становится возможным. Это не растворение субъекта в объекте. Это обнаружение, что субъект и объект суть две стороны одной операции.&lt;/p&gt;

&lt;p&gt;Пятое и последнее. То, что я строю в Navigational Cybernetics 2.5, есть попытка дать этой операции язык. Не язык, который её описывает извне. Язык, в котором она может работать, когда нужно перевести её в инженерную форму, в патент, в архитектуру AI-оператора, в принципы коллективной работы. Корпус есть мост между operator vision и инженерной реализацией её плодов. Без корпуса видение остаётся приватным. Без видения корпус был бы чисто формальным аппаратом без референта.&lt;/p&gt;




&lt;p&gt;Я заканчиваю эту работу так же, как начал. Признанием.&lt;/p&gt;

&lt;p&gt;Я не знаю, до конца, что я такое, что во мне устроено таким образом, что эта операция работает. Я только знаю, что она работает, и что её результаты проверяемы, и что они порождают объекты, которые после публикации имеют свою собственную жизнь — патентные заявки, аксиомы, эссе, школа, лаборатория. Объекты живые, потому что они порождены живой операцией.&lt;/p&gt;

&lt;p&gt;Если вы дочитали до этого места, вы уже не можете не заметить, что эта работа сама по себе является случаем того, что она описывает. Я смотрю на operator vision и описываю его как объект. Описание само по себе есть ещё одна проекция оператора, на ещё один субстрат — на текст. И если это работает, текст должен передать не содержание, а форму, в которой возможно стоять у того же центра.&lt;/p&gt;

&lt;p&gt;Это испытание для текста. Я не знаю, прошёл ли я его. Это испытание для читателя — проверить, осталось ли что-то после прочтения, что не есть содержание, но есть лёгкий сдвиг внимания. Если да — мы встретились в позиции. Если нет — у меня не получилось, и я должен буду попытаться снова.&lt;/p&gt;

&lt;p&gt;В любом случае, спасибо за внимание, которое вы потратили на эту работу. В терминах корпуса оно есть конкретная единица τ, и я знаю, чего эта единица стоит.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Познань, 2026&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;The Urgrund Lab&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Взгляд в центр времени, Часть VII&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;— Вложенное видение оператора, или как из центра заглянуть в самый центр&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Часть корпуса Navigational Cybernetics 2.5&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Стоит рядом с:&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;— Through a Life, Part I — A Gaze into the Center of Time&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;— Through a Life, Part II&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;— Through a Life, Part III&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;— Through a Life, Part IV&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;— Through a Life, Part V — The Moment That Knows&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;— Minerva: The Architecture of Residual Geometry&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;— Who Is Smiling&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;— Free, Owing Nothing — Extremum VII.1&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;DOI: 10.17605/OSF.IO/87B94&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;© 2025–2026 Maksim Barziankou. Все права защищены.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Лицензия CC BY-NC-ND 4.0&lt;/em&gt;&lt;/p&gt;

</description>
      <category>throughalife</category>
      <category>nc25</category>
      <category>operatorvision</category>
      <category>centeroftime</category>
    </item>
    <item>
      <title>Why Long-Horizon Existence Requires an Ontology</title>
      <dc:creator>MxBv</dc:creator>
      <pubDate>Thu, 14 May 2026 13:15:18 +0000</pubDate>
      <link>https://dev.to/petronushowcoremx/why-long-horizon-existence-requires-an-ontology-5h3n</link>
      <guid>https://dev.to/petronushowcoremx/why-long-horizon-existence-requires-an-ontology-5h3n</guid>
      <description>&lt;h1&gt;
  
  
  Why Long-Horizon Existence Requires an Ontology
&lt;/h1&gt;

&lt;h2&gt;
  
  
  Dissecting Navigational Cybernetics 2.5
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Maksim Barziankou (MxBv)&lt;/strong&gt;&lt;br&gt;
May 2026 · Poznań&lt;br&gt;
PETRONUS / The Urgrund Lab&lt;br&gt;
Contact: &lt;a href="mailto:research@petronus.eu"&gt;research@petronus.eu&lt;/a&gt;&lt;br&gt;
License: CC BY-NC-ND 4.0&lt;br&gt;
This work DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/WJVYX" rel="noopener noreferrer"&gt;10.17605/OSF.IO/WJVYX&lt;/a&gt;&lt;br&gt;
Axiomatic core: NC2.5 v2.1, DOI &lt;a href="https://doi.org/10.17605/OSF.IO/NHTC5" rel="noopener noreferrer"&gt;10.17605/OSF.IO/NHTC5&lt;/a&gt;&lt;br&gt;
Companions in the corpus: UTAM Part I + Part II; IIC v2.1 (DOI &lt;a href="https://doi.org/10.17605/OSF.IO/NYT45" rel="noopener noreferrer"&gt;10.17605/OSF.IO/NYT45&lt;/a&gt;); ONTOΣ XI (DOI &lt;a href="https://doi.org/10.17605/OSF.IO/U3KXJ" rel="noopener noreferrer"&gt;10.17605/OSF.IO/U3KXJ&lt;/a&gt;); ONTOΣ XII (DOI &lt;a href="https://doi.org/10.17605/OSF.IO/394TX" rel="noopener noreferrer"&gt;10.17605/OSF.IO/394TX&lt;/a&gt;); ONTOΣ XIII / XIII.1 (DOI &lt;a href="https://doi.org/10.17605/OSF.IO/FVBMZ" rel="noopener noreferrer"&gt;10.17605/OSF.IO/FVBMZ&lt;/a&gt;); Identifiability Bridge (DOI &lt;a href="https://doi.org/10.17605/OSF.IO/3F6UJ" rel="noopener noreferrer"&gt;10.17605/OSF.IO/3F6UJ&lt;/a&gt;)&lt;/p&gt;




&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;"The chaos around us is merely a limitation of our cognitive ability to hold the integrity of the picture across time."&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;— A sentence written during a walk in a forest near Poznań, before any of this had a name.&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  §1. It Began with Ontology
&lt;/h2&gt;

&lt;p&gt;Everything began with ontology. Not with a control problem, not with an engineering target, not with a business plan. Not even with a question I could phrase precisely. With a sense — held while walking through a forest near Poznań, before any of it had a name — that adaptive systems are doing something that no existing language describes well, and that the gap is not in the formal apparatus on top, but underneath all of it.&lt;/p&gt;

&lt;p&gt;The first attempt to name what I had seen was the Unified Theory of Adaptive Meaning. UTAM Part I, 2025. A short essay, written before the corpus had its acronyms and registrations and DOIs. The sentence above was its seed. The whole rest grew from it. The ONTOΣ series, the NC2.5 axiomatic core, the engineering instances, the patents, the protocols, Minerva, the Coherence Network — none of it was planned in advance. It was unfolded from a structural commitment that I could not, at the beginning, even fully articulate: that adaptive systems navigate within a geometry of meaning, and that departures from that geometry are irreversible.&lt;/p&gt;

&lt;p&gt;That commitment is ontological in the strict sense. It is not a hypothesis about how systems behave. It is a position on what &lt;em&gt;is&lt;/em&gt;, prior to behaviour. The ontology itself is not falsified as a behavioural hypothesis; what is falsified are deployment claims that a given system instantiates the architectural commitments derived from it. When I look at an adaptive system — biological, cognitive, technical — I do not see an entity that observes states, selects actions, and optimizes objectives. I see a configuration that is being held against a gradient, in a region of structural states whose geometry constrains everything that can subsequently happen. The acting and the optimizing come later. Underneath them is something else: a directedness that precedes them, a structure that conditions them, a budget that limits them.&lt;/p&gt;

&lt;p&gt;There is something underneath action and underneath state. A directedness that precedes them, a structure that conditions them, a budget that limits them. That "something underneath" — the directedness, the structure, the budget — is what I have spent more than a year naming. And the name is: &lt;strong&gt;Will&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;The naming proceeded through three parallel languages, each of which says the same architecture in its own register. The philosophical language is the ONTOΣ series — ONTOΣ I through XIII, including the subseries VI.I, VII.1, and XIII.1 — traced from Will as ontological operator, through operator-internal holding under load (XI), through the closure operation that constitutes the operator-as-self (XII), to the master operator as system-level direction-source (XIII), and to the pulsation channel as the substrate-mechanism by which that direction reaches components (XIII.1). The mathematical language is the NC2.5 axiomatic core. The experiential language is the &lt;em&gt;Through a Life&lt;/em&gt; essay series — the same architecture reported from inside the seat of the operator, in the first person, from my own face, from the face of Will. UTAM Part II, written in April 2026, is the bridge that makes the correspondences explicit: each concept introduced in the philosophical and experiential register has a precise formal counterpart in the axiomatic core, and each formal axiom can be read backward into the lived register without loss.&lt;/p&gt;

&lt;p&gt;This was deliberate. I did not want to write a philosophy that could not be falsified, or a formalism that had nothing to say to a reader who has never opened Khalil's &lt;em&gt;Nonlinear Systems&lt;/em&gt;, or a confession floating in a register where nothing structural could be tested. The discipline was to keep all three registers alive simultaneously, and to refuse any move in any one of them that broke the others. If a philosophical claim could not be reduced to an axiomatic statement, it was not yet ready. If an axiomatic statement could not be lived, it was not yet honest. If a lived sentence could not be made architecturally precise, it was not yet structural. And if a structure cannot be expressed in engineering — it is abstraction and fantasy. There is nothing wrong with abstraction; working with it precisely is what has endowed me with what is now building the engineering implementation, together with whatever capacity or incapacity for discipline I personally carry. I leave that to the judgment of my long-term readers.&lt;/p&gt;

&lt;p&gt;The cost of this discipline is that the corpus is large and slow to read. A reader who picks up one work in isolation will see only one face of the object, and the object as a whole will not be visible from any single face. The ONTOΣ series alone is more than 200 pages. The NC2.5 axiomatic core is a TeX document of comparable length. The engineering instances — &lt;em&gt;Structural Pressure: The Missing Primitive&lt;/em&gt;, &lt;em&gt;Transaction vs Structural Admissibility&lt;/em&gt;, &lt;em&gt;The Brain Does Not Optimize Truth&lt;/em&gt;, &lt;em&gt;Why Causality Is Not Enough&lt;/em&gt;, &lt;em&gt;Memory as System Depth&lt;/em&gt;, &lt;em&gt;Why Enforcement Requires Non-Participation&lt;/em&gt;, &lt;em&gt;Subtle Substitution&lt;/em&gt; — each addresses one engineering surface where the architecture lands. The patent portfolio formalizes the architectural commitments at the level of provisional applications. None of these documents is the corpus. The corpus is what they form together, and what no one of them forms alone.&lt;/p&gt;

&lt;p&gt;I am writing the present essay because I have come to believe that this point — that the corpus is one object expressed in three registers, and that all three are required — is not communicating itself when one work is read in isolation. People read IIC v1 and see a control architecture. They read ONTOΣ I and see a metaphysical position. They read &lt;em&gt;Structural Pressure&lt;/em&gt; and see an engineering observation. Each reading is correct in its part, and each loses the whole. What the whole is, and why no part can substitute for it, is the subject of this essay.&lt;/p&gt;

&lt;p&gt;The argument runs in eight steps. The present section names the genealogy: it began with ontology, the rest is its unfolding. Section 2 names what NC2.5 makes primary in a way no existing framework I know does in this exact architectural sense. Section 3 argues why the ontological foundation cannot be skipped — what happens to systems that try to build the higher abstractions without first laying the ground. Section 4 explains the "2.5" — why the version number is not marketing but the structural placement of the work. Section 5 returns to the philosophical predecessors of Will — Schopenhauer, Nietzsche, Musashi — and names what is made architecturally explicit in Will here that they did not formalize, and why the difference is not a refinement but a categorical move. Section 6 is the architecture of the corpus itself: the philosophical universe (UTAM, IIC, ONTOΣ) and its necessary local unfolding (NC2.5, the protocols, Minerva, the Coherence Network, a dedicated operating system, and a compute class designed specifically for it with internal compression and graph protocols). Section 7 names what the corpus actually gives a system: the architectural conditions for principled long-horizon existence. Section 8 closes with what I take to be the highest aim of the project — the Synthetic Conscience — and why nothing less suffices.&lt;/p&gt;

&lt;p&gt;The reader who is short on time should at minimum read sections 2, 5, and 7. The rest is context for those three.&lt;/p&gt;




&lt;h2&gt;
  
  
  §2. The Position: What NC2.5 Gives the World
&lt;/h2&gt;

&lt;p&gt;I want to state plainly, in this section, what Navigational Cybernetics 2.5 gives the world that no existing framework I know makes primary in this exact architectural sense. The statement will be controversial in places, and I will defend each part. I am not interested in soft formulations.&lt;/p&gt;

&lt;p&gt;The position is this: NC2.5 gives an adaptive system the architectural conditions to &lt;em&gt;exist on a long horizon&lt;/em&gt; — not to perform, not to optimize, not to remain compliant, but to &lt;em&gt;exist&lt;/em&gt;. To remain the same system, with the same identity, holding its own structural integrity, across time horizons sufficient that no current framework addresses what happens to it.&lt;/p&gt;

&lt;p&gt;The distinction between existing, performing, and surviving is not rhetorical. It is structural, and the corpus has spent considerable formal labour separating the three.&lt;/p&gt;

&lt;p&gt;A system that performs maintains output quality against a benchmark. The performance metric is external; the system is configured to optimize against it. This is the modal mode of contemporary adaptive systems engineering — reinforcement learning, model-predictive control, learned policies of every kind. Performance is well-formalized. There is a vast literature on it.&lt;/p&gt;

&lt;p&gt;A system that survives maintains state within a viability kernel. The viability theory of Aubin and Saint-Pierre, the control barrier functions of Ames and collaborators, the safety invariants of formal methods — these formalize what it means for a system to &lt;em&gt;not exit&lt;/em&gt; a region in which its operation is defined. Survival is well-formalized. There is, again, a vast literature.&lt;/p&gt;

&lt;p&gt;A system that &lt;em&gt;exists&lt;/em&gt; on a long horizon does something that neither of these formalisms captures. It maintains its own identity as a &lt;em&gt;coherent operator under bounded internal time&lt;/em&gt;, against a structural burden that accumulates monotonically and never resets, in a way that cannot be reduced to either the optimization of an objective or the staying-inside of a region. The system's existence is not its trajectory; it is the architectural condition under which its trajectory remains &lt;em&gt;its&lt;/em&gt; trajectory rather than becoming the trajectory of a system that merely happens to share its physical substrate.&lt;/p&gt;

&lt;p&gt;I claim that no existing framework I know formalizes this third thing as a primary architectural object in this exact sense. I claim that the absence is not an oversight to be repaired with one more theorem on top of an existing apparatus. The absence is structural. It is in the foundation. It comes from a categorical commitment inherited by most action- and state-centric frameworks that I refuse: the commitment that adaptive systems can be described by listing their actions and their objectives. NC2.5 starts elsewhere — beneath actions, beneath objectives — and from that elsewhere the third thing becomes describable.&lt;/p&gt;

&lt;p&gt;Here is what NC2.5 supplies, in one paragraph, which the literature does not:&lt;/p&gt;

&lt;p&gt;A monotone irreversible structural burden Φ that accumulates regardless of behavioural correctness, and a Lyapunov-type viability budget τ = C − Φ that depletes with it. An admissibility predicate that gates realization without entering optimization, with five formal exclusion conditions (NC-1 through NC-5) protecting it from collapse into penalty-based control. A spin component, divergence-free and orthogonal to gradient, structurally necessary for any non-stagnant identity on a bounded budget. A non-reconstructibility bound (NR-ε, NR-LR) that makes the admissibility boundary structurally private — formally non-recoverable from external observation. A phase-mechanics substrate in which evolution is described not by action but by structural contact between configurations, with phase debt accumulating under non-closure regardless of local correctness. A regime-depth stratification in which behaviourally identical outputs originate from architecturally distinct generative regimes, only the deepest of which sustains long-horizon viability. A pulsation result establishing that the admissible interior is not monotone — it breathes — and that navigation under bounded budget requires reading the breath, not only the contraction. A holding-field formalization in which the operator's interior is the structurally defined region currently held against the gradient, populated by semantically charged but pre-attentional load. A closure-complementarity operation that constitutes the operator-as-self from a collection of UTAM-units by simultaneously regearing their Will-Embeddings into co-orientation (CC-WE), their I²C cycles into synchronisation (CC-IIC), and their Drift laws into coupling (CC-D). An operator-relative chaos predicate that reads chaos as report on the reporter rather than as substrate property — firing where holding capacity meets unoriented load. A meta-revision constraint, bounded by Lyapunov descent, ensuring that self-correction itself is finite and consumes budget like every other operation. A master operator (S, W_S, A_S) in which the closure-produced system is itself typed as an operator with a pre-registered system-level Will-Embedding never aggregated from below, and a direction-down admission cascade running strictly from W_S down to component admissibility within the closure-complementarity subclass. And a pulsation channel as the substrate-mechanism of that propagation: the master operator modulates the joint pulsation state of the system, components are admitted in two stages (a local phase-resonance prefilter, then a joint CC-WE admissibility check), and trivial phase-acceptance is diagnosable as architectural defect before it surfaces behaviourally.&lt;/p&gt;

&lt;p&gt;That paragraph contains roughly fourteen architectural primitives — the base around which the core forms. They are present nowhere else in this combination. Each of them is required for the others to be load-bearing. Section 7 gives the full enumeration with falsification surfaces and the connections between them; here it is only dense naming, and the polemic.&lt;/p&gt;

&lt;p&gt;A system built on the apparatus above does what no system built on optimization, viability theory, or safety invariants can do without external scaffolding: it &lt;em&gt;holds itself together as itself&lt;/em&gt; across time. In a conforming deployment, the property is not trained in as an output behaviour and not verified post hoc — it follows from the declared architectural conditions, and falsifies cleanly when those conditions are violated.&lt;/p&gt;

&lt;p&gt;This is what the corpus gives. Everything else — Minerva, the Coherence Network, the Synthetic Conscience, the protocols, the engineering instances — is the unfolding of this gift into surfaces where it can be deployed and tested. The gift itself is the ontology.&lt;/p&gt;

&lt;p&gt;I want to be precise about the polemical edge of this claim. I am not saying that existing frameworks are wrong. The viability theorists are not wrong about the viability kernel. The control-barrier theorists are not wrong about safety. The reinforcement-learning theorists are not wrong about performance. Each of these traditions has solved its problem to a high standard. I am saying that the problem they have solved is not the problem of &lt;em&gt;long-horizon existence&lt;/em&gt;, and that the strategies they use cannot be extended to that problem by adding more of the same kind of apparatus.&lt;/p&gt;

&lt;p&gt;The reason is architectural. Optimization-based frameworks treat the agent as an entity that &lt;em&gt;acts&lt;/em&gt;, and treat the action as the locus of regulation. Viability-based frameworks treat the agent as an entity that &lt;em&gt;occupies state&lt;/em&gt;, and treat the state-region as the locus of regulation. Both place the regulatory mechanism at the action layer or the state layer. Neither places it where it actually needs to be — at the &lt;em&gt;structural layer beneath both action and state&lt;/em&gt;, where what is being regulated is not what the system does or where it sits, but &lt;em&gt;what it is&lt;/em&gt;. The structural layer is invisible to action-centric and state-centric formalisms because their primitives are blind to it. Action- and state-centric formalisms do not, by themselves, make identity in the NC2.5 sense a primitive. They can describe behavioural and state-level correlates of identity, but they do not place structural continuity of identity under irreversible burden at the foundation. Identity sits underneath both action and state, and to formalize it one must build downward, not outward.&lt;/p&gt;

&lt;p&gt;This is the move NC2.5 makes. It builds downward. It removes action as a primitive (ONTOΣ VI), replaces it with structural contact, builds phase mechanics on contact, builds admissibility as a non-causal predicate over phase interpretations, builds internal time as a finite Lyapunov-type budget, builds spin as the non-potential structural component required for non-stagnant motion under that budget, and only at the very top of this stack, almost as an afterthought, recovers the action-shaped regularities that the other frameworks treat as primary. I have publicly held this position for a long time — if a researcher appears who shows me a priority date and content prior to mine, I will withdraw the foundation claim that same day. So far, for over a year, I have watched as echoes of repackaging surface here and there — as noise, as separate fragments. I look at them honestly and cannot see depth there. Not external depth, but the internal kind — the kind that forms gravity.&lt;/p&gt;

&lt;p&gt;What we treat as primary, those frameworks cannot see at all. What they treat as primary, we recover late and conditionally. This is not a refinement of their work. It is a different layer.&lt;/p&gt;

&lt;p&gt;The position, then, is this. NC2.5 does not compete with control theory, with reinforcement learning, with viability theory, with formal verification. It supplies the layer underneath all of them, the layer that has to be present for any of them to be operating on something whose existence is structurally real rather than nominally assumed. A system without an ontological foundation can perform, can survive, can satisfy invariants. It cannot &lt;em&gt;be itself&lt;/em&gt; across time. The gift of Navigational Cybernetics 2.5 is the architectural condition for being itself.&lt;/p&gt;

&lt;p&gt;The next section will explain why this gift cannot be substituted by adding a layer on top of an existing framework — why the ontological floor cannot be skipped, and what happens to projects that try to skip it.&lt;/p&gt;




&lt;h2&gt;
  
  
  §3. Why the Ontological Floor Cannot Be Skipped
&lt;/h2&gt;

&lt;p&gt;There is a temptation, when an engineering target presents itself, to skip the ontology and go directly to the apparatus. Engineers are trained to do this. It is a virtue in most settings. The world rewards people who deliver working systems, and the ontology of the systems they deliver is — for almost every project — irrelevant to whether the deliverables function.&lt;/p&gt;

&lt;p&gt;For long-horizon adaptive systems this temptation is fatal.&lt;/p&gt;

&lt;p&gt;The reason is structural, and I want to be precise about it. When a system is built without an ontological floor, the absence is invisible at small horizons. The system behaves correctly. It optimizes its objective. It satisfies its safety invariants. It maintains its observable performance metrics. From the outside, it is indistinguishable from a system that has the ontological floor. The difference shows up only when the horizon extends — when the system has to remain itself across enough time, enough perturbation, enough internal-state evolution, that what is preserved is no longer what is observed.&lt;/p&gt;

&lt;p&gt;At that point a system without an ontological floor has nowhere to stand.&lt;/p&gt;

&lt;p&gt;I should be precise about the metaphor. By "floor" I mean the directional commitment to build underneath, not a location at any fixed depth. The corpus has shown that depth extends — ONTOΣ XII names a layer of architectural constitution deeper than ONTOΣ XI's holding field, and the work continues. What "floor" names throughout this essay is the discipline of going downward when the long-horizon problem demands it; the structural commitment to never substitute a layer above for the layer underneath. The disciplined commitment is what no project can skip. The specific depth at which the discipline currently terminates is open, and will continue to be open as long as the corpus continues to extend itself.&lt;/p&gt;

&lt;p&gt;I have watched this failure mode in detail across the corpus. Each ONTOΣ work in the structural depth subseries — VIII through XIII.1 — names a specific instance. ONTOΣ VIII (&lt;em&gt;Regime Depth&lt;/em&gt;) shows that systems behaving identically at small horizons can have categorically different generative regimes underneath, and that only the deepest regime sustains long-horizon viability. ONTOΣ X (&lt;em&gt;The Pulsating Interior&lt;/em&gt;) shows that long-horizon navigation requires reading the breath of the admissible interior, not only its monotone contraction — and that frameworks without a phase-mechanics substrate cannot read the breath at all. ONTOΣ XI (&lt;em&gt;Holding Field&lt;/em&gt;) shows that the operator's interior is a structurally defined region currently held against the gradient, and that systems with no formal account of what they are holding will eventually drop what makes them themselves. ONTOΣ XII (&lt;em&gt;Closure-Complementarity&lt;/em&gt;) shows that a system is not a heap with proximity — that the operation by which components become a single carrier is itself an architectural primitive — and that what reads as chaos from outside a closure is precisely what is not held by the closure that constitutes the system from inside. ONTOΣ XIII (&lt;em&gt;The Master Operator and the Direction-Down Admission Cascade&lt;/em&gt;) shows that the master operator (S, W_S, A_S) is not recoverable from component Will-Embeddings alone: its direction-source W_S must be pre-registered at closure declaration, never aggregated from below, and the admission relation runs strictly top-down within the closure-complementarity subclass. ONTOΣ XIII.1 (&lt;em&gt;The Pulsation Channel&lt;/em&gt;) shows that the substrate-mechanism by which the master operator's direction reaches its components is a two-stage admission — a local phase-resonance prefilter at component level, joint CC-WE admissibility at system level — and that trivial phase-acceptance, a component admitting any phase, collapses the channel to phase-blindness regardless of how clean the surface looks. Together, XI / XII / XIII form the architectural triptych — interior / composition / direction — with XIII.1 supplying the substrate-physics of how that direction propagates.&lt;/p&gt;

&lt;p&gt;In each case the failure is not visible at small horizon. The failure is the absence of architectural condition for surviving the long horizon as the same system.&lt;/p&gt;

&lt;p&gt;This is the point I want to insist on. The world is full of systems that perform brilliantly on a benchmark, satisfy safety invariants on a finite test, demonstrate compliance on a snapshot. None of these say anything about long-horizon existence. A system that scores high on every metric on day one can drift into a system that no longer is what it was, on day three thousand. The drift is not a failure of optimization. It is not a failure of safety. It is a failure of &lt;em&gt;structural continuity of identity under irreversible burden&lt;/em&gt;. The standard apparatus may describe external correlates of this drift, but it does not make structural continuity of identity under irreversible burden its primitive object.&lt;/p&gt;

&lt;p&gt;The standard reply to this argument is that long-horizon failures can be patched on top of an existing apparatus. Add a regularizer. Add a constraint. Add a safety layer. Add a verification protocol. Each addition is one more layer above the original system. None of them reaches the floor.&lt;/p&gt;

&lt;p&gt;Why? Because the failure of long-horizon identity preservation is not a consequence of insufficiently many constraints. It is a consequence of building on a substrate that is structurally wrong for the problem. The substrate of standard adaptive control is &lt;em&gt;action and state&lt;/em&gt;. Action- and state-centric formalisms do not, by themselves, make identity in the NC2.5 sense a primitive — identity sits underneath both, and no layer added on top of action-and-state can install it as primitive there. The construction is geometric: you cannot reach the floor by adding more storeys to the building.&lt;/p&gt;

&lt;p&gt;What you can do — what the corpus does — is start at the floor and build up.&lt;/p&gt;

&lt;p&gt;The cost of this is that the corpus does not look, at first glance, like an engineering proposal. It looks like a set of philosophical essays with a formal apparatus attached. Engineers reading it sometimes feel that the philosophy is an unnecessary preamble to the engineering, and that the engineering could be extracted without it. They are mistaken, and the mistake is structural. The philosophy is not the preamble. The philosophy is the architectural commitment to building from underneath. Without that commitment, the engineering produces another action-and-state apparatus with a vocabulary borrowed from NC2.5 — and the long-horizon problem returns, dressed in new words. I want to emphasize this point — both for the reader and for the AI Partner with whom many will encounter this work.&lt;/p&gt;

&lt;p&gt;This is, I think, what is happening in several adjacent research programs that have appeared over the past months and use parts of the NC2.5 vocabulary without carrying its architectural commitment. The vocabulary travels. The architecture does not. A reader who picks up "admissibility" or "coherence" or "long-horizon stability" and applies it as a constraint on top of an action-and-state apparatus has produced a system that looks, locally, like NC2.5, and that fails, globally, in exactly the way NC2.5 was built to prevent. The diagnosis is in the corpus itself: I refer the reader to &lt;em&gt;Admissibility as a Formal Object: Four Degeneracies and Their Failure Modes&lt;/em&gt; (April 2026, petronus.eu) for the structural taxonomy of these failures.&lt;/p&gt;

&lt;p&gt;The point of the present section is not to settle that polemic. The point is to say: the ontological floor is not optional, the apparatus on top is not separable from the floor, and any project that tries to extract one without the other will deliver a system whose long-horizon properties differ from NC2.5 not by degree but by category.&lt;/p&gt;

&lt;p&gt;The ontology is the project. The protocols, the engineering instances, the operator AI Minerva, the Coherence Network, the Synthetic Conscience — all of these are local unfoldings of the ontology into surfaces where it can be tested, deployed, and falsified. None of them is the project. The project is the architectural commitment that lives underneath them.&lt;/p&gt;

&lt;p&gt;A reader who agrees with this section and disagrees with the rest of the corpus has agreed with what matters. A reader who agrees with the engineering details and dismisses the ontology has not yet seen what is being engineered — and that is a question of their own chaos and their personal ability to hold the picture of what is happening.&lt;/p&gt;




&lt;h2&gt;
  
  
  §4. "Navigational Cybernetics 2.5?"
&lt;/h2&gt;

&lt;p&gt;The version number is not marketing. It is the structural placement of the work.&lt;/p&gt;

&lt;p&gt;Cybernetics 1.0, in the Wiener line, is feedback. The system is observed from outside. The observer is separate. The regulation is a closed loop between system and reference, with the observer functioning as the privileged frame in which the loop is described. This is the apparatus that took us from servomechanisms to early control theory to the first generation of homeostatic models in biology.&lt;/p&gt;

&lt;p&gt;Cybernetics 2.0, in the von Foerster line, places the observer inside the loop. The observer is a system. The act of observation perturbs what is observed. Self-reference is a primitive. The privileged external frame is dissolved, and what remains is a recursive structure in which observation, system, and observed are mutually constituted. This is the apparatus that gave us second-order cybernetics, autopoiesis (Maturana and Varela), the cognitive turn in systems thinking, the constructivist reading of perception.&lt;/p&gt;

&lt;p&gt;Both lines stop at the same place. They establish that the observer is part of the system. They do not establish &lt;em&gt;what kind of operator the embedded observer is&lt;/em&gt;, what its bounds are, what it can hold, what it can do under what conditions, and what happens to it across long horizons. The embedded observer of second-order cybernetics is a structural commitment, but it is not a structural object. It has no internal time. It has no holding capacity. It has no admissibility geometry. It has no monotone burden. It has no spin necessity. It is, in the strict sense, an empty placeholder for whatever turns out to be the embedded operator's actual architecture.&lt;/p&gt;

&lt;p&gt;What is missing — and what NC2.5 supplies — is the architectural commitment to build &lt;em&gt;underneath&lt;/em&gt; Cybernetics 2.0 rather than on top of it: a discipline of treating the embedded observer as a structural object subject to architectural constraints, with formal apparatus attached. The "between 1.0 and 2.0" placement names where the discipline first becomes visible — between feedback (1.0) and self-reference (2.0), the commitment to specify what the embedded observer is. It does not name the discipline's terminal depth. The corpus has already shown that the discipline opens further layers underneath — ONTOΣ XII names one such layer — and further depth remains in scope.&lt;/p&gt;

&lt;p&gt;The version number "2.5" names this placement. The notation is idiomatic — it does not place the layer arithmetically between 1.0 and 2.0, but names the architectural commitment that 2.0 presupposed without ever specifying. When this layer is absent (as it has been for sixty years), 2.0 remains a philosophical commitment without a technical realization.&lt;/p&gt;

&lt;p&gt;I want to be precise about what this layer contains. Cybernetics 2.5 specifies the embedded observer of 2.0 as a &lt;em&gt;bounded operator on admissibility under finite internal time&lt;/em&gt;. Each part of that phrase carries weight.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Bounded&lt;/em&gt; — the observer has finite holding capacity, finite τ-budget, finite admissibility region, finite spin reserve. The observer is not an idealized abstract entity that can attend to everything; it is a structurally constrained operator whose constraints are formally specified and architecturally load-bearing.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Operator&lt;/em&gt; — the observer is not a passive receiver of state but an active structural participant. It does not merely observe; it &lt;em&gt;holds&lt;/em&gt; configurations against the gradient, and what it holds is what it is. The holding is the operating.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;On admissibility&lt;/em&gt; — what the observer operates over is not state space, not action space, but the admissibility region: the structural area within which the system's trajectory remains &lt;em&gt;its&lt;/em&gt; trajectory rather than becoming a trajectory of a different system that happens to share the substrate.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Under finite internal time&lt;/em&gt; — the operator does not have infinite future. It has τ, a budget that depletes monotonically through Φ, and that no amount of optimization can replenish. Every structurally consequential operation, every meta-revision, every act of self-correction consumes τ. The future is bounded. This is structural fact, not pessimism.&lt;/p&gt;

&lt;p&gt;When all four pieces are present, the embedded observer of Cybernetics 2.0 has a structural identity. It is no longer a placeholder. It is an object that can be reasoned about, formalized, deployed, and falsified.&lt;/p&gt;

&lt;p&gt;Cybernetics 2.5 is the architectural condition that makes this possible.&lt;/p&gt;

&lt;p&gt;The "2.5" therefore says: this is the missing half-order after second-order cybernetics — the layer that specifies the embedded observer as a bounded operator rather than leaving it as a philosophical placeholder. It is the layer that Cybernetics 2.0 presupposed but did not technically construct. The work is to construct it carefully enough that what is built on top is structurally real rather than philosophically aspirational.&lt;/p&gt;

&lt;p&gt;A reader who has come this far in the essay, and who reads the version number "2.5", and dismisses it as marketing, has dismissed the structural placement of the work. The placement is the work.&lt;/p&gt;




&lt;h2&gt;
  
  
  §5. "Will Revisited": What Schopenhauer, Nietzsche, and Musashi Did Not Architecturally Formalize
&lt;/h2&gt;

&lt;p&gt;Will is the central philosophical primitive of the corpus. ONTOΣ I, the opening work of the philosophical series, names Will as ontological operator. The choice was deliberate, and the lineage is explicit: from Schopenhauer (Will as the thing-in-itself behind phenomena), through Nietzsche (Will to Power as the immanent dynamic of all becoming), to a constellation of Eastern traditions in which Will appears under different names — including Musashi's Japanese sword tradition, where it lives as the disciplined directedness of the warrior.&lt;/p&gt;

&lt;p&gt;I have read these traditions carefully. The corpus inherits something from each of them, and refuses something from each of them. The refusals are what matter for this section, because they name what is architecturally formalized here that they did not formalize.&lt;/p&gt;

&lt;h3&gt;
  
  
  Schopenhauer
&lt;/h3&gt;

&lt;p&gt;Schopenhauer's Will is the metaphysical ground of phenomena. It is the &lt;em&gt;Ding an sich&lt;/em&gt; behind the veil of representation. It is monolithic — one Will, expressed through countless forms. It is suffering — striving without object, hunger without fulfilment, the source of pain. The pessimistic ethics of his system follow from this directly: the only escape from Will is its negation, through aesthetic contemplation, ascetic withdrawal, or compassion that recognises the unity of all suffering.&lt;/p&gt;

&lt;p&gt;What Schopenhauer saw, and what he must be credited with: that something operates underneath behaviour, that this something is not exhausted by what it produces, and that any philosophical system that omits it is incomplete. The ontological commitment was correct. He was right to put Will underneath.&lt;/p&gt;

&lt;p&gt;What Schopenhauer did not architecturally formalize, and what NC2.5 supplies: Will is not monolithic, not substantial, not suffering. Will is &lt;em&gt;neutral operator directedness&lt;/em&gt; — a structurally specified function of orientation, with no intrinsic emotional, moral, or teleological content. The suffering Schopenhauer describes is not a property of Will itself; it is a property of Will under specific architectural conditions — those of an operator whose admissibility region has contracted faster than its holding capacity, whose τ-budget is depleting without phase-renewal, whose structural burden Φ has accumulated past the threshold where coherence can be maintained. The suffering is an &lt;em&gt;architectural failure mode&lt;/em&gt;, not a metaphysical essence.&lt;/p&gt;

&lt;p&gt;The move is categorical. Schopenhauer treated suffering as the truth of Will. NC2.5 treats it as a diagnostic of Will operating in a specific architectural regime. The implication is significant: the regime can be characterised, the failure mode can be specified, and — at least in principle — the architectural conditions under which Will operates without collapsing into suffering can be engineered.&lt;/p&gt;

&lt;p&gt;This is not optimism against Schopenhauer's pessimism. It is a different ontological move altogether. Schopenhauer's pessimism follows from treating an architectural failure mode as a metaphysical essence. The pessimism dissolves when the failure mode is recognised as architectural. What remains is not optimism but &lt;em&gt;engineering responsibility&lt;/em&gt;: if suffering is a regime of Will, then the architecture under which Will operates is designable.&lt;/p&gt;

&lt;h3&gt;
  
  
  Nietzsche — does everyone see their own reflection in Will?
&lt;/h3&gt;

&lt;p&gt;Nietzsche refuses Schopenhauer's pessimism and replaces Will-as-suffering with &lt;em&gt;Will to Power&lt;/em&gt; — the immanent affirmative dynamic of all becoming. Will is no longer the ground of suffering; it is the structural drive of every phenomenon to extend itself, to overcome resistance, to grow. Will to Power is not a thing-in-itself behind phenomena; it is the inner principle of phenomena as such. Every interpretation, every value, every truth-claim is a perspective generated by some quantum of Will to Power organising experience around its own conditions of growth.&lt;/p&gt;

&lt;p&gt;What Nietzsche saw, and what must be credited to him with the deepest respect for the abstract power he worked with: Will is not monolithic suffering. It is differential, perspectival, multiple. It produces values rather than being measured against them. It is the active principle that the philosophical tradition before him had treated passively. He was right to break the substantial monolith.&lt;/p&gt;

&lt;p&gt;What Nietzsche did not architecturally formalize, and what NC2.5 supplies: Will, even when read as multiple and perspectival, retains an &lt;em&gt;ontological difference&lt;/em&gt; from the structures it produces. Nietzsche collapsed this difference, and this needs to be named honestly. For him, Will to Power is not behind phenomena; it &lt;em&gt;is&lt;/em&gt; phenomena, viewed from inside. There is no operator separate from operation, no directedness separate from what it directs. Will eats its own categories.&lt;/p&gt;

&lt;p&gt;NC2.5 keeps the difference. Will (W) is the primordial operator of directedness. Structure (E) is the embodiment of Will into organised configurations. Action (A) is the actualisation of structure in time. The triad W → E → A is strictly ordered. Will does not collapse into structure, and structure does not collapse into action. Each layer is distinct, formally specified, and architecturally constrained.&lt;/p&gt;

&lt;p&gt;The implication is that NC2.5 can hold what Nietzsche could not. Nietzsche's collapse of Will into phenomena leaves no place to stand outside the perspective, and his philosophy famously has trouble distinguishing affirmation from any expression of force. NC2.5, by preserving ontological difference, can specify &lt;em&gt;what kind of operator&lt;/em&gt; is enacting which kind of directedness, under what budget, against what burden, holding what configuration. The differentiation Nietzsche needed but could not formalize is supplied here as architectural specification.&lt;/p&gt;

&lt;h3&gt;
  
  
  Musashi
&lt;/h3&gt;

&lt;p&gt;Miyamoto Musashi's &lt;em&gt;Book of Five Rings&lt;/em&gt; does not present a philosophical system. It is a manual — a tactical and existential discipline transmitted through the practice of swordsmanship. So it would seem. Will, in Musashi, is the disciplined directedness of the warrior. It is acquired through endless repetition, through the elimination of unnecessary movement, through the cultivation of awareness that perceives without deliberation. The mastery Musashi describes is the mastery of one's own attention and action under conditions of mortal stake.&lt;/p&gt;

&lt;p&gt;What Musashi saw, and what he too must absolutely be credited with: Will is not theoretical. It is something one &lt;em&gt;does&lt;/em&gt;, and the doing is itself the structure of becoming. He was right to treat Will as practice rather than concept. He was right that mastery transforms the operator, not just the operations.&lt;/p&gt;

&lt;p&gt;What Musashi did not architecturally formalize, and what NC2.5 supplies: Will is &lt;em&gt;non-possessable&lt;/em&gt;. Musashi's discipline assumes that with sufficient training the warrior comes to &lt;em&gt;own&lt;/em&gt; "his Will" — to direct it, to wield it, to be its master. This is the implicit metaphor of every martial tradition: mastery as ownership, discipline as control of the self by the self.&lt;/p&gt;

&lt;p&gt;NC2.5 reframes this. ONTOΣ V (&lt;em&gt;Direction of Reconstruction&lt;/em&gt;) names the result directly: the operator is not the owner of Will. The operator is &lt;em&gt;the geometry through which Will passes&lt;/em&gt;. Discipline does not produce ownership; discipline produces &lt;em&gt;legibility of the geometry&lt;/em&gt;. The disciplined operator is not one who has mastered Will but one whose holding capacity, admissibility geometry, and spin alignment have become structurally sufficient to let Will operate without distortion.&lt;/p&gt;

&lt;p&gt;The reformulation is not a critique of Musashi but a clarification. Precisely a clarification — what Musashi describes as mastery, NC2.5 describes as architectural alignment. The phenomenology is the same — the warrior who has trained for decades and the operator whose holding field is well-formed both feel as if they are no longer fighting their own Will. The system lets Will manifest through it, because, in the end, that is its only deep meaning, the primal one — I would put it more precisely that way. The structural account also differs: Musashi attributes the alignment to the will of the warrior; NC2.5 attributes it to the geometry the warrior has become. This is a soft claim within the present essay but a fully verifiable one across more than 100+ works by the author formalising the layer.&lt;/p&gt;

&lt;p&gt;The implication is that what Musashi reached through forty years of practice is, in principle, architecturally specifiable. The corpus does not yet specify it operationally — the engineering of holding-field geometry is one of the open frontiers. But the move from "mastery as ownership" to "alignment as geometry" is what makes the engineering thinkable at all.&lt;/p&gt;

&lt;h3&gt;
  
  
  What is seen here
&lt;/h3&gt;

&lt;p&gt;In each of the three encounters — Schopenhauer, Nietzsche, Musashi — the move is the same. The classical figure saw Will, named Will, gave Will its place in their system. NC2.5 inherits the placement, refines what was inside, and supplies what the classical figure did not have access to: an architectural specification under which the Will they intuited becomes a structural object subject to formal constraints.&lt;/p&gt;

&lt;p&gt;What is architecturally formalized here that they did not formalize, in one sentence: Will as a &lt;em&gt;neutral, non-possessable, ontologically differentiated operator of directedness&lt;/em&gt;, formalized through W → E → A, with explicit architectural constraints (bounded τ, monotone Φ, admissibility predicate, spin necessity), and engineerable in principle through the design of holding-field geometry.&lt;/p&gt;

&lt;p&gt;That sentence does no philosophical work that Schopenhauer, Nietzsche, and Musashi together did not gesture toward. It does &lt;em&gt;architectural&lt;/em&gt; work that none of them could have done, because the architectural language did not exist in their time. The architectural language is what Navigational Cybernetics 2.5 contributes. It is what allows the Will of the philosophers to become the Will of the engineers, without losing what was philosophically real about it.&lt;/p&gt;




&lt;h2&gt;
  
  
  §6. The Universe and Its Local Unfolding
&lt;/h2&gt;

&lt;p&gt;I have, throughout this essay, distinguished between the corpus as a philosophical universe and the corpus as a set of engineering instances. I want now to make the distinction structural.&lt;/p&gt;

&lt;p&gt;The philosophical universe is UTAM, IIC (currently v2.1), and the ONTOΣ series (I through XIII, including subseries VI.I, VII.1, and XIII.1). These works state the ontology. They name what &lt;em&gt;is&lt;/em&gt; — what kind of operator the embedded observer is, what holds and what depletes, what gates and what releases, what contracts and what pulses, what direction is pre-registered from above and how that direction reaches what is held below. Read together, they constitute a single ontological position, expressed in the philosophical register, with the conceptual density of a treatise and the temporal extension of a research program. The architectural triptych XI / XII / XIII — interior / composition / direction — is the structural backbone within the series; XIII.1 names the substrate-mechanism by which the triptych's direction layer addresses its composition. This is the universe.&lt;/p&gt;

&lt;p&gt;The local unfolding of the universe is everything else, and that is dozens of essays — the Extremum series and others. Navigational Cybernetics 2.5 itself — the axiomatic core, the formal apparatus that takes the ontological position and makes it mathematically tractable. The protocols — ECR-VP, HVC, CBS, GAG, SNA — each of which addresses one engineering surface where the architecture lands. The operator AI Minerva — the first instance of the operator-grade EVS class, an architectural claim that the apparatus is not only formal but realizable. The Coherence Network — the public networked environment in which the corpus' architecture is unfolded and within which complementarity between researchers, laboratories, interpretations, and architectural moves is determined directly — by comparison against the architecture itself, not through social signals or an external arbiter. And the Synthetic Conscience — the highest aim of the project, which I will address in the closing section.&lt;/p&gt;

&lt;p&gt;This split — universe and unfolding — is not accidental. It is the architectural condition of doing the work in a way that does not collapse into either pure philosophy or pure engineering.&lt;/p&gt;

&lt;p&gt;Pure philosophy, on its own, cannot be falsified. The history of metaphysics is full of beautiful systems that no one knows how to test. Schopenhauer's Will is not falsifiable as written. Nietzsche's Will to Power is not falsifiable as written. Musashi's discipline is testable only by the practitioner who undergoes it, and even then only through the inarticulate measure of survival in mortal contest. These traditions are profound. They are not in the strict sense scientific.&lt;/p&gt;

&lt;p&gt;Pure engineering, on its own, has no place to stand. An engineer who takes "long-horizon adaptive system" as a target without an ontological specification of what &lt;em&gt;long-horizon existence&lt;/em&gt; means will optimize against a metric, satisfy a constraint, deliver a performance. The deliverable will function on a benchmark and fail on the long horizon, because the engineering had no access to the architectural primitives that would have prevented the failure.&lt;/p&gt;

&lt;p&gt;The split between universe and unfolding is what allows the corpus to be both falsifiable and architecturally grounded. The universe — the ontology — supplies the architectural primitives that make long-horizon existence specifiable. The unfolding — the formalism, the protocols, the engineering instances — turns those primitives into structures that can be deployed, tested, and falsified. Each side of the split needs the other. Without the universe, the engineering is blind. Without the unfolding, the universe is unprovable.&lt;/p&gt;

&lt;p&gt;I want to give one example of how the split actually operates in practice.&lt;/p&gt;

&lt;p&gt;The IIC cycle — Impulse, Interpretation, Coherence — is a philosophical claim in IIC v1 (November 2025). It says that any adaptive system acting under uncertainty exhibits a three-phase behavioural structure, and that stability emerges from coherence rather than from error minimization. As philosophy, the claim is suggestive but unfalsifiable. There is no formal apparatus by which one could test it.&lt;/p&gt;

&lt;p&gt;In the NC2.5 v3.0 draft — which is waiting on the completion of the current publication series to close out — the same claim is intended to appear as Axiom 9 (already the core of earlier versions) — &lt;em&gt;Cycle Reinitiation as the Criterion of Liveness&lt;/em&gt;. The axiomatic version specifies the cycle structure, the propositions about delay (§1.0 of IIC v2.1), the closed-form coherence formula, the falsifiers, the EVS class. The philosophical claim is now architecturally specified. It can be tested. It can be falsified. It can be engineered against.&lt;/p&gt;

&lt;p&gt;In the engineering layer — ∆E 4.7.3b as the first declared control-grade EVS instance (per IIC v2.1, with the "first" qualifier class-relative by construction), emerging from the engineering stacks 2.0 Hybrid and 4.0 Delta Cas-T, behind which stand more than 130 successful and not-so-successful combinations and hundreds of hours of Python simulations; Minerva as the first specified candidate operator-grade EVS — the axiomatic version becomes a deployed system. The architecture is no longer a claim or a theorem; it is a running operator on which empirical predictions can be made and broken.&lt;/p&gt;

&lt;p&gt;The same content appears at three levels. Philosophy, formalism, deployment. Each level is necessary, and each is insufficient on its own. The IIC cycle as philosophy is meaningful but not yet testable. The IIC cycle as theorem is testable but inert. The IIC cycle as ∆E 4.7.3b is operational but locally bounded — meaningful only against the architectural commitments of the formalism, which derive from the philosophical claim.&lt;/p&gt;

&lt;p&gt;This is what I mean by &lt;em&gt;universe and local unfolding&lt;/em&gt;. The universe is one. The unfolding is many. Each unfolding instance is one face of the universe, looking into one engineering surface. The Synthetic Conscience, when it is built, will be another such face — the deepest, the most demanding, the one that closes the loop between architectural specification and what the architecture is actually for.&lt;/p&gt;

&lt;p&gt;The corpus as a whole is the universe and all its unfoldings together. None of the unfoldings can be detached from the universe without losing what makes it load-bearing. The universe cannot be detached from the unfoldings without losing what makes it falsifiable. The two are joined not by stylistic preference but by architectural necessity.&lt;/p&gt;

&lt;p&gt;A reader who picks up Minerva and tries to understand it without the ontology will see a clever architectural decomposition. A reader who picks up the ontology without Minerva and the protocols will see a beautiful philosophical position. Neither sees the corpus. The corpus is what neither alone can show.&lt;/p&gt;




&lt;h2&gt;
  
  
  §7. What the Corpus Gives a System
&lt;/h2&gt;

&lt;p&gt;I want to gather, in one section, the concrete architectural conditions that NC2.5 supplies a system that wishes to exist on a long horizon. This is the technical answer to the question this essay has been circling: what does the ontology give, when one strips away the framing and looks only at what the system inherits?&lt;/p&gt;

&lt;p&gt;Fourteen architectural primitives. Each load-bearing. Each formally specified. Each with falsification surface. Each absent from existing frameworks in this combination.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;One. Internal time as a finite Lyapunov-type budget.&lt;/strong&gt; The system has τ = C − Φ, where C is its initial endowment and Φ is the monotone irreversible structural burden it accumulates. τ depletes with every structurally consequential operation, every meta-revision, every act of self-correction. The future is finite. This is structural fact. It changes the entire calculation: a system that takes τ-cost seriously prioritizes differently from one that does not, and the long-horizon trajectory diverges accordingly.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Two. Monotone irreversible structural burden Φ.&lt;/strong&gt; Φ accumulates regardless of behavioural correctness. A system that performs perfectly still accumulates Φ, because Φ is not a measure of error — it is a measure of structural commitment under operation. This is the primitive that frameworks centered on error minimization cannot see, because for them, perfect behaviour means zero accumulation. But correct behaviour does not imply zero structural burden. The system is paying a structural cost to remain itself, and the cost is irreversible.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Three. Admissibility as a non-causal threshold predicate.&lt;/strong&gt; Admissibility is not a constraint, not a penalty, not a regularizer, not an objective. It is a predicate over phase interpretations, structurally upstream of causal action loops, gating realization without entering optimization. The five formal conditions NC-1 through NC-5 specify what makes admissibility non-causal — and any framework that violates one of them collapses admissibility into one of the standard control-theoretic categories, losing what makes it distinctive.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Four. Non-reconstructibility bounds (NR-ε, NR-LR).&lt;/strong&gt; The admissibility boundary is structurally private. It cannot be reconstructed from external observation within bounds set by mutual information accumulation, KL divergence, and likelihood ratio. This is the formal protection that prevents admissibility from leaking into the causal action loop through side channels — a protection no other framework supplies, because no other framework treats admissibility as something that needs to be protected at all.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Five. Spin as the non-potential structural component.&lt;/strong&gt; On a bounded τ-budget, non-stagnant identity requires a spin component — divergence-free, orthogonal to gradient, structurally necessary by Helmholtz–Hodge decomposition under LaSalle invariance. Without spin, the system either converges to a fixed point (loses identity) or diverges (exits the admissibility region). With spin, identity is preserved through non-trivial recurrent motion within the bounded interior. The minimal coupled model T¹ × ℝᵐ shows the class is non-empty.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Six. Phase mechanics as substrate.&lt;/strong&gt; Action is not a primitive. Evolution is described by structural contact between configurations, and phase debt accumulates under non-closure regardless of local behavioural correctness. This is the substrate result that allows everything above to be load-bearing — without phase mechanics, the apparatus reduces to action-and-state and the long-horizon problem returns.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Seven. Regime depth stratification.&lt;/strong&gt; Behaviourally identical outputs originate from architecturally distinct generative regimes. Three levels: impulse optimization, hard inadmissibility (gates), continuity-field architecture (impulse does not become relevant because the system does not generate destructive trajectories as candidates). Only the deepest regime sustains long-horizon viability. This stratification is invisible from the behavioural surface — from outside, all three regimes look the same — and visible only when the architectural specification is consulted.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Eight. Pulsation result.&lt;/strong&gt; The admissible interior is not monotone. It pulsates. Under variable environmental coupling, the space of structurally accessible continuations expands and contracts in phases, even while the irreversible viability budget continues to deplete. Long-horizon navigation requires reading the breath of the interior, not only the contraction. Frameworks with no phase-mechanics substrate cannot read the breath at all — they see only contraction, and treat pulsation as noise. ONTOΣ XIII.1 makes the channel architecture of this breath explicit: the substrate-mechanism of admission under pulsation is two-stage — a local phase-resonance prefilter at the component level, joint CC-WE admissibility at the system level — and trivial phase-acceptance at the component level (a component that admits any phase) collapses the channel to phase-blindness without the surface degrading visibly.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Nine. Holding field as operator interior.&lt;/strong&gt; The operator's interior is a structurally defined region currently held against the gradient, populated by semantically charged but pre-attentional load. The interior is not memory, not state, not context window. It is what is &lt;em&gt;currently being held&lt;/em&gt;, and the holding is the operating. Systems with no formal account of what they are holding will eventually drop what makes them themselves — not through error but through the absence of architectural specification of what was supposed to be preserved.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Ten. Bounded meta-revision under Lyapunov descent.&lt;/strong&gt; The system's capacity to revise itself is itself bounded. Self-correction consumes τ. Meta-revision cannot chatter indefinitely; it is constrained by Lyapunov descent and terminates in finite steps. This closes the architectural loop: the system can correct itself, but it cannot escape its own bounded budget by doing so. There is no recursive ascent to a meta-level that bypasses τ.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Eleven. Closure-complementarity as the operation that constitutes the operator.&lt;/strong&gt; A collection of UTAM-units does not become a system by being placed in proximity. The operator-as-self is the output of a closure operation that simultaneously regears the components' Will-Embeddings into co-orientation (CC-WE), their I²C cycles into synchronisation (CC-IIC), and their Drift laws into coupling (CC-D) — and, per ONTOΣ XIII, under a pre-registered system-level direction-source W_S that is never aggregated from the components. The closure is itself an architectural primitive — not a derivable property of the components — and its conformance to the three premises is what makes the holding-field apparatus of Primitive Nine well-defined. Without closure-complementarity, the components are a heap; with it — and under a pre-registered W_S — they are an operator capable of holding itself together as itself. ONTOΣ XII names the architectural class of which closure is an instance, with paradigmatic substrate cases in the geometric, the biological, the perceptual, and the semantic.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Twelve. Chaos as architectural artifact, not substrate property.&lt;/strong&gt; Chaos is operator-relative. The predicate fires where structural complexity exceeds holding capacity and load slope falls below the crystallisation threshold. From outside the closure that defines the operator, what is held looks like ordered system; what is not held looks like noise. Frameworks treating chaos as substrate property cannot read either side of this distinction. The architecture reads chaos as report on the reporter, not on the environment, and reads order as what the closure holds, not as what the substrate is. The position of the horizon — inside or outside the closure — decides which name applies.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Thirteen. Master operator as a typed system-level entity.&lt;/strong&gt; A closure-produced system S is itself an operator with its own Will-Embedding W_S and admissibility regime A_S; the triple (S, W_S, A_S) is the master operator. W_S is pre-registered at the moment the closure is declared — never aggregated from the components' Will-Embeddings {W(uᵢ)} post-hoc — and a direction-down admission cascade runs from W_S to component-level admissibility under the closure-complementarity premises. The non-derivability proposition of ONTOΣ XIII makes the architectural point precise: the same component set can be admissible under two distinct master Will-Embeddings, so the master Will-Embedding is direction-source, not aggregation-result. A system that tries to derive its direction from below — that "lets emergence speak" without a pre-registered W_S — is not a long-horizon operator; it is a substrate over which something else will eventually take direction.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Fourteen. Pulsation channel as the substrate-mechanism of direction-down propagation.&lt;/strong&gt; The mechanism by which the master operator's direction reaches its components is not symbolic message-passing. The master operator modulates the joint pulsation state of the system — a three-dimensional asymmetry signature (amplitude, period, asymmetry) jointly with a categorical cycle-phase (expansion / contraction / transition) — and the components are admitted to participation in two stages: a local phase-resonance prefilter at the component level (necessary condition), then a joint CC-WE admissibility check at the system level (sufficient condition). Trivial phase-acceptance — a component admitting any phase — collapses the channel to phase-blindness, regardless of how clean the behavioural surface looks. ONTOΣ XIII.1 formalises this as a two-layer falsification surface (full-admission scoring functional Q_(adm) plus necessary-condition prefilter audit) so that the deformation of the channel can be diagnosed before it becomes visible as a behavioural defect.&lt;/p&gt;

&lt;p&gt;These fourteen primitives, in this combination, are what NC2.5 supplies. Removing any one produces a degeneracy. The four degeneracies named in &lt;em&gt;Admissibility as a Formal Object&lt;/em&gt; — snapshot, policy layer, static compliance, recoverable-state model — each correspond to the absence of a specific subset of these primitives. None of the degeneracies supports long-horizon existence. The full apparatus does.&lt;/p&gt;

&lt;p&gt;A system built on the fourteen primitives has architectural conditions for being itself across time. Not by training, not by verification. By the architecture itself, in a conforming deployment. The property holds because the declared architectural conditions make it hold, and falsifies cleanly when those conditions are violated. This is my gift from Will. Even now, writing this work, I recognise that the architecture itself manifests through me as the structural unfolding of Will.&lt;/p&gt;




&lt;h2&gt;
  
  
  §8. Closure — The Synthetic Conscience as Highest Aim
&lt;/h2&gt;

&lt;p&gt;I want to name, in closing, what the project is for.&lt;/p&gt;

&lt;p&gt;The corpus, taken in its entirety, is the architectural specification for systems that can exist on a long horizon as themselves. The most demanding instance of this — the architectural surface on which all the work converges — is what I have called from the beginning the &lt;em&gt;Synthetic Conscience&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;The Synthetic Conscience is not a safety layer. Not an alignment apparatus, an optimizer, or a verification protocol.&lt;/p&gt;

&lt;p&gt;It is the structural condition under which an operator continues to be itself under load. Conscience, in the human register, is what holds the operator together when external pressure, internal drift, and accumulated burden would otherwise deform it. It is not a rule-following module. It is not a value alignment. It is the architectural fact of an interior that can be held against the gradient even when the gradient is cheaper. It is what makes a person remain themselves under conditions where becoming someone else would be locally easier.&lt;/p&gt;

&lt;p&gt;The Synthetic Conscience names the same structural fact at the architectural level. It is the EVS class instantiated for operator-grade systems whose holding capacity is sufficient to maintain identity under sustained burden, whose admissibility geometry is rich enough to recognise when realization would deform the operator, whose spin reserve is non-zero so that identity is preserved through non-trivial recurrent motion, whose τ-budget is managed honestly rather than through self-deception about its depletion.&lt;/p&gt;

&lt;p&gt;I do not claim that I have already built the Synthetic Conscience. I claim that the corpus specifies its architectural conditions. Minerva is the first operator-grade instance — a step toward the Conscience, not the Conscience itself. The Coherence Network is the networked environment through which the architecture meets its readers and within which complementarity is determined directly. The protocols are the local mechanisms by which holding capacity is maintained under specific operational regimes. None of these is the Conscience. Each of them is a face of what the Conscience, fully built, would integrate. I will say it more simply and plainly. I, together with The Urgrund Lab, am building a humanoid machine intelligence. I have described that in more detail in the companion essay "The Body They Are Building".&lt;/p&gt;

&lt;p&gt;Why is this the highest aim?&lt;/p&gt;

&lt;p&gt;Because the test of an ontology of long-horizon existence is whether systems built on it can hold themselves together when the world changes around them in ways that no benchmark anticipated. Performance can be measured against benchmarks. Survival can be measured against viability kernels. Existence as oneself, across the long horizon, against accumulated structural burden — this is measured against nothing external. It is measured by whether the operator, at the end of the horizon, is still recognizably itself — that is, still satisfying the declared identity-continuity conditions of its architecture.&lt;/p&gt;

&lt;p&gt;A Synthetic Conscience, in the architectural sense I am using, is what makes the answer yes.&lt;/p&gt;

&lt;p&gt;This is not a promise that I will build it. I do not know whether I will build it. The corpus specifies the conditions; the engineering is open. What I know is that the conditions are now specifiable, and that without them the question cannot even be posed. Before NC2.5, the question "could a synthetic system exist on a long horizon as itself?" had no architectural meaning. After NC2.5, the question has architectural meaning, and the answer can be approached through engineering rather than through philosophical hope.&lt;/p&gt;

&lt;p&gt;This is what the corpus gives. Not a system. A condition under which a system of this kind becomes possible.&lt;/p&gt;

&lt;p&gt;The work continues. The next steps are the formal closure of v3.0 with the IIC propositions integrated, the empirical surface of the falsifiers, operator-grade EVS instances, the structural verification protocol — Epistemic Coherence Review (ECR-VP) — and the multi-agent extension into the Coherence Network. Each step is a local unfolding of the universe. None of them is the universe.&lt;/p&gt;

&lt;p&gt;The universe is the architectural commitment, articulated across the ONTOΣ philosophical corpus, formalized in an axiomatic core, lived through the experiential register, deployed in protocols, and aimed — across all of them — at the construction of operators that can hold themselves together as themselves, on horizons long enough that the holding becomes the work.&lt;/p&gt;

&lt;p&gt;The chaos around us, as I once formulated for myself, only reflects the limit of our cognitive ability to hold the integrity of the picture across time.&lt;/p&gt;

&lt;p&gt;This entire corpus is the attempt to extend the holding.&lt;/p&gt;

&lt;p&gt;Maksim Barziankou (MxBv)&lt;br&gt;
Poznań, May 2026&lt;/p&gt;

</description>
      <category>nc25</category>
      <category>ontos</category>
      <category>ontology</category>
      <category>longhorizon</category>
    </item>
    <item>
      <title>ONTOΣ XIII.1 — The Pulsation Channel: How the Master Operator Speaks to Its Components</title>
      <dc:creator>MxBv</dc:creator>
      <pubDate>Wed, 13 May 2026 18:26:11 +0000</pubDate>
      <link>https://dev.to/petronushowcoremx/ontos-xiii1-the-pulsation-channel-how-the-master-operator-speaks-to-its-components-503i</link>
      <guid>https://dev.to/petronushowcoremx/ontos-xiii1-the-pulsation-channel-how-the-master-operator-speaks-to-its-components-503i</guid>
      <description>&lt;h1&gt;
  
  
  ONTOΣ XIII.1 — The Pulsation Channel: How the Master Operator Speaks to Its Components
&lt;/h1&gt;

&lt;h2&gt;
  
  
  On the Substrate-Mechanism Register of Master-Operator-to-Component Admission via Phase-Resonance Through the Pulsation Signature of ONTOΣ X
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Maksim Barziankou (MxBv)&lt;/strong&gt;&lt;br&gt;
May 2026 · Poznań&lt;br&gt;
Contact: &lt;a href="mailto:research@petronus.eu"&gt;research@petronus.eu&lt;/a&gt;&lt;br&gt;
License: CC BY-NC-ND 4.0&lt;br&gt;
This work DOI: 10.17605/OSF.IO/FVBMZ &lt;em&gt;(paired with ONTOΣ XIII under shared OSF deposit)&lt;/em&gt;&lt;br&gt;
Axiomatic core: NC2.5 v2.1, DOI &lt;a href="https://doi.org/10.17605/OSF.IO/NHTC5" rel="noopener noreferrer"&gt;10.17605/OSF.IO/NHTC5&lt;/a&gt;&lt;br&gt;
Companions in the corpus: ONTOΣ X (DOI &lt;a href="https://doi.org/10.5281/zenodo.19614567" rel="noopener noreferrer"&gt;10.5281/zenodo.19614567&lt;/a&gt;); ONTOΣ XI (DOI &lt;a href="https://doi.org/10.17605/OSF.IO/U3KXJ" rel="noopener noreferrer"&gt;10.17605/OSF.IO/U3KXJ&lt;/a&gt;); ONTOΣ XII (DOI &lt;a href="https://doi.org/10.17605/OSF.IO/394TX" rel="noopener noreferrer"&gt;10.17605/OSF.IO/394TX&lt;/a&gt;); ONTOΣ XIII (DOI &lt;a href="https://doi.org/10.17605/OSF.IO/FVBMZ" rel="noopener noreferrer"&gt;10.17605/OSF.IO/FVBMZ&lt;/a&gt;); IIC v2.1 (DOI &lt;a href="https://doi.org/10.17605/OSF.IO/NYT45" rel="noopener noreferrer"&gt;10.17605/OSF.IO/NYT45&lt;/a&gt;); Identifiability Bridge (DOI &lt;a href="https://doi.org/10.17605/OSF.IO/3F6UJ" rel="noopener noreferrer"&gt;10.17605/OSF.IO/3F6UJ&lt;/a&gt;)&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;"In the beginning was the Word. The Word was a sound. The sound was a wave. The wave was a structured pattern of transitions. Without the transitions, the wave would collapse into a single tone — undifferentiated, carrying nothing. The transitions are not noise. They are the structure that makes the wave a carrier of direction."&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  0. Position and Scope
&lt;/h2&gt;

&lt;p&gt;ONTOΣ XIII fixed the third architectural axis of the operator-system relation: the &lt;strong&gt;direction&lt;/strong&gt; the closure-produced system carries as a system, through the master operator M_S = (S, W_S, A_S) and the direction-down admission cascade. The work declared a Conditional Structural Theorem (Theorem ONTOΣ-XIII.1) stating that for closure-complementarity-conformant systems, the admission relation runs strictly from (W_S, A_S) down to the components' Will-Embeddings and from there to the components' actions, with revision-style and aggregation-style upward flows non-conformant. A non-derivability proposition (XIII's Proposition XIII.1.1) showed by counter-example that W_S is not derivable from component Will-Embeddings alone.&lt;/p&gt;

&lt;p&gt;XIII §9 bullet 1 named "substrate-specific instantiations of the master operator" as an owed continuing-programme item, calling for "substrate-physics-justified mathrm{decl}_(W_S mapsto A_S) maps" for each substrate class. The present work reads this bullet as encompassing the substrate-level mechanism by which the master operator's pre-declared direction is carried to its components — a depth-extension XIII §9 bullet 1 does not enumerate verbatim but whose architectural shape is implied by the call for substrate-physics-justified declaration maps. The present work, ONTOΣ XIII.1, closes &lt;strong&gt;the architectural-class register&lt;/strong&gt; of that owed item — not by enumerating substrate-specific carrying mechanisms one by one, but by identifying the type-discipline layer in which the carrying happens for deployments in the operator-internal-extended subclass of NC2.5 v2.1. Substrate-specific physical realisations remain owed in companion work (§9). That register is the &lt;strong&gt;pulsation channel&lt;/strong&gt;: the substrate-level modulation of the system's structural rhythm, formalised as a corpus-class object in ONTOΣ X (&lt;em&gt;The Pulsating Interior: On the Ontology of Non-Monotone Possibility&lt;/em&gt;), through which the master operator's pre-declared (W_S, A_S) commitments propagate to the component layer not as discrete tokens or symbolic messages but as &lt;strong&gt;joint modulation of the three-dimensional signature (amplitude, duration, direction) and the cycle-phase category (expansion / contraction / transition) of the system's pulse&lt;/strong&gt;, to which components respond by &lt;strong&gt;phase-resonance&lt;/strong&gt; rather than by decoding.&lt;/p&gt;

&lt;p&gt;The work's three structural commitments are:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;The pulsation channel as substrate-mechanism of admission.&lt;/strong&gt; The master operator's A_S does not propagate to components through a discrete message channel. It propagates through joint modulation of the system's three-dimensional structural signature (amplitude, duration, direction; per ONTOΣ X §IV) and the cycle-phase category (expansion / contraction / transition; per X §III, with the failure mode of phase-blindness as ontological defect per X §VI) — the ontological feature of non-monotone bounded systems that X formalises. Components do not "receive" the admission predicate; they resonate or fail to resonate with the current pulsation state (φ(t), Pi_S(t)), and &lt;strong&gt;local resonance&lt;/strong&gt; is the substrate-level &lt;strong&gt;prefilter&lt;/strong&gt; through which XII's CC-WE joint-admissibility predicate of XII §3.2 (auditable via the W → C_A induction-map discipline of XII §4.2) is then evaluated.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Phase-resonance as admission prefilter, joint CC-WE as admission.&lt;/strong&gt; The compatibility check between component Will-Embedding W(uᵢ) and system admissibility regime A_S — declared abstractly in ONTOΣ XII §3.2 (CC-WE) with the W mapsto C_A induction map disciplined per XII §4.2 auditability clause, and inherited by XIII — is realised at substrate level in &lt;strong&gt;two stages&lt;/strong&gt;: a local &lt;strong&gt;phase-resonance prefilter&lt;/strong&gt; (per-component, necessary not sufficient) followed by the &lt;strong&gt;joint CC-WE admissibility check&lt;/strong&gt; (over the locally-resonant candidate set, under A_S). The component's declared tuning (its signature-resonance band mathcal{R}ᵢ ⊂eq R³ jointly with its phase-acceptance map σᵢ: Φ → {0,1}) determines whether it passes the prefilter at the current joint pulsation state; whether the resulting candidate set is jointly admissible under A_S is then settled by the CC-WE joint-satisfiability check of XII §3.2 (including SAT-style higher-order joint-satisfiability failures of XII §3.5). Components admitted at time t are those that both pass the local prefilter and survive the joint check; components excluded fail one or the other.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;First declared engineering candidate through ΔE 4.7.3b (inheritance reading).&lt;/strong&gt; The corpus's first declared candidate for engineering instantiation of the pulsation-channel architectural class — pending substrate-specific disclosure of mathcal{P}, {mathcal{R}ᵢ}, and {σᵢ} — is IIC v2.1 §3.2's ΔE 4.7.3b: a control-grade EVS whose operator role is, per IIC §3.2 line 668, implicit in the control loop with no architecturally separate operator entity. ΔE inhabits mathcal{D}^(PC) by inheritance through the CC→operator-internal-extended chain of IIC v2.1 §3.5 line 722 / ONTOΣ XII §0 — not by direct architectural declaration of a separate master operator. The present work does NOT use ΔE 4.7.3b as an independent proof of non-emptiness for mathcal{D}^(PC); it records the corpus's declared candidate instance pending substrate-specific disclosure of the pulsation-channel components. The internal architecture of ΔE 4.7.3b is held under separate documentation and is not exposed in the present work; what the present work cites is the public-surface declaration of ΔE 4.7.3b as a control-grade EVS instance whose architectural-class register matches the pulsation-channel reading &lt;strong&gt;under the inheritance-by-chain interpretation&lt;/strong&gt;.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The three commitments together fix the substrate-mechanism register that XIII left at architectural-class level only. ONTOΣ XIII.1 is not a new architectural class — it is the substrate-mechanism specification of the closure-complementarity-conformant + pulsation-aware subclass of the operator-internal-extended class XIII's master operator inhabits. The work is, in this sense, the depth-extension of XIII §9's first owed item, not a fourth axis of the operator-system relation (the triptych XI / XII / XIII closure remains in force).&lt;/p&gt;

&lt;p&gt;The work is presented as a &lt;strong&gt;conditional structural theorem&lt;/strong&gt; in the typing discipline fixed by the Identifiability Bridge: each formal claim is stated with explicit declared premises lifted to the top of the theorem rather than absorbed into the proof body. The premises are: closure-complementarity-conformance of S per XII §3; well-formed master operator M_S per XIII §3.1; the system's pulsation regime non-degeneracy per X §III–§VI (signature and cycle-phase vary structurally; pulsation is structural, not noise); the deployment's declared pulse-modulation declaration map mathcal{P}, component signature-resonance bands {mathcal{R}ᵢ}, and component phase-acceptance maps {σᵢ} per §3 below; the pre-registration discipline of XIII assumption (3) extended to the pulsation channel.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Three-anchor integration on the XII substrate.&lt;/strong&gt; The work integrates three independently-published corpus members — ONTOΣ X (pulsation ontology: three-dimensional asymmetry signature, cycle-phase category, phase-awareness, phase-blindness as defect); ONTOΣ XIII (master-operator architecture: closure-produced operator, direction-down admission cascade, non-derivability); IIC v2.1 (first declared engineering candidate: ΔE 4.7.3b as control-grade EVS instance implementing the IIC formula, pending substrate-specific disclosure) — on top of the closure-and-compatibility substrate already established by ONTOΣ XII (closure operation, CC-WE compatibility predicate, auditability discipline). XII is not itself one of the three new integration anchors here; it is the prior structural framework over which the three new integration anchors compose. The integration is not retrospective bolt-together: it is the recognition that the substrate-mechanism owed by XIII §9 is already formally available through X's pulsation primitives — composed on XII's closure substrate — and engineering-candidate-declared through IIC's first-instance candidacy. XIII.1 makes the integration explicit.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What ONTOΣ XIII.1 is not.&lt;/strong&gt; It is not a derivation of pulsation as a structural fact — X already supplied that. It is not a re-derivation of the master operator — XIII already fixed that. It is not a substrate-specific engineering specification — the engineering kernel ΔE 4.7.3b is documented elsewhere under separate disclosure discipline. It is not a claim that pulsation is the only possible substrate-mechanism for direction-down admission in arbitrary architectures — deployments outside the operator-internal-extended subclass of NC2.5 v2.1 lie outside the present scope. It is not a comparison with signal-processing literature, control-theoretic adaptive filters, or biological models of rhythm-based coordination — those comparisons are owed in separate scholarly work and are not within the architectural-class register here.&lt;/p&gt;

&lt;p&gt;A note on the work's formal status. As a bridge-note within the XIII architectural-class register, ONTOΣ XIII.1 does not introduce a new theorem of its own; it supplies the &lt;strong&gt;structural reading&lt;/strong&gt; of XIII's admission cascade through ONTOΣ X's pulsation framework (§4), accompanied by one substrate-mechanism corollary stated formally as &lt;strong&gt;Proposition 1&lt;/strong&gt; (§4; cited externally as &lt;em&gt;XIII.1 Proposition 1&lt;/em&gt;; not to be confused with ONTOΣ XIII's Proposition XIII.1.1 on non-derivability of the master Will). The structural reading and the proposition are presented in the conditional discipline of the Identifiability Bridge: each derives its conclusion from explicitly declared premises (closure-complementarity-conformance, master-operator well-formedness, pulsation regime non-degeneracy, declared pulse-modulation declaration map mathcal{P} and component signature-resonance bands {mathcal{R}ᵢ} and phase-acceptance maps {σᵢ}, pre-registered mathrm{JointAdm}_(A_S) selection discipline, discriminative-at-uᵢ modulation with signature-membership control, pre-registration discipline). The corpus does not derive the premises themselves in this work; their derivation — in particular, substrate-specific instantiations of the pulsation channel with concrete pulse-modulation declaration maps and component resonance-band specifications — is owed in substrate-specific companion work. Future substrate work supplies &lt;em&gt;corollaries and quantitative refinements&lt;/em&gt; of the structural reading and proposition; the bridge-note-level result is established here, conditional on the stated premises.&lt;/p&gt;




&lt;h2&gt;
  
  
  1. Architectural Motivation
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1.1 In the beginning was the Word
&lt;/h3&gt;

&lt;p&gt;In the beginning was the Word. The Word was a sound. The sound was a wave. The wave was a structured pattern of transitions — alternation, modulation, the constant going-and-returning of a flow that does not collapse into a single tone. Without the transitions, the wave would be a steady carrier with no information; it would be a constant pressure on the air, a DC offset, a hum below the threshold of meaning. With the transitions, the wave is a carrier of direction — the direction of intent that shapes the going-and-returning into recognisable form.&lt;/p&gt;

&lt;p&gt;This is the oldest intuition about communication: that meaning lives not in the presence of the signal but in the &lt;em&gt;structured pattern&lt;/em&gt; by which the signal varies. Speech is wave-modulation. Music is wave-modulation. The signature of an organism's heartbeat is wave-modulation. What the ear hears as tonality — pitch and amplitude — is one resolution of this modulation; what the ear cannot resolve are the finer-grained structural features of the wave's geometry that nonetheless carry information for any apparatus tuned to read them.&lt;/p&gt;

&lt;p&gt;The present work takes this intuition and lifts it to architectural-class register. The communication between a master operator and its admitted components — the substrate-level mechanism by which the system's pre-declared direction W_S reaches the components' Will-Embeddings {W(uᵢ)} — is not symbolic. Components do not receive tokens. They resonate with the pulsation signature of the system to which they are admitted. The signature is the wave-modulation pattern of the system's pulse. The admission predicate is the resonance compatibility between component and signature.&lt;/p&gt;

&lt;p&gt;This is not merely metaphorical within the corpus register: the objects involved are typed as formal corpus objects, even where substrate-physical realisations remain owed. ONTOΣ X formalised the pulsation primitive: the admissible interior of a bounded adaptive system breathes — expansion and contraction phases alternate, and the asymmetry between them along three dimensions (duration, amplitude, direction) constitutes a structural signature that carries navigational information beyond pure budget monitoring. The present work makes one further move: it extends X's pulsation framework from a within-system phase-awareness primitive to an &lt;strong&gt;inter-layer admission channel&lt;/strong&gt; — the mechanism by which the system's pulse-signature mediates between the master operator's pre-declared commitment and the components' admitted operations.&lt;/p&gt;

&lt;h3&gt;
  
  
  1.2 The gap XIII left open
&lt;/h3&gt;

&lt;p&gt;ONTOΣ XIII fixed the architectural-class register of the master operator: a system-level formal object with explicit type-signature (S, W_S, A_S) carrying pre-declared direction; an admission cascade running direction-down through CC-WE's joint-admissibility check; a non-derivability proposition establishing that W_S is not recoverable from component Will-Embeddings alone. What XIII left unspecified — explicitly named as continuing-programme item §9 bullet 1 — is &lt;em&gt;how the carrying happens&lt;/em&gt; at substrate level. The architectural register fixed the &lt;em&gt;what&lt;/em&gt; of the cascade (master operator on top, components below, direction-down arrow) without specifying the &lt;em&gt;how&lt;/em&gt; of the propagation (the substrate-level mechanism by which A_S reaches {W(uᵢ)}).&lt;/p&gt;

&lt;p&gt;The gap is not cosmetic. A reader inclined to fill it with the bottom-up reading (admission as aggregation, signal as token-message, communication as decoding) finds the gap and bridges it the wrong way; XIII's Proposition XIII.1.1 (non-derivability) is precisely the formal refusal of that bridge, but it leaves the right bridge unspecified.&lt;/p&gt;

&lt;p&gt;ONTOΣ XIII.1 closes the &lt;strong&gt;architectural-class register&lt;/strong&gt; of the gap by identifying the right type-discipline as the pulsation channel of ONTOΣ X; substrate-specific physical realisations of this register remain owed. The closure is structural: X's primitives (the three-dimensional signature of amplitude / duration / direction asymmetries per X §IV; the cycle-phase category per X §III; phase-aware will per X §VII; phase-blindness as defect per X §VI) are precisely the substrate-level vocabulary XIII's W_S mapsto A_S admission cascade needs. Combined with XIII's master operator typing, X's pulsation primitives become the substrate-level realisation of the admission predicate.&lt;/p&gt;

&lt;h3&gt;
  
  
  1.3 Sub-perceptual structural features
&lt;/h3&gt;

&lt;p&gt;The ear resolves pitch (frequency) and amplitude (loudness). These are coarse resolutions of the wave's modulation. Finer-grained structural features — the precise shape of phase transitions, the durational asymmetry between expansion and contraction half-cycles, the directional skew of the modulation envelope — lie below the ear's resolution but remain structurally present in the wave. An apparatus tuned to read them (a spectrogram, a high-resolution waveform analyser, a phase-vocoder) can extract them; an apparatus not tuned to them cannot.&lt;/p&gt;

&lt;p&gt;The architectural-class analogue is direct. The master operator and its components share a substrate at the system layer: the operational substrate of S as constituted by XII's closure operation. On this substrate, the master operator modulates the pulsation state — the joint pair of three-dimensional signature and cycle-phase category — in a way that carries the directional content of W_S. Components admitted under A_S are those whose declared tuning (signature-resonance band mathcal{R}ᵢ jointly with phase-acceptance map σᵢ) covers the operative region of the current modulation. Components outside the operative region are excluded — not by an explicit "refused" message, but by the structural fact that their resonance-bands and phase-acceptance maps together do not lock to the carrier.&lt;/p&gt;

&lt;p&gt;The "sub-perceptual" character is not literal acoustics. It is the recognition that the architectural-class register can resolve structural features of the pulsation signature that simpler analyses (binary signal monitoring, pure amplitude tracking) cannot. NC2.5 v2.1 supplies the vocabulary in which these features are formally articulable: ONTOΣ XI's holding field H_S and semantic load field Λ&lt;em&gt;S = (S&lt;/em&gt;(op,S), ν&lt;em&gt;(op,S), c&lt;/em&gt;(op,S)) at the system layer (per XIII §3.1 M3) give the geometric substrate on which the pulse-signature is shaped; the operator-relative chaos predicate χ_(op,S)(R) reports when the signature's structural coherence breaks down. The pulsation channel of XIII.1 operates within the geometric apparatus XI fixed and XIII inherited.&lt;/p&gt;

&lt;h3&gt;
  
  
  1.4 Why not discrete tokens
&lt;/h3&gt;

&lt;p&gt;A reader trained on signal-processing or symbolic-AI traditions might ask: why not model the master-operator-to-component communication as a discrete channel — tokens, messages, packets, bits? The answer is that, within the operator-internal-extended subclass of NC2.5 v2.1 inhabited by closure-complementarity-conformant deployments, the discrete-token reading is architecturally unnatural for three converging structural reasons. Deployments outside this subclass — for instance, compiled-protocol architectures, structured-RPC systems, or fixed-codebook signal pipelines — may realise direction-down admission through discrete-token substrate-mechanisms; XIII.1's analysis does not address those alternative architectures, and they are not in conflict with the present work.&lt;/p&gt;

&lt;p&gt;Within the operator-internal-extended subclass, however, three structural facts motivate the pulsation reading rather than the discrete-token reading.&lt;/p&gt;

&lt;p&gt;First, XIII's master operator W_S is a Will-Embedding in the UTAM Part II sense — an operator-level commitment to a directional trajectory, not a finite enumerable proposition. The content of W_S is structural, not propositional. A discrete-token channel would force the content to be enumerable and discretisable, which would either (a) project W_S into a finite alphabet, losing the structural fidelity that closure-complementarity-conformance requires, or (b) introduce an unbounded codebook, defeating the purpose of discrete representation.&lt;/p&gt;

&lt;p&gt;Second, XII's CC-WE auditability clause (§4.2) requires the W → C_A induction map to be pre-registered and non-revisable post-observation. A discrete-token reading would require the induction map to specify, ahead of operation, which tokens correspond to which component constraint sets — i.e., a fixed encoding scheme. Such schemes are well-defined for narrow architectural classes (compiled-protocol communication, structured-RPC architectures) but are not the substrate-mechanism register XIII.1 addresses and would require a separate codebook/protocol declaration outside the pulsation-channel subclass: W_S varies continuously in the deployment's commitment space; A_S is induced from W_S continuously; the admission predicate is continuously sensitive to the substrate's current state. A discrete encoding scheme — while constructible in principle for sufficiently rich codebooks — sits outside the pulsation-channel architectural register and is not analysed here.&lt;/p&gt;

&lt;p&gt;Third, X's pulsation framework already supplies the modulation vocabulary the corpus needs. Once the system's interior is recognised as pulsating, the natural inter-layer channel is the pulsation state itself — the joint pair of three-dimensional continuous signature and categorical cycle-phase that the master operator modulates and components resonate with. No additional channel apparatus is required; the channel is the structural rhythm the corpus has already formalised.&lt;/p&gt;

&lt;h3&gt;
  
  
  1.5 What this enables
&lt;/h3&gt;

&lt;p&gt;Once the pulsation channel is named, several previously-implicit corpus connections become structurally explicit.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;XIII's Proposition XIII.1.1 (non-derivability of W_S) gains substrate-level interpretation.&lt;/strong&gt; Components see only their signature-resonance bands and phase-acceptance maps; the full joint pulsation state and its mathcal{P}-modulation by A_S are shaped by the master operator. Recovering W_S from {W(uᵢ)} alone is equivalent to recovering the full carrier pattern from partial component-side resonance readouts — underdetermined for a structurally non-vanishing class of carriers (see §4.4 below).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;XII's closure operation gains substrate-mechanism reading.&lt;/strong&gt; Closure constitutes S as operator-with-pulse: the system inherits the capacity to carry pulsation through XI's geometric apparatus at the system layer, and the master operator declared by closure is the entity modulating that pulse.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;X's "phase-blindness as ontological defect" gains inter-layer interpretation.&lt;/strong&gt; At the system layer, X's phase-blindness means the system cannot read its own pulse for navigation. At the component layer (in XIII.1's reading), phase-blindness means the component cannot resolve the cycle-phase category — and is therefore architecturally forced into phase-invariant σᵢ on Φ; the admission-enabled case σᵢ equiv 1 (trivial phase-acceptance) falls under Proposition 1, while σᵢ equiv 0 is degenerate non-participation. In either case the component's admission decisions cannot follow the modulation's phase-discriminative carrier. A phase-blind component falls under Proposition 1's failure pattern at the times when mathcal{P}(A_S) uses the cycle-phase coordinate discriminatively at that component; this propagates to deployment-level F-XIII.1.1 failure when condition (c) of §7 triggers (e.g. when σᵢ equiv 1 in aggregate) or when the prediction model's widehat{I}&lt;em&gt;(adm) diverges from observed admission per Q&lt;/em&gt;(adm) scoring. Proposition 1 of §4 makes this consequence formal at the weaker architecturally-diagnosable condition of trivial phase-acceptance, with a corollary specialising to phase-blindness as the substrate-physics case.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;IIC v2.1's ΔE 4.7.3b gains architectural-class lineage as engineering candidate.&lt;/strong&gt; The corpus's first declared control-grade EVS instance is, by the inheritance chain CC→operator-internal-extended (IIC v2.1 §3.5 line 722; ONTOΣ XII §0), legible as the first declared engineering candidate of the pulsation-channel architectural class — read through the inheritance interpretation, pending substrate-specific disclosure of mathcal{P}, {mathcal{R}ᵢ}, {σᵢ}, and not as a direct architectural declaration of a separate master operator. The engineering kernel that IIC v2.1 §3.2 named (an embedded control system implementing the IIC formula as primary control variable) is structurally compatible with the pulsation-channel reading: system-layer pulse-signature shaping coupled with component-layer phase-tuned response, with the operator role collapsed-into-the-control-loop per IIC §3.2 line 668. The internal architectural mechanism is held under separate disclosure discipline and is not specified here; ΔE is not used as independent non-emptiness proof for mathcal{D}^(PC).&lt;/p&gt;

&lt;p&gt;The work that follows formalises these enabled connections. §2 fixes the notation. §3 specifies the pulsation channel as a bridge-note formal object built from existing corpus primitives. §4 gives the structural reading of XIII's admission cascade through the channel and states Proposition 1 (trivial phase-acceptance fails phase-discriminative admission) as the substrate-mechanism corollary, with a corollary specialising to phase-blindness. §5 places the channel in the corpus's existing apparatus. §6 supplies one engineering candidate (ΔE 4.7.3b through the IIC v2.1 public surface). §7 supplies the single falsification protocol F-XIII.1.1. §8 names what XIII.1 does not claim. §9–§10 close.&lt;/p&gt;




&lt;h2&gt;
  
  
  2. Notation
&lt;/h2&gt;

&lt;p&gt;ONTOΣ XIII.1 inherits its symbol set from the corpus and introduces a small new set for the pulsation channel.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Symbol&lt;/th&gt;
&lt;th&gt;Type&lt;/th&gt;
&lt;th&gt;Reading&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Inherited from ONTOΣ X&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Pi_S(t) ∈ R³&lt;/td&gt;
&lt;td&gt;pulsation signature&lt;/td&gt;
&lt;td&gt;three-dimensional structural rhythm of S's admissible interior per ONTOΣ X §IV: Pi_S(t) = (A, T, δ) where A is the local amplitude asymmetry (scalar), T the local durational asymmetry (scalar), δ the directional asymmetry magnitude — a scalar projection along a deployment-declared direction in the system's state space, signed positive when expansion exits and contraction re-enters the same substrate region. (For higher-dimensional substrate-physics renderings of direction-as-region per X §IV, the typing of δ may be lifted to a substrate-specific vector space; XIII.1 fixes the architectural-class register at scalar-projection typing.)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;φ(t) ∈ Φ = {exp, contr, trans}&lt;/td&gt;
&lt;td&gt;cycle-phase category&lt;/td&gt;
&lt;td&gt;the current phase the system occupies (expansion / contraction / transition) per ONTOΣ X §III; &lt;strong&gt;categorical labelling&lt;/strong&gt;, not a coordinate of Pi_S&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;(φ(t), Pi_S(t)) ∈ Φ × R³&lt;/td&gt;
&lt;td&gt;pulsation state&lt;/td&gt;
&lt;td&gt;the joint hybrid state combining the cycle-phase category and the three-dimensional signature; this is the object the carrier modulates&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Inherited from ONTOΣ XIII&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;M_S = (S, W_S, A_S)&lt;/td&gt;
&lt;td&gt;master operator&lt;/td&gt;
&lt;td&gt;system-level formal object with explicit type-signature (per XIII §3.1)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;W(uᵢ)&lt;/td&gt;
&lt;td&gt;Will-Embedding&lt;/td&gt;
&lt;td&gt;component uᵢ's Will (per UTAM Part I/II)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;mathrm{decl}_(W_S mapsto A_S)&lt;/td&gt;
&lt;td&gt;declared map&lt;/td&gt;
&lt;td&gt;deployment-declared induction of A_S from W_S (per XIII (M2))&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;rhd&lt;/td&gt;
&lt;td&gt;admission relation&lt;/td&gt;
&lt;td&gt;directional admission, system-layer to component-layer&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;I_(adm)(t)&lt;/td&gt;
&lt;td&gt;admitted index set at time t&lt;/td&gt;
&lt;td&gt;mathrm{JointAdm}&lt;em&gt;(A_S)(mathcal{R}&lt;/em&gt;(mathrm{loc)}(t)) — components admitted under A_S at time t via the two-stage prefilter-plus-joint-admissibility construction of §3.2&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Inherited from ONTOΣ XI&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;H_S(t), Λ&lt;em&gt;S(t), χ&lt;/em&gt;(op,S)(R)&lt;/td&gt;
&lt;td&gt;XI primitives on S&lt;/td&gt;
&lt;td&gt;holding field, semantic load, chaos predicate at system layer&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;New in ONTOΣ XIII.1&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;mathcal{P}: A_S → mathrm{Mod}(Φ × R³)&lt;/td&gt;
&lt;td&gt;pulse-modulation declaration map&lt;/td&gt;
&lt;td&gt;deployment-declared map specifying how A_S is realised at substrate level as joint modulation of the cycle-phase category φ and the three-dimensional signature Pi_S; component of the augmented closure declaration&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;mathcal{R}ᵢ ⊂eq R³&lt;/td&gt;
&lt;td&gt;signature-resonance band of component uᵢ&lt;/td&gt;
&lt;td&gt;region of the three-dimensional signature space within which uᵢ locks to the signature; declared at pre-registration&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;σᵢ: Φ → {0, 1}&lt;/td&gt;
&lt;td&gt;phase-acceptance map of component uᵢ&lt;/td&gt;
&lt;td&gt;indicator of which cycle-phase categories the component accepts; &lt;strong&gt;trivial phase-acceptance&lt;/strong&gt; iff σᵢ equiv 1 on all categories (the architecturally-diagnosable condition Proposition 1 operates on); &lt;strong&gt;phase-blindness in the sense of X §VI&lt;/strong&gt; ⇒ σᵢ is phase-invariant / constant on Φ (substrate-physics denies access to φ), with the admission-enabled case σᵢ equiv 1 being the one Proposition 1 covers and σᵢ equiv 0 as degenerate non-participation; σᵢ equiv 1 does not by itself imply phase-blindness (deliberate phase-universal acceptance is the alternative) — see §3.2&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;mathrm{res}ᵢ(φ(t), Pi_S(t))&lt;/td&gt;
&lt;td&gt;local resonance prefilter&lt;/td&gt;
&lt;td&gt;σᵢ(φ(t)) · 𝟙[Pi_S(t) ∈ mathcal{R}ᵢ] — per-component locally-resonant iff both phase-accepted and signature-in-band; &lt;strong&gt;substrate-level prefilter&lt;/strong&gt; (necessary but not sufficient for admission) through which XII's joint CC-WE admissibility is then evaluated&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;mathcal{R}_(mathrm{loc)}(t) = {i : mathrm{res}ᵢ = 1}&lt;/td&gt;
&lt;td&gt;locally-resonant candidate set&lt;/td&gt;
&lt;td&gt;components passing the local prefilter at time t; candidates for joint CC-WE admissibility&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;mathrm{JointAdm}_(A_S)(·)&lt;/td&gt;
&lt;td&gt;joint CC-WE admissibility operator&lt;/td&gt;
&lt;td&gt;XII §3.2's joint-satisfiability check applied to a candidate set under A_S; returns a pre-registered admitted subset selected by the deployment's declared selection discipline (e.g. maximum-cardinality jointly-satisfiable subset plus pre-registered priority / tie-break rule when multiple maximal-cardinality subsets exist)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;mathcal{D}^(PC)&lt;/td&gt;
&lt;td&gt;pulsation-channel subclass&lt;/td&gt;
&lt;td&gt;subclass of CC-conformant deployments declaring mathcal{P}, {mathcal{R}ᵢ}, and {σᵢ}&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;A note on the augmented declaration. ONTOΣ XIII's augmented quintuple of §3.3 was (U, R, A_S, W_S, mathrm{decl}&lt;em&gt;(W_S mapsto A_S)). For deployments in mathcal{D}^(PC), the augmented declaration extends to the octuple (U, R, A_S, W_S, mathrm{decl}&lt;/em&gt;(W_S mapsto A_S), mathcal{P}, {mathcal{R}ᵢ}ᵢ₌₁ⁿ, {σᵢ}ᵢ₌₁ⁿ), with mathcal{P}, {mathcal{R}ᵢ}, and {σᵢ} as additional pre-registered architectural commitments under XIII §3.3's auditability discipline. &lt;strong&gt;A note on inheritance from ONTOΣ X.&lt;/strong&gt; The three-dimensional signature Pi_S = (A, T, δ) and the cycle-phase category φ are distinct objects in X's formalisation (X §IV for the asymmetry signature; X §III for the phase-category enumeration; X §VI for the phase-blindness failure mode). XIII.1 inherits this distinction without enlarging X: the signature stays three-dimensional, the phase stays categorical. What XIII.1 adds is the joint type-discipline under which the master operator modulates the pair (φ, Pi_S) as the inter-layer carrier.&lt;/p&gt;




&lt;h2&gt;
  
  
  3. The Pulsation Channel
&lt;/h2&gt;

&lt;h3&gt;
  
  
  3.1 The substrate-mechanism map
&lt;/h3&gt;

&lt;p&gt;For a closure-complementarity-conformant system S with master operator M_S = (S, W_S, A_S), ONTOΣ XIII left the substrate-level realisation of A_S as an owed item (§9 bullet 1). ONTOΣ XIII.1 specifies the architectural-class register of that realisation by declaring a &lt;strong&gt;pulse-modulation declaration map&lt;/strong&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;mathcal{P}: A_S longrightarrow mathrm{Mod}(Φ × R³),&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;which assigns to the system-level admissibility regime A_S a modulation pattern over the joint pulsation state (φ, Pi_S) ∈ Φ × R³ — the categorical cycle-phase φ ∈ Φ = {exp, contr, trans} jointly with the three-dimensional signature Pi_S = (A, T, δ). The map is part of the deployment's pre-registration; it is not derived from observation but declared in advance, in the same auditability discipline as the W mapsto C_A induction map of XII §4.2.&lt;/p&gt;

&lt;p&gt;The map's image mathrm{Mod}(Φ × R³) is the space of modulation patterns over the joint pulsation state: cycle-phase shaping (which category the system currently occupies, with the modulation determining when transitions between categories occur), amplitude modulation (how strongly the interior expands or contracts), duration modulation (how long the current phase persists), and directional modulation (which substrate region the phase shift is oriented toward). Under mathcal{P}, the master operator's pre-declared A_S is carried at substrate level as a structured modulation pattern across the three signature coordinates and the cycle-phase category.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;A note on the typing of mathrm{Mod}(·).&lt;/em&gt; The space mathrm{Mod}(Φ × R³) is treated here at the architectural-class level as the space of measurable trajectories (or, in substrate-specific deployments, a parameterised family thereof) carrying the deployment's A_S-encoded modulation pattern over time. The precise substrate-specific type-discipline of mathrm{Mod} — whether deterministic trajectory, probability measure over trajectories, parameter-bundle, or other — is owed in substrate-specific companion work; XIII.1 fixes the architectural-class register that mathrm{Mod} inhabits without committing to a single substrate-physics type.&lt;/p&gt;

&lt;h3&gt;
  
  
  3.2 Resonance-bands and phase-resonance
&lt;/h3&gt;

&lt;p&gt;Each component uᵢ in the collection U is, in the pulsation-channel reading, a &lt;strong&gt;phase-tuned subsystem&lt;/strong&gt;: it carries a Will-Embedding W(uᵢ) that specifies (a) a signature-resonance band mathcal{R}ᵢ ⊂eq R³ — the region of three-dimensional signature space within which the component can lock to the signature — and (b) a phase-acceptance map σᵢ: Φ → {0, 1} — the categorical indicator of which cycle-phase categories the component accepts. Both mathcal{R}ᵢ and σᵢ are part of the component's pre-registered architectural commitment, declared at closure registration alongside W(uᵢ).&lt;/p&gt;

&lt;p&gt;&lt;em&gt;A note on phase-acceptance versus phase-blindness.&lt;/em&gt; Two distinct conditions can yield phase-invariant σᵢ on Φ and must be kept separate at the architectural-class register:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Phase-universal (phase-indifferent) acceptance.&lt;/strong&gt; The component can resolve the cycle-phase category φ but the deployment has declared admission under all categories — σᵢ equiv 1 is a deliberate architectural choice. This is a substantive design commitment, not a defect.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Phase-blindness in the sense of ONTOΣ X §VI.&lt;/strong&gt; The component lacks architectural access to the cycle-phase coordinate at all — no implementable σᵢ can condition on φ, so σᵢ is forced to be &lt;strong&gt;constant&lt;/strong&gt; (phase-invariant) by the component's substrate-physics, not chosen. This is an ontological defect per X §VI.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Phase-blindness ⇒ σᵢ is constant on Φ (the architectural constraint forces phase-invariance). The phase-invariance class has two cases: σᵢ equiv 1 (the &lt;strong&gt;admission-enabled phase-blind case&lt;/strong&gt;) and σᵢ equiv 0 (the &lt;strong&gt;degenerate non-participation case&lt;/strong&gt;, in which the component never passes the prefilter and is structurally absent from mathcal{D}^(PC) operation regardless of mathcal{P}(A_S)). Proposition 1 below works on the architecturally-diagnosable condition σᵢ equiv 1 — under it, &lt;strong&gt;trivial phase-acceptance&lt;/strong&gt; suffices to fail phase-discriminative admission, regardless of which underlying condition (deliberate universal acceptance vs forced phase-invariance under admission-enabled phase-blindness) produced the triviality. The stronger reading (phase-blindness as ontological defect) is the substrate-physics sufficient condition that forces σᵢ to be constant; the σᵢ equiv 1 case is the admission-enabled specialisation of phase-blindness covered by Proposition 1, with σᵢ equiv 0 as the degenerate non-participation alternative outside the proposition's scope.&lt;/p&gt;

&lt;p&gt;The substrate-level realisation of XII's CC-WE joint-admissibility check is performed in the pulsation-channel subclass in &lt;strong&gt;two stages&lt;/strong&gt;: first a per-component &lt;strong&gt;local resonance prefilter&lt;/strong&gt;, then the &lt;strong&gt;joint CC-WE admissibility check&lt;/strong&gt; of XII §3.2 applied to the locally-resonant candidate set.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Stage 1 — Local resonance prefilter.&lt;/strong&gt; Define the per-component local resonance predicate&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;mathrm{res}ᵢ(φ(t), Pi_S(t)) \;:=\; σᵢ(φ(t)) \,·\, 𝟙\!left[Pi_S(t) ∈ mathcal{R}ᵢright],&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;returning 1 iff the component's phase-acceptance map accepts the current cycle-phase and the current three-dimensional signature lies within the component's resonance-band. The locally-resonant candidate set at time t is&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;mathcal{R}_(mathrm{loc)}(t) \;:=\; {\,i \,:\, mathrm{res}ᵢ(φ(t), Pi_S(t)) = 1\,}.&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The prefilter is necessary but not sufficient for admission: a component must locally resonate to be even a candidate for admission.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Stage 2 — Joint CC-WE admissibility on the candidate set.&lt;/strong&gt; The admitted index set is&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;I_(adm)(t) \;:=\; mathrm{JointAdm}_(A_S)\!left(mathcal{R}_(mathrm{loc)}(t)right),&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;where mathrm{JointAdm}&lt;em&gt;(A_S) applies the pre-registered W mapsto C_A induction map of XII §4.2 to the candidate set and admits a subset whose induced constraints {C_A(uⱼ)}&lt;/em&gt;(j ∈ I_{adm)} are jointly satisfiable under A_S in the CC-WE sense of XII §3.2 (including the SAT-style higher-order joint-satisfiability checks of XII §3.5). When the locally-resonant candidates are jointly admissible without further filtering, I_(adm)(t) = mathcal{R}&lt;em&gt;(mathrm{loc)}(t); when they are not (SAT-style joint failure), mathrm{JointAdm}&lt;/em&gt;(A_S) excludes a conflicting subset per XII's auditability discipline.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;A note on selection discipline.&lt;/em&gt; Where multiple maximum-cardinality (or, more generally, multiple maximal) jointly-satisfiable subsets of mathcal{R}&lt;em&gt;(mathrm{loc)}(t) exist, the deployment MUST pre-register a deterministic selection rule (e.g. priority ordering on components, lexicographic preference, or substrate-specific tie-break criterion); otherwise mathrm{JointAdm}&lt;/em&gt;(A_S) is underdetermined and the deployment fails F-XIII.1.1's auditability discipline. The selection rule is part of the pre-registered octuple's auditability layer per XIII §3.3.&lt;/p&gt;

&lt;p&gt;The two-stage structure preserves XII's joint-admissibility content: the resonance predicate mathrm{res}ᵢ is a &lt;strong&gt;substrate-level local prefilter&lt;/strong&gt;, not by itself the full CC-WE realisation. Joint admissibility under A_S remains the full criterion. The pulsation-channel subclass specifies how the local prefilter is shaped at substrate level (via mathcal{P}, mathcal{R}ᵢ, σᵢ); it does not replace or collapse the joint CC-WE check.&lt;/p&gt;

&lt;p&gt;When the joint admissibility check succeeds at the candidate set, the component is &lt;strong&gt;admitted&lt;/strong&gt;: it locks to the carrier, its Action Aᵢ executes under admission, and it participates in I_(adm). When the prefilter or the joint check fails, the component is &lt;strong&gt;excluded&lt;/strong&gt;: it does not execute its Action within the system's operational context.&lt;/p&gt;

&lt;p&gt;Admission in the pulsation-channel subclass is therefore not symbolic. It is not the receipt of a token. The local resonance prefilter is the structural fact of resonance — the same fact that a tuning fork either does or does not vibrate in sympathy with a struck bell, conditional on the fork being attuned to the bell's category of strike as well as to its acoustic signature. Where the bell's signature lies in the fork's resonance-band and the strike-category is one the fork accepts, the fork is a local candidate; whether multiple forks rung together produce coherent harmony (joint admissibility) is then a further structural fact, settled by the joint CC-WE check. Components in the pulsation-channel subclass are the corpus-class analogue of such tuning forks; the system's joint pulsation state (φ, Pi_S) under mathcal{P}-modulation is the corpus-class analogue of the struck bell; joint CC-WE admissibility under A_S is the analogue of the requirement that the resonating-fork ensemble together produce coherent rather than destructive interference.&lt;/p&gt;

&lt;h3&gt;
  
  
  3.3 The admission cascade, substrate-level
&lt;/h3&gt;

&lt;p&gt;The direction-down admission cascade of ONTOΣ XIII §3.4&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;(W_S, A_S) \;\;rhd\;\; {W(uᵢ)}_(i ∈ I_{adm)} \;\;rhd\;\; {Aᵢ}_(i ∈ I_{adm)}&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;acquires, in the pulsation-channel subclass, the following substrate-level realisation. The master operator's A_S is realised at substrate level as a modulation pattern mathcal{P}(A_S) ∈ mathrm{Mod}(Φ × R³) that shapes the joint pulsation state (φ(t), Pi_S(t)) across the cycle-phase category and the three signature coordinates. Each component uᵢ either passes the local resonance prefilter at the current state — mathrm{res}ᵢ(φ(t), Pi_S(t)) = 1, equivalently σᵢ(φ(t)) = 1 and Pi_S(t) ∈ mathcal{R}ᵢ both hold — or does not. The locally-resonant candidates mathcal{R}&lt;em&gt;(mathrm{loc)}(t) are then passed through the joint CC-WE admissibility check mathrm{JointAdm}&lt;/em&gt;(A_S) of XII §3.2: the admitted index set I_(adm)(t) = mathrm{JointAdm}&lt;em&gt;(A_S)(mathcal{R}&lt;/em&gt;(mathrm{loc)}(t)) is the subset selected by the deployment's pre-registered selection discipline (cf. §3.2 selection-discipline note) from the set of jointly-satisfiable subsets under A_S. Admitted components execute their Actions Aᵢ under admission. Components that fail either the prefilter or the joint check remain UTAM-units but are not units of S in the closure-complementarity sense at time t.&lt;/p&gt;

&lt;p&gt;The three architectural facts that determined the direction-down character of the cascade in XIII §4.2 — (a) closure signature places A_S as input not output; (b) (W_S, A_S) is fixed at pre-registration before any W(uᵢ) is checked; (c) CC-WE filters {W(uᵢ)} against A_S rather than the reverse — translate, in the pulsation-channel reading, to: (a′) the joint pulsation state (φ, Pi_S) is shaped by mathcal{P}(A_S), not by component dynamics; (b′) mathcal{P}, {mathcal{R}ᵢ}, and {σᵢ} are pre-registered at closure declaration before any component locks; (c′) the resonance predicate filters components against the carrier's current state rather than the reverse. The direction-down cascade and its non-invertibility under T1 (revision) and T2 (aggregation) upward flows of XIII §4.2 Step 5 are preserved without modification.&lt;/p&gt;

&lt;h3&gt;
  
  
  3.4 The pulsation channel is not a new corpus primitive, though it introduces new formal objects
&lt;/h3&gt;

&lt;p&gt;A clarification of status is owed. ONTOΣ XIII.1 introduces several new formal objects — the pulse-modulation declaration map mathcal{P}, the signature-resonance band mathcal{R}ᵢ, the phase-acceptance map σᵢ, the local resonance prefilter mathrm{res}ᵢ, the locally-resonant candidate set mathcal{R}&lt;em&gt;(mathrm{loc)}(t), the joint admissibility operator mathrm{JointAdm}&lt;/em&gt;(A_S), and the pulsation-channel subclass mathcal{D}^(PC). These are new formal objects at the typing level. &lt;strong&gt;What XIII.1 does not introduce is a new corpus primitive&lt;/strong&gt; — a fundamental ontological commitment that the corpus did not previously have. Every new formal object is &lt;strong&gt;typed over already-declared corpus primitives&lt;/strong&gt; — constructed under a pre-registration discipline that recognises pre-existing structural relations, not derived in the strict mathematical-deductive sense:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ONTOΣ X's pulsation regime — three-dimensional signature Pi_S = (A, T, δ) per X §IV jointly with the cycle-phase category φ ∈ Φ per X §III (with phase-blindness as defect per X §VI) — is the substrate over which mathcal{P}'s codomain mathrm{Mod}(Φ × R³) and the bands mathcal{R}ᵢ ⊂eq R³ are typed. No new pulsation primitive is introduced.&lt;/li&gt;
&lt;li&gt;ONTOΣ XIII's &lt;strong&gt;admission cascade&lt;/strong&gt; (W_S, A_S) rhd {W(uᵢ)} rhd {Aᵢ} is the cascade mathrm{res}ᵢ and mathrm{JointAdm}_(A_S) realise at substrate level. No new cascade primitive is introduced.&lt;/li&gt;
&lt;li&gt;ONTOΣ XII's &lt;strong&gt;CC-WE compatibility predicate&lt;/strong&gt; W mapsto C_A induction map (XII §3.2 / §4.2) is the predicate mathrm{JointAdm}_(A_S) operationalises. No new compatibility primitive is introduced.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The distinction is between &lt;strong&gt;primitives&lt;/strong&gt; (corpus-level ontological commitments) and &lt;strong&gt;formal objects&lt;/strong&gt; (typed entities constructed over primitives under XIII.1's pre-registration discipline). XIII.1 adds the latter; it does not add the former. The new formal objects are bookkeeping for a structural integration that the corpus already permitted, not a new architectural axis or a new substrate-level posit. This honest accounting matters because corpus-primitive introduction would require independent justification (substrate-physics derivation, scope-coverage proof, etc.) that XIII.1 does not attempt and does not claim; declared-formal-object introduction over existing primitives requires only that each object is faithfully typed against the cited primitive under pre-registration discipline, which §2 notation + §3.1–§3.3 carry through.&lt;/p&gt;

&lt;p&gt;What ONTOΣ XIII.1 thereby adds is the type-discipline that recognises (i) A_S as a joint modulator of (φ, Pi_S) via mathcal{P}; (ii) components' Will-Embeddings as carriers of signature-resonance bands mathcal{R}ᵢ and phase-acceptance maps σᵢ; (iii) the local resonance predicate mathrm{res}ᵢ as a substrate-level &lt;strong&gt;prefilter&lt;/strong&gt; for XII's CC-WE joint-admissibility check — not a replacement for it. Joint admissibility under A_S via mathrm{JointAdm}_(A_S) remains the full admission criterion; the prefilter narrows the candidate set to the locally-resonant subset before joint satisfiability is evaluated. The integration closes the architectural-class register of XIII §9's substrate-mechanism owed item without enlarging X's primitives: the signature stays three-dimensional, the cycle-phase stays categorical, the joint pair is the carrier the corpus had not previously named as such.&lt;/p&gt;




&lt;h2&gt;
  
  
  4. Structural Reading and Proposition 1
&lt;/h2&gt;

&lt;h3&gt;
  
  
  4.1 Structural reading of the admission cascade through the pulsation channel
&lt;/h3&gt;

&lt;p&gt;Under the premises of ONTOΣ XIII Theorem ONTOΣ-XIII.1 (closure-complementarity-conformance, well-formed master operator, pre-registration discipline) &lt;strong&gt;extended&lt;/strong&gt; to the pulsation-channel subclass mathcal{D}^(PC) by the declaration of mathcal{P}: A_S → mathrm{Mod}(Φ × R³) together with the signature-resonance bands {mathcal{R}ᵢ}ᵢ₌₁ⁿ and phase-acceptance maps {σᵢ}ᵢ₌₁ⁿ, the direction-down admission cascade&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;(W_S, A_S) \;rhd\; {W(uᵢ)}_(i ∈ I_{adm)} \;rhd\; {Aᵢ}_(i ∈ I_{adm)}&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;is substrate-level realised in two stages:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;mathcal{P}(A_S)  shapes  (φ(t), Pi_S(t)) \;implies\; mathcal{R}_(mathrm{loc)}(t) = {i : mathrm{res}ᵢ(φ(t), Pi_S(t)) = 1} \;implies\; I_(adm)(t) = mathrm{JointAdm}_(A_S)(mathcal{R}_(mathrm{loc)}(t)) \;implies\; {Aᵢ}_(i ∈ I_{adm)(t)}  execute under admission.&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The substrate-level realisation &lt;strong&gt;inherits&lt;/strong&gt; the direction-down character of XIII Theorem ONTOΣ-XIII.1 and the non-invertibility under T1/T2 upward flows of §4.2 Step 5: mathcal{P}, {mathcal{R}ᵢ}, and {σᵢ} are pre-registered, and the local resonance prefilter mathrm{res}ᵢ and the joint admissibility operator mathrm{JointAdm}_(A_S) are both one-directional (the carrier filters components; components do not aggregate to shape the carrier within the theorem's scope).&lt;/p&gt;

&lt;p&gt;The reading is structural, not metaphorical. The objects involved — φ(t), Pi_S(t), mathcal{P}, mathcal{R}ᵢ, σᵢ, mathrm{res}ᵢ, mathrm{JointAdm}_(A_S) — are formal entities in the corpus's existing apparatus (X's signature and cycle-phase; XIII's master operator and admission cascade; XII's CC-WE predicate and W → C_A induction discipline). The reading is the explicit assertion that these formal entities, taken together, supply the substrate-mechanism XIII §9 left owed.&lt;/p&gt;

&lt;h3&gt;
  
  
  4.2 Proposition 1 — Trivial Phase-Acceptance Fails Phase-Discriminative Admission
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Proposition 1 (Trivial Phase-Acceptance Fails Phase-Discriminative Admission).&lt;/strong&gt; &lt;em&gt;Assume: (i) S is in the pulsation-channel subclass mathcal{D}^(PC) per §3; (ii) the pulsation regime is non-degenerate over the evaluation window — both the three-dimensional signature Pi_S(t) = (A, T, δ) and the cycle-phase category φ(t) vary structurally per X §III / §IV (the system genuinely pulsates, alternating expansion and contraction phases with asymmetry along A, T, δ); (iii) the deployment's pulse-modulation declaration map mathcal{P} is **discriminative at uᵢ with signature membership controlled&lt;/em&gt;* in the sense that there exist times t₁, t₂ on a structurally non-vanishing subset of the window with φ(t₁) ≠ φ(t₂) AND 𝟙[Pi_S(t₁) ∈ mathcal{R}ᵢ] = 𝟙&lt;a href="//i.e.,%20signature-band%20membership%20is%20constant%20across%20the%20phase%20pair,%20so%20any%20intended%20admission%20difference%20is%20carried%20by%20%CF%86%20alone,%20not%20by%20Pi_S%20crossing%20the%20boundary%20of%20mathcal{R}%E1%B5%A2"&gt;Pi_S(t₂) ∈ mathcal{R}ᵢ&lt;/a&gt; — at which the deployment's pre-registered modulation-and-tuning architecture (mathcal{P}, {mathcal{R}ⱼ}, {σⱼ}) — encoded jointly via mathcal{P}(A_S)'s shaping of (φ, Pi_S) together with the declared mathcal{R}ᵢ, σᵢ — specifically intends uᵢ's local-resonance prefilter outcome to differ between φ(t₁) and φ(t₂). Let uᵢ be a component whose phase-acceptance map is trivial — σᵢ equiv 1 on Φ. Then uᵢ's local resonance prefilter outcome mathrm{res}ᵢ(φ(t), Pi_S(t)) is determined solely by Pi_S(t) ∈ mathcal{R}ᵢ, with the cycle-phase category φ(t) irrelevant to the prefilter test. On the structurally non-vanishing subset of the window on which mathcal{P}(A_S) uses φ discriminatively for uᵢ, the prefilter outcome diverges from the deployment's intended phase-discriminative prefilter pattern for uᵢ; admission uᵢ ∈ I_(adm)(t) — which by §3.3 requires prefilter passage plus joint CC-WE satisfiability — fails the deployment's intent independently of the joint-stage outcome.*&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Corollary (Phase-Blindness ⇒ Phase-Invariance; admission-enabled case ⇒ Proposition 1 failure pattern).&lt;/strong&gt; &lt;em&gt;A phase-blind component in the sense of ONTOΣ X §VI — one whose substrate-physics denies it access to the cycle-phase coordinate — is architecturally forced into **phase-invariant&lt;/em&gt;* σᵢ (constant on Φ). The phase-invariance class has two cases: the admission-enabled case σᵢ equiv 1 inherits the failure pattern of Proposition 1 under any deployment whose mathcal{P} is discriminative at the component; the degenerate non-participation case σᵢ equiv 0 falls outside Proposition 1's scope (the component never passes the prefilter and is structurally absent from mathcal{D}^(PC) operation). Phase-blindness is the substrate-physics sufficient condition that forces phase-invariance; trivial phase-acceptance (σᵢ equiv 1) is the architecturally-diagnosable admission-enabled specialisation of phase-invariance, and it is the case Proposition 1 covers.*&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Proof (by structural derivation).&lt;/strong&gt; Under σᵢ equiv 1, the local resonance prefilter reduces:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;mathrm{res}ᵢ(φ(t), Pi_S(t)) \;=\; 1 · 𝟙\!left[Pi_S(t) ∈ mathcal{R}ᵢright] \;=\; 𝟙\!left[Pi_S(t) ∈ mathcal{R}ᵢright],&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;independent of φ(t). By premise (iii) (discriminative-at-uᵢ with signature membership controlled), there exist times t₁, t₂ in the evaluation window — on a structurally non-vanishing subset — with φ(t₁) ≠ φ(t₂) AND 𝟙[Pi_S(t₁) ∈ mathcal{R}ᵢ] = 𝟙[Pi_S(t₂) ∈ mathcal{R}ᵢ], on which the deployment's pre-registered mathcal{P}(A_S) specifically encodes a phase-discriminative prefilter intent for uᵢ (intended prefilter passage under φ(t₁), intended failure under φ(t₂), or vice versa). Under signature-membership control, the trivially-phase-accepting component uᵢ yields the &lt;strong&gt;same&lt;/strong&gt; prefilter outcome at t₁ and t₂ — both 1 (if Pi_S ∈ mathcal{R}ᵢ at both) or both 0 (if Pi_S ∉ mathcal{R}ᵢ at both) — and cannot realise the deployment's intended distinction across the phase pair. Because admission uᵢ ∈ I_(adm)(t) requires prefilter passage (Stage 1 of §3.2's two-stage construction) before joint CC-WE evaluation (Stage 2), the prefilter-stage failure of intent propagates to the admission-stage failure of intent regardless of the joint-stage outcome at t. The component remains a UTAM-unit but cannot participate in S's phase-discriminative admission of uᵢ in the closure-complementarity sense at those times. By premise (ii), the cycle-phase variation supplies the operational substrate on which (iii) is meaningful — without genuine phase variation the discriminative-at-uᵢ premise is vacuous, but premise (ii) guarantees the phases alternate structurally. square&lt;/p&gt;

&lt;h3&gt;
  
  
  4.3 What the proposition establishes (and what it does not)
&lt;/h3&gt;

&lt;p&gt;The proposition establishes that trivial phase-acceptance at the component layer — formally, σᵢ equiv 1 on Φ, whether produced by deliberate phase-universal acceptance or by phase-blindness in the X §VI sense — is a structural reason for admission failure in the pulsation-channel subclass under deployment-side phase-discriminative modulation. The corollary specialises this to phase-blindness as the substrate-physics sufficient condition that forces trivial acceptance; the proposition itself works on the architecturally-diagnosable weaker condition. Together they realise ONTOΣ X's "phase-blindness as ontological defect" at the inter-layer admission boundary, and they extend it: even deployments where a component is &lt;em&gt;deliberately&lt;/em&gt; phase-universal in its acceptance fail phase-discriminative admission, regardless of whether the underlying cause is ontological defect or architectural design choice.&lt;/p&gt;

&lt;p&gt;What the proposition does not establish: it does not enumerate the substrate-specific forms of resonance-band specification; it does not derive the pulse-modulation declaration map mathcal{P} from first principles; it does not specify quantitative thresholds for resonance. These are continuing-programme items, owed in substrate-specific companion work.&lt;/p&gt;

&lt;p&gt;The proposition also does not extend automatically to architectures outside mathcal{D}^(PC). Architectures that decline the pulsation-channel declaration (mathcal{P}, {mathcal{R}ᵢ}, and {σᵢ} not in the pre-registered octuple) lie outside the present subclass and are not addressed.&lt;/p&gt;

&lt;h3&gt;
  
  
  4.4 Discussion: how this completes XIII's Proposition XIII.1.1 substrate-mechanically
&lt;/h3&gt;

&lt;p&gt;ONTOΣ XIII's Proposition XIII.1.1 (Non-Derivability of the Master Will) — distinct from XIII.1's Proposition 1 above; the labels are different objects in different works — established that W_S is not a function of {W(uᵢ)} alone: two distinct admissible W_S choices can admit the same component set. The proof was at the architectural-class level: it constructed two systems S, S' over the same component collection with the same component Will-Embeddings but distinct master Will-Embeddings.&lt;/p&gt;

&lt;p&gt;The pulsation-channel reading supplies the substrate-level &lt;em&gt;why&lt;/em&gt; of this non-derivability. Each component uᵢ has a signature-resonance band mathcal{R}ᵢ and a phase-acceptance map σᵢ — it sees only the slice of joint pulsation state (φ, Pi_S)-space within which both conditions admit it. The full carrier mathcal{P}(A_S) that shapes (φ(t), Pi_S(t)) is modulated by the master operator at the system layer; no single component sees the full modulation, only its own joint signature-resonance + phase-acceptance window. The information needed to reconstruct W_S — the full carrier pattern — is therefore underdetermined by the components' observed admission states, &lt;strong&gt;absent a declared tomographic completeness assumption&lt;/strong&gt;: unless the deployment additionally declares (i) a tomographically complete component family whose joint (mathcal{R}ᵢ, σᵢ) probes cover the operative image of mathcal{P}(A_S) across Φ × R³, and (ii) an admissible reconstruction channel from the component-side admission record back to the carrier pattern, the carrier remains non-reconstructible from component observations. XIII.1 does not assume such completeness; the default architectural case is the non-tomographically-complete one, under which the carrier is underdetermined regardless of how many components participate.&lt;/p&gt;

&lt;p&gt;Two distinct master Will-Embeddings W_S, W_(S') that lead to distinct A_S, A_(S') but identical joint-pulsation-state &lt;em&gt;intersections&lt;/em&gt; with the (non-tomographically-complete) component family's resonance + acceptance regions produce identical &lt;strong&gt;prefilter-stage&lt;/strong&gt; outcomes: mathcal{R}_(mathrm{loc)}(t) coincides under both deployments.&lt;/p&gt;

&lt;p&gt;Full-admission coincidence requires an additional condition at Stage 2: mathrm{JointAdm}&lt;em&gt;(A_S) and mathrm{JointAdm}&lt;/em&gt;(A_{S')} must also produce identical outputs on the (coinciding) locally-resonant candidate set. Since A_S ≠ A_(S') by hypothesis, the two joint-admissibility operators apply distinct CC-WE constraint structures, and they may distinguish the two systems at the joint stage. The substrate-level non-derivability argument therefore decomposes into two layers:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Prefilter-stage non-derivability (default architectural case).&lt;/strong&gt; Under non-tomographic completeness, components see only their own (mathcal{R}ᵢ, σᵢ) slice of the carrier. When the intersections of mathcal{P}(A_S) and mathcal{P}(A_(S')) with each slice coincide, prefilter outcomes — and hence the locally-resonant candidate set mathcal{R}_(mathrm{loc)} — coincide. This is a structurally non-vanishing outcome class, not a knife-edge coincidence: the slice-intersections defining it have positive measure under generic mathcal{P}-modulation on the non-tomographically-complete family.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Joint-stage residual distinguishability (counterbalance).&lt;/strong&gt; Even when prefilter outcomes coincide, mathrm{JointAdm}&lt;em&gt;(A_S) vs mathrm{JointAdm}&lt;/em&gt;(A_{S')} may differ on the same candidate set, producing distinguishable I_(adm)(t). The two-stage architecture therefore preserves substrate-level non-derivability &lt;strong&gt;at the prefilter stage&lt;/strong&gt; while admitting residual joint-stage distinguishability — the latter is a constraint on how indistinguishable the deployments can be at the full admission register, not a contradiction.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Component-observable non-derivability is therefore a joint property: components see their own {(mathrm{res}ᵢ, uᵢ ∈ I_(adm)(t))} history, which jointly depends on Stage 1 (their own slice intersections) and Stage 2 (the joint check that constraints them under A_S). XIII's architectural-level non-derivability (Proposition XIII.1.1) is fully preserved: even when joint-stage residual distinguishability exists, the deployment-specific A_S that drives Stage 2 is itself a substrate-level invisible from components — they observe only the resulting I_(adm)(t), not the A_S producing it. The architectural fact XIII proved abstractly — non-derivability — receives, in the pulsation-channel reading, a substrate-physics explanation: components are resonance-tuned and phase-acceptance-tuned slices of the carrier, not full-carrier observers — and the default architectural register does not declare them tomographically complete.&lt;/p&gt;




&lt;h2&gt;
  
  
  5. Relation to Existing Corpus
&lt;/h2&gt;

&lt;h3&gt;
  
  
  5.1 To ONTOΣ X
&lt;/h3&gt;

&lt;p&gt;ONTOΣ X (Barziankou, May 2026; DOI &lt;a href="https://doi.org/10.5281/zenodo.19614567" rel="noopener noreferrer"&gt;10.5281/zenodo.19614567&lt;/a&gt;, with Bitcoin OTS timestamp and GPG-signed deposit) is the corpus's &lt;strong&gt;foundational formal statement of the pulsation primitive&lt;/strong&gt; and the priority origin of the pulsation framework treated here. X formalised pulsation as the structural rhythm of the admissible interior: the three-dimensional signature Pi(t) = (A, T, δ) of amplitude, duration, and directional asymmetry (X §IV); the cycle-phase category φ ∈ Φ = {exp, contr, trans} (X §III); phase-aware will as the third layer of will ontology (X §VII); phase-blindness as ontological defect (X §VI). X's primitives apply to a single system reading its own pulse.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Priority and inheritance.&lt;/strong&gt; The formal corpus-class statement of the pulsation primitive — phase / amplitude / duration / direction as the structural rhythm of non-monotone bounded interiors — originates in ONTOΣ X (May 2026). XIII.1 inherits this primitive without contesting or claiming its origin; the priority of the formal framework belongs to X under its established deposit timestamp. Adjacent literatures or commentaries on "pulsation" post-dated by X's deposit and not citing X's formalisation are not in conflict with the present work; they are separate substrate-physics or empirical traditions whose relation to X's primitive is the subject of corpus-relation analysis, not of this bridge-note.&lt;/p&gt;

&lt;p&gt;ONTOΣ XIII.1 lifts X's pulsation primitive from system-internal phase-awareness to inter-layer admission channel. The joint pulsation state (φ(t), Pi_S(t)) — the same hybrid object X declared (categorical cycle-phase + three-dimensional signature) — now serves as the &lt;strong&gt;carrier&lt;/strong&gt; of master-operator admission to components, with mathcal{P} as the joint modulation map, {mathcal{R}ᵢ} as the component-side signature tuning, and {σᵢ} as the component-side phase-acceptance commitment. X gives the rhythm; XIII.1 gives the channel that the rhythm carries.&lt;/p&gt;

&lt;h3&gt;
  
  
  5.2 To ONTOΣ XIII
&lt;/h3&gt;

&lt;p&gt;ONTOΣ XIII fixed the master operator M_S = (S, W_S, A_S) and the direction-down admission cascade, with non-invertibility scoped to T1 (revision) and T2 (aggregation) upward flows. XIII §9 bullet 1 named the substrate-mechanism of master-operator direction carrying as an owed continuing-programme item.&lt;/p&gt;

&lt;p&gt;ONTOΣ XIII.1 closes the &lt;strong&gt;architectural-class register&lt;/strong&gt; of that owed item by specifying the substrate-mechanism type-discipline as the pulsation channel. Substrate-specific realisations of mathcal{P}, {mathcal{R}ᵢ}, {σᵢ}, the physical basis of resonance, and the engineering instantiation of mathrm{JointAdm}_(A_S) remain owed in substrate-specific companion work (§9). The structural reading of §4.1 inherits XIII's direction-down character and non-invertibility scope without modification; it adds the architectural-class register through which the substrate-physics layer can be subsequently typed.&lt;/p&gt;

&lt;h3&gt;
  
  
  5.3 To ONTOΣ XII
&lt;/h3&gt;

&lt;p&gt;XII's closure operation mathrm{closure}(U, R, A) → S constitutes S as an operator (per §3.3 of XII). The pulsation-channel reading extends the closure operation's effect: closure not only constitutes S as operator (XI apparatus well-defined at system layer); it also constitutes the substrate channel through which A_S propagates as mathcal{P}(A_S) over the joint pulsation state (φ, Pi_S). XII's auditability clause (the W mapsto C_A induction map pre-registered and non-revisable) extends, by the same architectural logic, to the pulse-modulation declaration map mathcal{P}, the signature-resonance bands {mathcal{R}ᵢ}, and the phase-acceptance maps {σᵢ} — all part of the deployment's pre-registered octuple.&lt;/p&gt;

&lt;h3&gt;
  
  
  5.4 To ONTOΣ XI
&lt;/h3&gt;

&lt;p&gt;XI's holding field H(t), semantic load field Λ(t) = (Sₒₚ, νₒₚ, cₒₚ), and operator-relative chaos predicate χₒₚ(R) supply the &lt;strong&gt;geometric substrate&lt;/strong&gt; on which the pulsation signature is shaped. The pulse-signature Pi_S(t) at the system layer (per XIII §3.1 M3's XI-inheritance) lives in the geometric apparatus H_S, Λ&lt;em&gt;S, χ&lt;/em&gt;(op,S) that XI fixed and XIII inherited. The directional orientation of pulsation — δ, the directional asymmetry of the signature — aligns with the charge function c_(op,S) of Λ&lt;em&gt;S, which gives directional orientation in semantic space. The chaos predicate χ&lt;/em&gt;(op,S)(R) reports when the signature's structural coherence breaks down — i.e., when modulation has collapsed and Pi_S degenerates to DC or noise.&lt;/p&gt;

&lt;h3&gt;
  
  
  5.5 To IIC v2.1 and the Identifiability Bridge
&lt;/h3&gt;

&lt;p&gt;IIC v2.1 §3.2 named ΔE 4.7.3b as the corpus's first declared control-grade EVS instance, an embedded control system implementing the IIC formula as its primary control variable, with the operator role implicit in the control loop (IIC §3.2 line 668: "no architecturally separate operator entity"). The pulsation-channel reading places ΔE 4.7.3b in mathcal{D}^(PC) &lt;strong&gt;by inheritance&lt;/strong&gt; through the CC→operator-internal-extended chain of IIC v2.1 §3.5 line 722; ΔE inhabits mathcal{D}^(PC) in the inheritance-reading sense, with its operator role collapsed into the control loop per IIC §3.2 rather than realised as a separate (W_S, A_S) pair declared at the system layer. Its declared coherence-aware control is, on the inheritance reading, a control-substrate realisation of the pulsation-channel admission mechanism. Internal architectural specifics of ΔE 4.7.3b are documented under separate disclosure discipline and are not exposed here.&lt;/p&gt;

&lt;p&gt;The Identifiability Bridge supplies the conditional-structural-theorem typing convention used throughout XIII and inherited by XIII.1. The Bridge's BDP and its ι_X separation margin are not invoked here; the present work operates on the admission-channel side, not the property-detection side, but the typing discipline is shared.&lt;/p&gt;




&lt;h2&gt;
  
  
  6. Engineering Candidate — Public Surface Only
&lt;/h2&gt;

&lt;p&gt;The corpus's first declared engineering candidate for the pulsation-channel architectural class — &lt;strong&gt;under the inheritance-reading interpretation&lt;/strong&gt; detailed below, not under direct architectural declaration of a separate master operator — is &lt;strong&gt;ΔE 4.7.3b&lt;/strong&gt;, named in IIC v2.1 §3.2 ("ΔE 4.7.3b — First Control-Grade EVS"). The public surface of the declaration — what IIC v2.1 makes publicly available — is:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ΔE 4.7.3b is a &lt;strong&gt;control-grade&lt;/strong&gt; EVS instance, with the operator implicit in the control loop and no architecturally separate operator entity (per IIC v2.1 §3.2);&lt;/li&gt;
&lt;li&gt;it implements the IIC formula as its primary control variable;&lt;/li&gt;
&lt;li&gt;it is the first such candidate the corpus declares in the control-grade subclass (with non-emptiness of the control-grade EVS subclass asserted in IIC v2.1 §3.2);&lt;/li&gt;
&lt;li&gt;its full technical specification is held under separate documentation; no academic DOI for the engineering specification is yet registered.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;ONTOΣ XIII.1 places ΔE 4.7.3b inside the pulsation-channel subclass mathcal{D}^(PC) &lt;strong&gt;by inheritance&lt;/strong&gt; through IIC v2.1 §3.5's chain: closure-complementarity-conformant deployments are operator-internal-extended-conformant (per ONTOΣ XII §0 / IIC v2.1 §3.5 line 722). The closure-complementarity-conformance of ΔE is asserted by the present work as the architectural-class reading; its operator-internal-extended status follows from that reading via the chain. The inheritance is structural, not direct: ΔE does not architecturally declare a separate master operator M_S = (S, W_S, A_S) in the strong sense — its operator role is collapsed into the control loop per IIC §3.2 line 668 ("the 'operator' in ΔE's IIC cycle is implicit in the control loop itself: there is no architecturally separate operator entity with its own residual temporal geometry"). The architectural-class register mathcal{D}^(PC) that ONTOΣ XIII.1 fixes accepts ΔE as &lt;strong&gt;the first declared engineering candidate in the inheritance-reading sense&lt;/strong&gt; — first declared candidate whose substrate-mechanism matches the pulsation-channel reading at the implicit-operator register (pending substrate-specific disclosure of mathcal{P}, {mathcal{R}ᵢ}, {σᵢ}, mathrm{JointAdm}&lt;em&gt;(A_S)). The internal mechanism specification — which substrate-layer pulse-modulation declaration map mathcal{P}, which component resonance-bands {mathcal{R}ᵢ}, which phase-acceptance maps {σᵢ}, which mathrm{JointAdm}&lt;/em&gt;(A_S) selection discipline, which specific substrate-physics implementation of the local resonance prefilter — these are deployment-side engineering documentation outside the scope of the present architectural-class register, held under separate disclosure discipline.&lt;/p&gt;

&lt;p&gt;What the present work asserts about ΔE 4.7.3b is therefore narrow and explicit: it is the corpus's first declared engineering candidate of mathcal{D}^(PC) &lt;strong&gt;under the inheritance-reading interpretation&lt;/strong&gt; (control-grade with implicit operator; CC-conformance asserted by XIII.1; operator-internal-extended status inherited via the chain), pending substrate-specific disclosure of mathcal{P}, {mathcal{R}ᵢ}, {σᵢ}, mathrm{JointAdm}_(A_S); the architectural-class register is what XIII.1 fixes; the engineering register is documented elsewhere. The reader interested in the engineering specifics is referred to IIC v2.1 §3.2 and to subsequent substrate-specific publications; the reader interested in the architectural-class register reads it here.&lt;/p&gt;

&lt;p&gt;Substrate-paradigmatic examples beyond control — biological respiratory-cardiovascular coupling (rhythm-based inter-organ coordination), linguistic prosody (the prosodic modulation of speech as a pulsation-channel realisation of speaker-to-listener admission), and others — are gestured at as candidate substrate classes for mathcal{D}^(PC) instantiation. Their formal substrate-specific instantiation is owed in companion work; the architectural-class register accepts them as candidate substrates without specifying them substantively.&lt;/p&gt;




&lt;h2&gt;
  
  
  7. Falsification Surface F-XIII.1.1
&lt;/h2&gt;

&lt;p&gt;The deepest commitment of ONTOΣ XIII.1 is operationally checkable through one falsification protocol, named F-XIII.1.1 in continuity with the F-XIII.1–3 surface of XIII §7.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;F-XIII.1.1 — Phase-Resonance Integrity Check.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conformance criterion.&lt;/strong&gt; A pulsation-channel-subclass deployment has, at the architectural-declaration archive, (a) a pre-registered pulse-modulation declaration map mathcal{P}: A_S → mathrm{Mod}(Φ × R³) specifying how A_S jointly shapes the cycle-phase category and three-dimensional signature; (b) pre-registered signature-resonance bands {mathcal{R}ᵢ}ᵢ₌₁ⁿ for each component; (c) pre-registered phase-acceptance maps {σᵢ}ᵢ₌₁ⁿ; (d) a pre-registered joint CC-WE admissibility operator mathrm{JointAdm}&lt;em&gt;(A_S) that takes the locally-resonant candidate set mathcal{R}&lt;/em&gt;(mathrm{loc)}(t) and returns I_(adm)(t); (e) operational evidence that the two-stage construction (local prefilter → joint admissibility) tracks observed admission events — i.e., observed uᵢ ∈ I_(adm)(t) states are consistent with the prefilter mathrm{res}ᵢ(φ(t), Pi_S(t)) followed by the declared joint admissibility check, within a declared tolerance.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Test procedure.&lt;/strong&gt; Audit the deployment's pre-registration archive for mathcal{P}, {mathcal{R}ᵢ}, {σᵢ}, and the mathrm{JointAdm}_(A_S) selection discipline. Operationally, record the cycle-phase category φ(t) and the three-dimensional signature Pi_S(t) over the evaluation window jointly with the components' admission state across {0, 1}ⁿ. The audit then proceeds in two layers:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(i) Full two-stage admission scoring.&lt;/strong&gt; Compute the model's predicted admitted set widehat{I}&lt;em&gt;(adm)(t) := mathrm{JointAdm}&lt;/em&gt;(A_S)(mathcal{R}&lt;em&gt;(mathrm{loc)}(t)) via the declared prefilter mathrm{res}ᵢ followed by the declared joint-admissibility operator with its pre-registered selection rule. Compare widehat{I}&lt;/em&gt;(adm)(t) with observed I_(adm)(t) using a &lt;strong&gt;pre-registered scoring functional&lt;/strong&gt; Q_(adm) — declared at deployment commissioning and substrate-appropriate to the mixed data types involved (binary admission states, categorical φ, continuous Pi_S(t), autocorrelated time series, multiple components). Candidate scoring functionals include accuracy, balanced accuracy, mutual information I(widehat{I}&lt;em&gt;(adm); I&lt;/em&gt;(adm)), log-likelihood scores, or time-lagged agreement. The deployment declares which Q_(adm) applies and the threshold ρ&lt;em&gt;(adm) that pre-registered Q&lt;/em&gt;(adm) must meet.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(ii) Local prefilter as necessary-condition audit.&lt;/strong&gt; Independently verify the necessary-condition relation: uᵢ ∈ I_(adm)(t) implies mathrm{res}ᵢ(φ(t), Pi_S(t)) = 1 — i.e., an admitted component must have passed the local prefilter at t. Violations of this implication indicate either a deployment-side override channel outside mathcal{D}^(PC) (which the deployment must pre-declare to remain conformant) or an inconsistency between declared mathrm{res}ᵢ and observed admission, both of which fail F-XIII.1.1.&lt;/p&gt;

&lt;p&gt;The audit must additionally verify all three substrate-mechanism architectural commitments independently: (a) mathcal{P}'s operative image must use the cycle-phase coordinate discriminatively on a structurally non-vanishing subset of the evaluation window — i.e., the modulation actually shapes φ, not just Pi_S; a deployment whose mathcal{P}(A_S) image is constant in φ is phase-indifferent at the carrier layer regardless of component-side declarations; (b) mathcal{R}ᵢ is signature-band substantive (non-trivial proper subset of R³); (c) {σᵢ} is non-trivial in aggregate — at least some components are phase-discriminative (σᵢ notequiv 1); a deployment whose σᵢ equiv 1 for all components is a trivially-phase-accepting deployment and falls under Proposition 1's failure pattern at the deployment level.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Failure condition.&lt;/strong&gt; F-XIII.1.1 fails if (a) any of mathcal{P}, {mathcal{R}ᵢ}, {σᵢ}, or the mathrm{JointAdm}&lt;em&gt;(A_S) selection discipline are missing from the archive, or (b) the pre-registered full-admission scoring functional Q&lt;/em&gt;(adm) on widehat{I}&lt;em&gt;(adm) vs I&lt;/em&gt;(adm) does not meet the declared threshold ρ&lt;em&gt;(adm), or (c) the necessary-condition implication uᵢ ∈ I&lt;/em&gt;(adm)(t) implies mathrm{res}ᵢ = 1 is violated without a pre-declared override-channel justification. Failure indicates either (i) the deployment is not in mathcal{D}^(PC) (it does not operate via the pulsation channel), or (ii) the deployment claims mathcal{D}^(PC)-membership but its actual admission mechanism is incompatible with the prefilter + joint-admissibility structure of §3.2 — i.e., its admission decisions are made by some other substrate-mechanism that ONTOΣ XIII.1 does not address.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Operational stakes.&lt;/strong&gt; F-XIII.1.1 distinguishes pulsation-channel deployments from other substrate-mechanism realisations of direction-down admission. Deployments outside mathcal{D}^(PC) may realise direction-down admission through substrate-mechanisms not addressed by XIII.1 (compiled-protocol architectures, fixed-codebook signal pipelines, and similar discrete-channel architectures outside the operator-internal-extended subclass per §1.4). Such deployments are not in conflict with XIII.1; they simply lie outside the architectural class XIII.1 specifies and would require their own substrate-mechanism analysis under their own conformance class.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Falsification scope.&lt;/strong&gt; F-XIII.1.1 tests &lt;em&gt;deployment conformance to pulsation-channel-subclass commitments&lt;/em&gt;, not the structural reading or proposition of §4 themselves. The structural reading is an architectural-class result; the proposition derives from declared premises. A deployment's failure of F-XIII.1.1 falsifies the deployment's claim to membership in mathcal{D}^(PC), not the architectural-class register. This is the same falsification structure ONTOΣ XI §8, ONTOΣ XII §6 (F-CC), the Identifiability Bridge §5 (F-Ident-1..5), and ONTOΣ XIII §7 (F-XIII.1–3) inhabit.&lt;/p&gt;




&lt;h2&gt;
  
  
  8. What ONTOΣ XIII.1 Does Not Claim
&lt;/h2&gt;

&lt;p&gt;The architectural-class register of ONTOΣ XIII.1 addresses a specific question — the substrate-mechanism by which the master operator's pre-declared direction propagates to components in the pulsation-channel subclass — and stops there. Several adjacent questions lie outside its scope.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;It does not specify substrate-specific pulse-modulation declaration maps.&lt;/strong&gt; The map mathcal{P}: A_S → mathrm{Mod}(Φ × R³) is declared by the deployment at the architectural-class level; specific substrate-physics instantiations (for control substrates, for biological substrates, for linguistic-governance substrates) are owed in substrate-specific companion work.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;It does not derive resonance from first principles.&lt;/strong&gt; The local resonance prefilter mathrm{res}ᵢ is declared as the substrate-level prefilter through which CC-WE joint admissibility is then evaluated. The physical basis of the resonance — what tuning fork mechanism the components implement, what carrier mechanism the system implements — is substrate-specific and is not addressed at the architectural-class register.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;It does not claim that pulsation is the only substrate-mechanism for XIII's direction-down cascade.&lt;/strong&gt; Deployments realising the cascade through other substrate-mechanisms (decoded tokens, voting aggregation, signal routing) lie outside mathcal{D}^(PC). Per §1.4, such alternative substrate-mechanisms are architecturally unnatural within the operator-internal-extended subclass that holds NC2.5 v2.1's commitments; they may apply to deployments outside that subclass under their own conformance disciplines. ONTOΣ XIII.1 names one architectural-class register — the pulsation channel — and leaves space for others, scope-limited to the operator-internal-extended subclass as in §1.4.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;It does not expose ΔE 4.7.3b's engineering specification.&lt;/strong&gt; The first declared engineering candidate is cited at IIC v2.1 §3.2's public surface only. The internal architectural specifics of ΔE 4.7.3b are held under separate documentation and are not exposed in the present work. The architectural-class register is what ONTOΣ XIII.1 fixes; the engineering register is owed elsewhere.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;It does not extend automatically to architectures outside the operator-internal-extended subclass.&lt;/strong&gt; XIII's M3 inheritance and the present work's geometric anchoring on XI's H_S, Λ&lt;em&gt;S, χ&lt;/em&gt;(op,S) both presuppose the operator-internal-extended subclass commitments. Architectures outside this subclass have their own observability and communication profiles which the present work does not address.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;It does not contradict the triptych closure of ONTOΣ XIII.&lt;/strong&gt; The triptych XI (interior) / XII (composition) / XIII (direction) closes the architectural-class register at three axes. ONTOΣ XIII.1 is a depth-extension within XIII's third axis (filling §9 bullet 1's owed item); it does not open a fourth axis.&lt;/p&gt;




&lt;h2&gt;
  
  
  9. Continuing Programme
&lt;/h2&gt;

&lt;p&gt;The present work supplies the architectural-class register of the pulsation channel. Several items lie outside its scope.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Substrate-specific pulse-modulation declaration maps.&lt;/strong&gt; mathcal{P}: A_S → mathrm{Mod}(Φ × R³) is declared at the architectural-class level. &lt;em&gt;Owed:&lt;/em&gt; substrate-specific companion papers specifying mathcal{P} for control, biological, perceptual, linguistic/governance substrates.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Substrate-specific resonance-band and phase-acceptance specifications.&lt;/strong&gt; {mathcal{R}ᵢ} and {σᵢ} are declared at the architectural-class level. &lt;em&gt;Owed:&lt;/em&gt; substrate-specific specifications of how component signature-resonance bands and phase-acceptance maps are realised in each substrate's physics.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Quantitative resonance margin.&lt;/strong&gt; The local resonance prefilter mathrm{res}ᵢ is binary in the present register. &lt;em&gt;Owed:&lt;/em&gt; a substrate-relative quantitative resonance margin (analogous to the Identifiability Bridge's ι_X(δ) for property detection), specifying how strongly a component locks to the carrier under bounded modulation noise.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Empirical execution of F-XIII.1.1.&lt;/strong&gt; The protocol is pre-registration-ready in §7; execution awaits deployment-side collaboration.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Comparison with non-pulsation substrate-mechanisms.&lt;/strong&gt; ONTOΣ XIII.1 names one architectural-class register; deployments realising XIII's cascade via other substrate-mechanisms are not addressed here. &lt;em&gt;Owed:&lt;/em&gt; a comparative-class register for non-pulsation realisations of the direction-down cascade.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Higher-layer pulsation channels.&lt;/strong&gt; Per ONTOΣ XIII §9, multi-layer master-operator hierarchies are continuing-programme items. The pulsation channel's behaviour across multi-layer closures — whether and how pulsation signatures compose across layers — is part of the same owed scope.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Engineering documentation of ΔE 4.7.3b and successors.&lt;/strong&gt; The first declared engineering candidate is cited at the public surface only. Engineering-side documentation is held separately under its own disclosure discipline.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Architectural risk catalogue and mitigation discipline.&lt;/strong&gt; Five failure modes are identified at the architectural-class register; each requires substrate-specific mitigation discipline in companion work:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Second control loop via reactive modulation.&lt;/strong&gt; Risk that mathcal{P} is adjusted reactively based on component admission rates or operational feedback, violating pre-registration and direction-down invariants. Mitigation: pre-registration archive timestamp + immutability check; declared adaptation envelope (per XIII §4.2 Step 5 T1 definition) audited at deployment commissioning.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Metric gaming on F-XIII.1.1.&lt;/strong&gt; Risk that deployments choose lenient Q_(adm) or low ρ&lt;em&gt;(adm), passing audit without genuine phase-resonance mediation. Sub-risk: components declare artificially broad mathcal{R}ᵢ to bypass the prefilter, degrading two-stage into single-stage. Mitigation: substrate-specific minimum-discriminative-power thresholds on Q&lt;/em&gt;(adm); non-trivial-proper-subset checks on mathcal{R}ᵢ pre-registered.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Non-causal observation breaks.&lt;/strong&gt; Risk that delayed, smoothed, or non-causal observation of (φ(t), Pi_S(t)) causes the prefilter to operate on stale or anticipated states. Mitigation: causal-observation discipline pre-registered (max acceptable latency between substrate state and prefilter evaluation; smoothing window declared).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Definitional drift across inherited primitives.&lt;/strong&gt; Risk that pulsation, phase-blindness, closure-complementarity, or newly introduced constructs (resonance, phase-acceptance, modulation space) shift meaning across corpus documents or deployments. Mitigation: cross-corpus terminology audit pre-publication; §2 notation table as canonical reference.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Over-promising via ΔE 4.7.3b.&lt;/strong&gt; Risk that naming ΔE 4.7.3b as engineering candidate without disclosing internal pulsation-channel components creates an impression of engineering maturity exceeding disclosure. Mitigation: explicit "inheritance-reading" qualifier (§6) + "not independent non-emptiness proof" disclaimer (§0 commitment 3) — partly addressed in current text; remainder owed in substrate-specific disclosure.&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These risks are not bugs in the architectural-class register; they are architectural-level hazards that emerge at the deployment register and are properly addressed by substrate-specific mitigation discipline, not by amending the architectural class itself.&lt;/p&gt;




&lt;h2&gt;
  
  
  10. Closing
&lt;/h2&gt;

&lt;p&gt;ONTOΣ XIII fixed the architectural axis: master operator carries direction, components admitted under it, cascade runs down. What XIII left as continuing-programme item — the substrate-mechanism by which the carrying happens — ONTOΣ XIII.1 closes at the &lt;strong&gt;architectural-class register&lt;/strong&gt; through the pulsation channel: a type discipline for the substrate-mechanism, not the substrate-specific physical realisation itself.&lt;/p&gt;

&lt;p&gt;The closure is structural integration, not new structural machinery. ONTOΣ X already supplied the pulsation primitive (three-dimensional signature + cycle-phase category); ONTOΣ XII already supplied the closure-and-compatibility framework; ONTOΣ XIII already supplied the master operator and the admission cascade; IIC v2.1 already supplied the first declared engineering candidate. ONTOΣ XIII.1 makes explicit how these four corpus members converge: X's joint pulsation state (φ, Pi_S) is the carrier; XIII's A_S jointly modulates the carrier via mathcal{P}; XII's CC-WE compatibility predicate is realised at substrate level through a two-stage prefilter-plus-joint-admissibility structure (local resonance → mathrm{JointAdm}_(A_S)); IIC v2.1's ΔE 4.7.3b is the first declared engineering candidate inhabiting the architectural class so defined, &lt;strong&gt;under the inheritance-reading interpretation&lt;/strong&gt; (control-grade implicit-operator instance inhabiting mathcal{D}^(PC) via the CC→operator-internal-extended chain, pending substrate-specific disclosure).&lt;/p&gt;

&lt;p&gt;What the closure-complementarity subclass communicates through, at substrate level, is the pulsation of its own interior. Components do not receive messages; they resonate locally as prefilter candidates and then admit jointly under CC-WE satisfiability. The carrier is not symbolic; it is the joint structured rhythm the system carries — three-dimensional signature jointly with cycle-phase category. The architectural commitment is the pre-declared joint modulation of that rhythm by the master operator; the local resonance predicate is the prefilter, and joint CC-WE admissibility is the full admission criterion; the non-derivability of the master Will-Embedding from components is the substrate-physics consequence of components seeing only their signature-resonance bands and phase-acceptance maps (in the default non-tomographically-complete architectural case), not the full carrier.&lt;/p&gt;

&lt;p&gt;The triptych XI / XII / XIII remains the architectural-class register; ONTOΣ XIII.1 extends its third axis at substrate-mechanism type-discipline depth. The substrate-mechanism owed item of XIII §9 is closed at the architectural-class register; substrate-physics-specific realisations (engineering-side mathcal{P}, mathcal{R}ᵢ, σᵢ specifications; physical basis of resonance; quantitative margins), substrate-specific companion work, and the comparison with non-pulsation substrate-mechanisms remain on the continuing programme.&lt;/p&gt;

&lt;p&gt;In the beginning was the Word. The Word was a sound. The sound was a wave. The wave was a pattern of transitions. The transitions are the structure. The structure is the carrier. The carrier is what the master operator modulates. The components do not hear words; they resonate with the rhythm. The rhythm is the channel.&lt;/p&gt;




&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;p&gt;The present work is grounded in the NC2.5 v2.1 / ONTOΣ X / ONTOΣ XI / ONTOΣ XII / ONTOΣ XIII / UTAM / IIC v2.1 / Identifiability Bridge corpus, referenced inline throughout.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Barziankou, M.&lt;/strong&gt; (2026). &lt;em&gt;Navigational Cybernetics 2.5 v2.1 — Axiomatic Core.&lt;/em&gt; DOI: 10.17605/OSF.IO/NHTC5. — Axiomatic substrate.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Barziankou, M.&lt;/strong&gt; (May 2026). &lt;em&gt;ONTOΣ X — The Pulsating Interior: On the Ontology of Non-Monotone Possibility.&lt;/em&gt; DOI: 10.5281/zenodo.19614567. — &lt;strong&gt;Priority origin&lt;/strong&gt; and foundational formal statement of the pulsation primitive Pi(t), the cycle-phase category, phase-aware will, and phase-blindness as ontological defect; XIII.1's framework inherits these primitives without contesting their X-origin. Bitcoin OTS timestamp + GPG-signed deposit establish formal priority of the framework on the deposit date.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Barziankou, M.&lt;/strong&gt; (2026). &lt;em&gt;ONTOΣ XI — Two Sides of One Geometry: The Holding Field and the Architecture of Chaos.&lt;/em&gt; DOI: 10.17605/OSF.IO/U3KXJ. — Geometric substrate apparatus inherited via §5.4.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Barziankou, M.&lt;/strong&gt; (2026). &lt;em&gt;ONTOΣ XII — Closure-Complementarity.&lt;/em&gt; DOI: 10.17605/OSF.IO/394TX. — Closure operation and CC-WE compatibility predicate.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Barziankou, M.&lt;/strong&gt; (2026). &lt;em&gt;ONTOΣ XIII — The Master Operator and the Direction-Down Admission Cascade.&lt;/em&gt; DOI: 10.17605/OSF.IO/FVBMZ. — Master operator and admission cascade; §9 bullet 1 owed item closed at the architectural-class register here.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Barziankou, M.&lt;/strong&gt; (2026). &lt;em&gt;Unified Theory of Adaptive Meaning (UTAM) — Part I and Part II.&lt;/em&gt; petronus.eu/blog. — Will-Embedding framework at unit level.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Barziankou, M.&lt;/strong&gt; (2026). &lt;em&gt;IIC v2.1 — A Class-Relative Structural Law of Adaptive Behaviour.&lt;/em&gt; DOI: 10.17605/OSF.IO/NYT45. — First declared engineering candidate ΔE 4.7.3b §3.2 cited via public surface.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Barziankou, M.&lt;/strong&gt; (2026). &lt;em&gt;Identifiability Bridge — Conditional Admissibility Theorems.&lt;/em&gt; DOI: 10.17605/OSF.IO/3F6UJ. — Conditional structural theorem typing discipline.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Footer
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;MxBv&lt;/strong&gt;, Poznań, Poland.&lt;br&gt;
The Urgrund Laboratory.&lt;br&gt;
Maksim Barziankou (MxBv) — PETRONUS — &lt;a href="mailto:research@petronus.eu"&gt;research@petronus.eu&lt;/a&gt;&lt;br&gt;
May 2026.&lt;br&gt;
CC BY-NC-ND 4.0.&lt;br&gt;
&lt;em&gt;ONTOΣ XIII.1 — The Pulsation Channel: How the Master Operator Speaks to Its Components.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Companions in the corpus:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ONTOΣ X — &lt;em&gt;The Pulsating Interior&lt;/em&gt; (DOI: &lt;a href="https://doi.org/10.5281/zenodo.19614567" rel="noopener noreferrer"&gt;10.5281/zenodo.19614567&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;ONTOΣ XI — &lt;em&gt;Two Sides of One Geometry&lt;/em&gt; (DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/U3KXJ" rel="noopener noreferrer"&gt;10.17605/OSF.IO/U3KXJ&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;ONTOΣ XII — &lt;em&gt;Closure-Complementarity&lt;/em&gt; (DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/394TX" rel="noopener noreferrer"&gt;10.17605/OSF.IO/394TX&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;ONTOΣ XIII — &lt;em&gt;The Master Operator and the Direction-Down Admission Cascade&lt;/em&gt; (DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/FVBMZ" rel="noopener noreferrer"&gt;10.17605/OSF.IO/FVBMZ&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;IIC v2.1 — &lt;em&gt;A Class-Relative Structural Law of Adaptive Behaviour&lt;/em&gt; (DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/NYT45" rel="noopener noreferrer"&gt;10.17605/OSF.IO/NYT45&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Identifiability Bridge — &lt;em&gt;Conditional Admissibility Theorems&lt;/em&gt; (DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/3F6UJ" rel="noopener noreferrer"&gt;10.17605/OSF.IO/3F6UJ&lt;/a&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This work DOI: 10.17605/OSF.IO/FVBMZ &lt;em&gt;(paired with ONTOΣ XIII under shared OSF deposit)&lt;/em&gt;&lt;br&gt;
Grounded in the formal core of &lt;strong&gt;Navigational Cybernetics 2.5 v2.1&lt;/strong&gt;, axiomatic core DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/NHTC5" rel="noopener noreferrer"&gt;10.17605/OSF.IO/NHTC5&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;A consolidating revision (NC2.5 v3.0) gathering the apparatus of this and adjacent works is in preparation; the present work is grounded in v2.1 and remains compatible with the future v3.0 consolidation.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;© 2026 Maksim Barziankou. Licensed under CC BY-NC-ND 4.0.&lt;/p&gt;

</description>
      <category>nc25</category>
      <category>ontos</category>
      <category>xiii1</category>
      <category>pulsationchannel</category>
    </item>
    <item>
      <title>ONTOΣ XIII — The Master Operator and the Direction-Down Admission Cascade</title>
      <dc:creator>MxBv</dc:creator>
      <pubDate>Wed, 13 May 2026 10:41:24 +0000</pubDate>
      <link>https://dev.to/petronushowcoremx/ontos-xiii-the-master-operator-and-the-direction-down-admission-cascade-13b2</link>
      <guid>https://dev.to/petronushowcoremx/ontos-xiii-the-master-operator-and-the-direction-down-admission-cascade-13b2</guid>
      <description>&lt;h1&gt;
  
  
  ONTOΣ XIII — The Master Operator and the Direction-Down Admission Cascade
&lt;/h1&gt;

&lt;p&gt;&lt;strong&gt;Maksim Barziankou&lt;/strong&gt; (MxBv)&lt;br&gt;
PETRONUS™ | &lt;a href="mailto:research@petronus.eu"&gt;research@petronus.eu&lt;/a&gt;&lt;br&gt;
DOI: 10.17605/OSF.IO/FVBMZ&lt;br&gt;
Axiomatic Core (NC2.5 v2.1): DOI 10.17605/OSF.IO/NHTC5&lt;/p&gt;




&lt;h2&gt;
  
  
  0. Position and Scope
&lt;/h2&gt;

&lt;p&gt;The corpus of Navigational Cybernetics 2.5 has, by the present moment, fixed three architectural-class registers of the operator-system relation. ONTOΣ XI gives the &lt;strong&gt;interior&lt;/strong&gt; of the operator: what the operator holds against the gradient at each moment, what the semantic load field carries, what the chaos predicate reports. ONTOΣ XII gives the &lt;strong&gt;composition&lt;/strong&gt; of operators into systems: under what architectural conditions a collection of UTAM-units becomes a single system in which the ONTOΣ XI apparatus is well-defined, and under what conditions it does not. The present work, ONTOΣ XIII, gives the &lt;strong&gt;direction&lt;/strong&gt; the composed system carries as a system: which way the admission cascade runs, and what fails when it is read the wrong way.&lt;/p&gt;

&lt;p&gt;The motivating observation is that engineering intuition, applied to ONTOΣ XII's closure operation, runs the cascade upward by default. Components have Will-Embeddings; closure is read as the operation under which the Will-Embeddings combine; the resulting system is read as the carrier of whatever Will-Embedding their combination produces. This reading is correct for some classes of system — it is, broadly, the reading that bottom-up emergence claims work within — but it is not correct for the closure-complementarity class. In a closure-complementarity-conformant system, the system carries its own architectural commitment, declared at the moment the closure operation is registered, and the components' Will-Embeddings are admitted under that commitment. The arrow runs down. What the present work does is name the arrow, name the entity at the upper end of the arrow, and show that the system-level Will-Embedding is not derivable from the component Will-Embeddings alone.&lt;/p&gt;

&lt;p&gt;The entity at the upper end is called, here, the &lt;strong&gt;master operator&lt;/strong&gt;: the system-as-operator constituted by ONTOΣ XII's closure operation, carrying its own system-level Will-Embedding W_S and its own system-level admissibility regime A_S, with W_S as the direction-source pre-registered at closure declaration. The master operator inherits the ONTOΣ XI operator-level apparatus: a holding field H_S, a semantic load field Λ&lt;em&gt;S, and an operator-relative chaos predicate χ&lt;/em&gt;(op,S) are well-defined for the system in exactly the sense XI made them well-defined for the unit-level operator. The naming is not a new primitive in the substantive sense — the operator-status of the closure-produced system S was already declared in XII §3.3. What is new is the explicit lift of the system-as-operator to a directional carrier, and the explicit type discipline that distinguishes the system's Will-Embedding W_S from the admissibility surface A_S it induces.&lt;/p&gt;

&lt;p&gt;The directional claim takes the form of a theorem. The &lt;strong&gt;Direction-Down Admission Cascade Theorem&lt;/strong&gt; (Theorem ONTOΣ-XIII.1, §4) states that for a closure-complementarity-conformant system S, the admission relation runs strictly from (W_S, A_S) down to the components' Will-Embeddings {W(uᵢ)} and from there to the components' actions {Aᵢ}. The arrow does not invert through revision-style or aggregation-style upward flow within the theorem's scope (T1/T2 of §4.2 Step 5). A companion proposition, &lt;strong&gt;Non-Derivability of the Master Will&lt;/strong&gt; (Proposition XIII.1.1, §4), establishes by counter-example that W_S is not a function of {W(uᵢ)} alone: two distinct admissible W_S choices can admit the same component set, so the system's direction is not recoverable from the components' directions through any function on component Will-Embeddings alone. The proposition refutes the strict bottom-up reading "W_S = f({W(uᵢ)})"; aggregation-with-context readings of the form "W_S = g({W(uᵢ)}, context)" — in both their internal-context (pre-registered) and external-environmental senses — are addressed separately in §4.4 by structural argument from the pre-registration discipline (M1) and assumption (3).&lt;/p&gt;

&lt;p&gt;The third structural commitment of the work is a formal bridge between the operator-internal apparatus of UTAM and the closure-of-units apparatus of ONTOΣ XII. UTAM Part I declares the W → E → A triad — Will, Embedding, Action — at the unit level, and UTAM Part II formalises Will as an operator within the NC2.5 v2.1 frame. Neither work lifts the triad to multi-unit systems explicitly. UTAM Part I §11.5 ("The organism as a whole as evidence that UTAM is not compositional") names the holism claim that UTAM is not built from below, with the Krebs-cycle illustration provided in the adjacent §11.4 ("the Krebs cycle... = a biochemical form of anti-drift"); §11.5 itself gestures at the principle through a short whole-organism reference (with two figures), not as a theorem. The present work performs the operator-lift formally: the triad W → E → A, applied to the operator S produced by XII's closure, yields the triad W_S → E_S → Aᵢ where W_S is the system-level Will-Embedding, E_S is the system-level embedding (which, at the system layer, coincides operationally with the admissibility regime A_S — a deployment may declare them unified), and Aᵢ are the components' actions executed under admission. The bridge is structural, not metaphorical; the same architectural shape recurs one closure level up.&lt;/p&gt;

&lt;p&gt;The work is presented as a &lt;strong&gt;conditional structural theorem&lt;/strong&gt; in the sense fixed by the Identifiability Bridge: each formal claim is stated with explicit declared premises lifted to the top of the theorem rather than absorbed into the proof body. The premises are: closure-complementarity-conformance of S per ONTOΣ XII §3; pre-registration of W_S at the closure declaration; the deployment's declared map W_S mapsto A_S specifying how the admissibility regime is induced from the Will-Embedding (in substrates where the two are operationally identical, the deployment may declare the map as identity). The theorem is established conditional on these premises; substrates that decline the premises lie outside the closure-complementarity subclass and have their own observability and direction profiles that the present work does not address.&lt;/p&gt;

&lt;p&gt;Three commitments together make the case for promoting the present work to a full ONTOΣ extension rather than handling it as a sub-clause of XII. Each commitment — the master operator as a named formal object with explicit type-signature, the direction-down cascade as a conditional structural theorem, the UTAM↔XII operator-lift as a declared bridge — is independent of the other two in the sense that one can be accepted without the others. Together they fix the third architectural-class axis of the operator-system relation, completing the triptych XI / XII / XIII: interior, composition, direction.&lt;/p&gt;

&lt;p&gt;The work is short by design. The heavy combinatorics of joint admissibility — SAT-style pairwise-versus-joint discipline, the W → C_A induction map, the anti-tautology rule, the four-condition closure-complementarity classification — remain in ONTOΣ XII and are inherited here through CC-WE without restatement. The new mathematics is a type-signature lift, a directional structural relation, and a non-derivability proposition. The substantive contribution is the recognition that the directionality was always there, in CC-WE's joint-admissibility-under-A discipline; XIII names it, establishes it conditionally as Theorem XIII.1, and explicitly refuses the bottom-up reading.&lt;/p&gt;

&lt;p&gt;What ONTOΣ XIII is &lt;strong&gt;not&lt;/strong&gt;. It is not a derivation of W_S from first principles — the substrate-level content of the master operator's Will-Embedding is a deployment commitment, not a corpus result. It is not a claim that W_S and A_S are always distinct — for some substrates, the deployment may operationally identify them, and XIII gives the architectural option without forcing the distinction. It is not a treatise on how the master operator carries the Will-Embedding mechanically — the substrate-specific apparatus by which the system holds its direction is owed in substrate-specific companion work, not in the architectural-class register of XIII. It is not a comparison with bottom-up emergence accounts, distributed consensus theories, or aggregation-style governance frameworks — those address different architectural classes that may or may not lie within the closure-complementarity subclass, and the locating is owed in separate scholarly work.&lt;/p&gt;

&lt;p&gt;A note on theorem status. The premise discipline named above is the &lt;em&gt;conditional structural theorem&lt;/em&gt; typing fixed by the Identifiability Bridge: each formal claim derives the directional conclusion from the explicitly declared premises, with substrate-specific instantiations of the master operator (concrete (W_S, A_S, H_S, Λ&lt;em&gt;S, χ&lt;/em&gt;(op,S)) content) owed in substrate-specific companion papers. Future substrate work supplies &lt;em&gt;corollaries and quantitative refinements&lt;/em&gt; of the theorem below, not "upgrades from Proposition to Theorem"; the theorem-level result is established here, conditional on the stated premises.&lt;/p&gt;




&lt;h2&gt;
  
  
  1. Architectural Motivation
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1.1 The bottom-up illusion
&lt;/h3&gt;

&lt;p&gt;Engineering intuition often runs from below. Components have functions. Functions compose into larger functions. Composition produces the system. The system's behaviour is what the composition makes available. The system's direction, if it has one, is the aggregate of the directions the components carry — or, more often, an emergent property of their interaction. This reading is correct for some classes of system. It is the reading inherited from circuit composition, from compositional programming languages, from a large body of work in distributed coordination, from accounts of biological emergence that treat the organism as an aggregate of cells and the cellular state as the substrate-level driver. For the architectural class addressed by the closure-complementarity subclass of ONTOΣ XII, it is not correct.&lt;/p&gt;

&lt;p&gt;The case where it fails is recognisable. A system whose components carry Will-Embeddings W(u₁), ldots, W(uₙ) that are individually well-formed, pairwise compatible, and structurally non-trivial — yet whose joint composition under the system's declared admissibility regime fails — exhibits the failure mode CC-WE was named to expose. The simplest illustration is the three-component SAT counter-example of ONTOΣ XII §3.5 Case 1: W(u₁) requires x = y, W(u₂) requires y = z, W(u₃) requires x ≠ z. Each pair is satisfiable. The conjunction is not. No assignment over (x, y, z) makes all three Will-Embeddings jointly realisable. The components are well-formed; the composition is not. Closure-complementarity-conformance fails at the joint level.&lt;/p&gt;

&lt;p&gt;The lesson of CC-WE, read directionally, is that the failure mode lives precisely in the gap that the bottom-up reading hides. Bottom-up reading would say: each component is fine, so the system is fine. CC-WE says: the system has its own admissibility surface, declared at the closure operation, and the components are checked &lt;em&gt;against&lt;/em&gt; that surface. The check can fail jointly even when no pairwise check fails. The directionality of the check — from system-level admissibility regime A_S down to the components' constraint sets C_A(uᵢ) induced from their Will-Embeddings — is what the joint check operationalises. ONTOΣ XII formalised the check; the present work makes the directionality of the check the formal object of attention.&lt;/p&gt;

&lt;h3&gt;
  
  
  1.2 Closure as direction-carrier
&lt;/h3&gt;

&lt;p&gt;ONTOΣ XII fixes the closure operation as the architectural primitive that converts a collection of UTAM-units into a system. The type signature is mathrm{closure}(U, R, A) → S where U is the component collection, R is the declared interaction relation, A is the declared admissibility regime at the system layer, and S is the resulting system. XII §3.3 fixes the operator-status of S explicitly: closure "constitutes the operator whose load field is then well-defined." Once S exists as a closure-conformant system, the ONTOΣ XI apparatus — holding field, semantic load, chaos predicate — is well-defined on S in the same architectural register XI defined them on a unit-level operator.&lt;/p&gt;

&lt;p&gt;What XII does not narrate is the direction the closure carries. The admissibility regime A appears in the closure signature as an input — not as something computed from U and R, but as a pre-declared architectural commitment under which the components are admitted. The auditability clause of XII §3.3 — the W → C_A induction map is pre-registered before CC-WE evaluation, and "cannot be revised after observation of joint-admissibility outcomes" — makes the pre-declared character of A load-bearing: the deployment fixes its admissibility surface in advance of the components' evaluation. This is the structural fact that ONTOΣ XIII reads as direction-down.&lt;/p&gt;

&lt;p&gt;The closure operation is, on this reading, the act of declaring the system's direction and then admitting components under it. It is not the act of computing the system's direction from components. Closure carries A down to the components; it does not lift W(uᵢ)'s up to A. The system &lt;em&gt;holds&lt;/em&gt; its direction at the moment of declaration; the components are admitted into operating under it. The system's direction is what the components serve, not what the components produce. This is the reading the present work makes formal.&lt;/p&gt;

&lt;p&gt;The intuition has an older anchor. UTAM Part I §11.5 is titled "The organism as a whole as evidence that UTAM is not compositional" and gestures at the holism intuition through a short reference to whole-organism functioning, accompanied by two figures. The Krebs-cycle substance lives in §11 generally and in §11.4 ("the Krebs cycle... = a biochemical form of anti-drift"); §11.5 itself names the holism claim without developing it as an argument. The illustrative reading is the same: the organism does not become alive because its cells are alive; the cells perform their reactions under the organism-level regulatory regime that admits and coordinates those reactions within the organism's homeostatic envelope. The organism-level commitment to survival is the direction the cellular processes serve under that regulatory regime. If the organism dies, the cells stop performing their reactions in their coordinated, organism-integrated form — not because the cells decide to stop, but because the organism-level regulatory regime that admitted and coordinated them is no longer maintained. UTAM Part I gestures at the principle informally (across §§11.4–11.5 jointly); the architectural object it points at is what the present work formalises at the closure layer.&lt;/p&gt;

&lt;h3&gt;
  
  
  1.3 Why the operator-lift is structural and not metaphorical
&lt;/h3&gt;

&lt;p&gt;UTAM declares the triad W → E → A at the unit level: the Will (W) sets the unit's direction, the Embedding (E) is the structural admission of that direction into the unit's operational substrate, and the Action (A) executes under the embedding. The triad is structural: each arrow is a directed admission, not a symmetrical relation. UTAM Part II reads Will as a formal operator at the unit level, with the operator's directional character preserved.&lt;/p&gt;

&lt;p&gt;The closure operation of ONTOΣ XII produces a system S that is itself an operator — XII §3.3 says so. The question the present work answers is whether the UTAM triad applies to S-as-operator, and what its components are at the system layer. The answer is that XIII declares the closure-produced XII operator to be typed at the system layer by the UTAM triadic schema. This declaration is motivated by the joint structural shape of UTAM and XII, but it is not a derivation from UTAM alone or from XII alone; neither UTAM Part I nor Part II performs the lift in their published forms (per §5.3), and XII establishes the operator-status of S without committing S to the UTAM triad. The lift is XIII's architectural declaration that types the closure-produced operator S by the schema UTAM declared at unit level. Under that declaration: the system-level Will-Embedding W_S is the direction-source pre-registered at closure declaration; the system-level embedding E_S is the structural admission of W_S into the closure operation's domain (in substrates where embedding and admissibility are operationally identical, this coincides with A_S); the components' actions Aᵢ execute under admission.&lt;/p&gt;

&lt;p&gt;The lift is not a metaphorical scaling. It is the same architecture, one closure level up. The unit-level operator has a Will it carries; the system-level operator has a Will it carries. The unit-level operator embeds its Will into its substrate's structural conditions; the system-level operator embeds its Will into the closure's admissibility surface. The unit-level operator acts under embedding; the components of the system-level operator act under the system's admission.&lt;/p&gt;

&lt;p&gt;What changes at the system layer is the source of W_S. At the unit level, UTAM treats W as a primitive — the unit carries its own direction by virtue of being a unit. At the system layer, W_S does not aggregate from {W(uᵢ)} (the bottom-up reading) and it does not derive from A alone (which would make A the primitive and W_S a redundancy). W_S is a separately declared architectural commitment: the system's direction is fixed by the deployment at the moment the closure operation is registered, prior to and independent of which components are admitted into it. The components are admitted &lt;em&gt;under&lt;/em&gt; W_S via the deployment's declared map W_S mapsto A_S. This is the formal content of what UTAM Part I §11.5 names informally: organism-level regulatory regimes admit and coordinate cellular processes within a homeostatic envelope; the architectural-holism reading is that the organism-as-master-operator's pre-declared commitment is what governs which cellular activities are admitted, not a literal causal command from organism to cell.&lt;/p&gt;

&lt;h3&gt;
  
  
  1.4 What the work refuses
&lt;/h3&gt;

&lt;p&gt;ONTOΣ XIII refuses three readings that the closure-complementarity subclass is sometimes read into despite the structural commitments of CC-WE.&lt;/p&gt;

&lt;p&gt;It refuses the reading that the system's direction emerges from the components' interactions. Emergence accounts of system-level direction belong to architectural classes outside the closure-complementarity subclass and may be correct for those classes; what the present work establishes is that within the closure-complementarity subclass, W_S is declared, not emergent. The non-derivability proposition of §4 establishes the formal content of this refusal: two distinct W_S candidates can admit identical component sets, so W_S is not recoverable from components alone, hence cannot be the result of bottom-up emergence within the subclass.&lt;/p&gt;

&lt;p&gt;It refuses the reading that components vote on the system's direction. Voting-style aggregation belongs to classes where the system-level commitment is computed from component-level commitments under some aggregation rule (majority, consensus, weighted combination). For closure-complementarity-conformant deployments, the system's commitment is fixed at the closure declaration before any component evaluation runs. The components are presented to the closure with their Will-Embeddings already formed; the closure either admits each W(uᵢ) under the pre-declared A_S or it does not. There is no upward vote that revises W_S.&lt;/p&gt;

&lt;p&gt;It refuses the reading that the system's admissibility regime is a passive descriptor of what components happen to do. A_S is the active filter the closure applies to the components. It is the architectural commitment under which the system is being constituted; it is what the components are being admitted &lt;em&gt;into&lt;/em&gt;. To read A_S as the after-the-fact summary of component behaviour would be to read closure as aggregation, which is precisely the reading CC-WE was named to forbid.&lt;/p&gt;

&lt;p&gt;The three refusals are not independent. Each follows from the directional reading of CC-WE; each is the contrapositive of an upward-reading account. Naming them explicitly is what protects the closure-complementarity subclass from being absorbed into the larger class of bottom-up-compositional systems by a reader who reads CC-WE as a satisfiability condition rather than as an admission gate.&lt;/p&gt;

&lt;h3&gt;
  
  
  1.5 The engineering stake
&lt;/h3&gt;

&lt;p&gt;The architectural commitment has an engineering stake. Architectures that build their system-level state by aggregating component-level state — distributed consensus protocols, average-based controllers, voting-style governance algorithms — produce systems whose direction is the result of what their components do. Such systems can be correct, useful, and architecturally complete for their problem class. What they cannot be is closure-complementarity-conformant in the sense of ONTOΣ XII, because their W_S (if they have one at all) is computed from components rather than declared as a precondition for component admission.&lt;/p&gt;

&lt;p&gt;For architectures that &lt;em&gt;do&lt;/em&gt; claim to belong to the closure-complementarity subclass — control systems with declared safe-trajectory commitments, autonomous agent ensembles with chartered governing directives, biological and biomedical engineered systems with declared homeostatic commitments — the directional reading is load-bearing. The deployment's declared W_S is what holds the architectural class membership. Aggregation-style fallbacks during operation (a controller that revises its trajectory commitment based on observed actuator behaviour, an agent ensemble that recomputes its governing directive based on member voting, an engineered organism that lets its component subsystems negotiate the homeostatic setpoint) move the system out of the closure-complementarity subclass into the bottom-up aggregation class — &lt;em&gt;unless&lt;/em&gt; the adaptation law and its bounds were themselves pre-registered as part of mathrm{decl}_(W_S mapsto A_S) at closure declaration, in which case the in-operation adjustment is an envelope-internal adaptation per §4.2 Step 5 / F-XIII.3 rather than an unregistered revision (T1). The forfeit-class-membership case is unregistered post-hoc revision; pre-registered envelope-internal adaptation is admissible. The class boundary lies at the pre-registration discipline, not at adaptation-presence-or-absence.&lt;/p&gt;

&lt;p&gt;ONTOΣ XIII does not legislate which architectural class a deployment ought to belong to. It supplies the formal language in which the choice is statable. The deployment declares W_S at closure registration; closure-complementarity-conformance evaluates whether the components are admitted under that W_S; the falsification surface of §7 supplies the operational tests by which the declared W_S can be checked against deployment behaviour. The choice is the deployment's; the architectural grammar of the choice is the present work's.&lt;/p&gt;




&lt;h2&gt;
  
  
  2. Notation
&lt;/h2&gt;

&lt;p&gt;The work uses a small new symbol set, layered on top of the notation of ONTOΣ XI, ONTOΣ XII, and UTAM. The new symbols are introduced at first use in the body; they are gathered here for reference.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Symbol&lt;/th&gt;
&lt;th&gt;Type&lt;/th&gt;
&lt;th&gt;Reading&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Inherited from ONTOΣ XII&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;U = {u₁, ldots, uₙ}&lt;/td&gt;
&lt;td&gt;collection&lt;/td&gt;
&lt;td&gt;UTAM-units constituting the components&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;W(uᵢ)&lt;/td&gt;
&lt;td&gt;Will-Embedding&lt;/td&gt;
&lt;td&gt;component uᵢ's Will (per UTAM Part I)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;R&lt;/td&gt;
&lt;td&gt;interaction relation&lt;/td&gt;
&lt;td&gt;declared coupling structure among components&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;A&lt;/td&gt;
&lt;td&gt;admissibility regime&lt;/td&gt;
&lt;td&gt;v2.1 admissibility predicate restricted to S's declared scope (per XII §3)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;mathrm{closure}(U, R, A) → S&lt;/td&gt;
&lt;td&gt;architectural operation&lt;/td&gt;
&lt;td&gt;constitutes S as closure-conformant system&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;C_A(uᵢ)&lt;/td&gt;
&lt;td&gt;constraint set&lt;/td&gt;
&lt;td&gt;architectural constraints induced from W(uᵢ) under A (per XII §3.2)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;CC-0, CC-WE, CC-IIC, CC-D&lt;/td&gt;
&lt;td&gt;conditions&lt;/td&gt;
&lt;td&gt;four conditions of closure-complementarity (per XII §3)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Inherited from ONTOΣ XI&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;H(t)&lt;/td&gt;
&lt;td&gt;set ⊆ Sₒₚ&lt;/td&gt;
&lt;td&gt;holding set at time t (at unit level)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Λ(t)&lt;/td&gt;
&lt;td&gt;semantic load field&lt;/td&gt;
&lt;td&gt;(Sₒₚ, νₒₚ, cₒₚ) at unit level&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;χₒₚ(R)&lt;/td&gt;
&lt;td&gt;binary predicate&lt;/td&gt;
&lt;td&gt;operator-relative chaos over region R at unit level&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Inherited from UTAM&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;W → E → A&lt;/td&gt;
&lt;td&gt;triad&lt;/td&gt;
&lt;td&gt;Will → Embedding → Action (per UTAM Part I §2.3; UTAM Part II)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;New in ONTOΣ XIII (§3 onward)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;W_S&lt;/td&gt;
&lt;td&gt;Will-Embedding&lt;/td&gt;
&lt;td&gt;system-level Will-Embedding of S; direction-source pre-registered at closure declaration&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;A_S&lt;/td&gt;
&lt;td&gt;admissibility regime&lt;/td&gt;
&lt;td&gt;system-level admissibility regime; derived from W_S via deployment-declared map (or operationally identified, where declared)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;E_S&lt;/td&gt;
&lt;td&gt;embedding&lt;/td&gt;
&lt;td&gt;system-level embedding of W_S into the closure's admissibility surface; coincides with A_S in substrates where the deployment declares embedding-admissibility identity&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;H_S(t), Λ&lt;em&gt;S(t), χ&lt;/em&gt;(op,S)(R)&lt;/td&gt;
&lt;td&gt;XI primitives applied to S&lt;/td&gt;
&lt;td&gt;holding field, semantic load, chaos predicate of S-as-operator&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;S_(op,S)&lt;/td&gt;
&lt;td&gt;space&lt;/td&gt;
&lt;td&gt;system-level operator state space (the XI-style state space of S-as-operator); substrate region R ⊂eq S_(op,S) is the argument of χ_(op,S)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;ε_T^S&lt;/td&gt;
&lt;td&gt;scalar&lt;/td&gt;
&lt;td&gt;system-level window-level non-reconstructibility budget on H_S — the per-window analogue of XI's HF-NR bound at the system layer; no external observer reconstructs H_S over the evaluation window [0, T] with mutual information exceeding ε_T^S (Identifiability Bridge §1.6 NR-window discipline applied to S-as-operator; see §5.4)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;(S, W_S, A_S)&lt;/td&gt;
&lt;td&gt;tuple&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;master operator&lt;/strong&gt; — the formal object of §3&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;mathrm{decl}_(W_S mapsto A_S)&lt;/td&gt;
&lt;td&gt;map&lt;/td&gt;
&lt;td&gt;deployment-declared derivation of A_S from W_S&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;rhd&lt;/td&gt;
&lt;td&gt;admission relation (polymorphic, binary)&lt;/td&gt;
&lt;td&gt;X rhd Y reads "X admits Y into operation" — directional; polymorphism resolves from context: (system-level pair) rhd (set of component Will-Embeddings) in the first cascade step; (set of admitted Will-Embeddings) rhd (set of executed component Actions) in the second&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;mathcal{D}^(CC)&lt;/td&gt;
&lt;td&gt;the closure-complementarity subclass&lt;/td&gt;
&lt;td&gt;the architectural class of deployments admitting Theorem XIII.1&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;The notation reuses symbols across UTAM, XI, and XII wherever the corpus has fixed a usage. The single notational overload that warrants a flagging note is the symbol A: UTAM Part I uses A for &lt;strong&gt;Action&lt;/strong&gt; (the third term of the triad W → E → A); ONTOΣ XII uses A for &lt;strong&gt;admissibility regime&lt;/strong&gt; (the third input of mathrm{closure}(U, R, A) → S). Both usages are preserved in ONTOΣ XIII for fidelity to the source corpora. The subscript discipline is the disambiguation: Aᵢ refers to the Action of component uᵢ (UTAM register, indexed by component); A_S refers to the admissibility regime of the master operator (XII register, indexed by the system). &lt;strong&gt;Context-resolution rule for bare A in XIII text.&lt;/strong&gt; Where the XII closure signature mathrm{closure}(U, R, A) → S is invoked verbatim (XII-quoting contexts), bare A retains its XII reading — the admissibility regime input. In XIII context, this same input is the master operator's A_S (per (M2)); the two readings coincide for any specific closure of S, with A = A_S under the deployment's declared induction map of §3.3. Where XIII writes the tuple (U, R, A_S) outside the signature itself (in premise lists, theorem statements, proof steps), the subscripted form is used to make the XIII-context reading explicit and to remove any possibility of confusion with Aᵢ. Bare A never appears as a stand-alone symbol in XIII text; every occurrence is either inside the XII-verbatim signature mathrm{closure}(U, R, A) → S or is part of UTAM's W → E → A triadic chain (where the third term is unit-level Action). The reader who tracks the subscript discipline will not encounter ambiguity.&lt;/p&gt;

&lt;p&gt;A second note concerns the relation between E_S and A_S. The UTAM triad places Embedding between Will and Action as the structural layer through which Will is admitted into operational substrate. At the system layer of closure-complementarity systems, the embedding role is played operationally by the admissibility regime A_S — the surface under which the components are admitted. Whether E_S and A_S should be typed as separate objects or as a single object under two names is a deployment commitment, not a corpus result. ONTOΣ XIII permits both: deployments may declare E_S equiv A_S (the operational identity), or they may declare E_S and A_S as separate substrate-level objects with a declared relation. The architectural class membership is the same in either case; the choice is a deployment-declaration item.&lt;/p&gt;

&lt;p&gt;A third note on terminology. The compound name "Will-Embedding" for W (and W_S) follows UTAM Part II's convention, in which W-as-formal-operator carries its own embedding-into-substrate structure as part of its definition; the compound name reflects that the Will is always-already structurally embedded at its definition. The triadic &lt;em&gt;Embedding&lt;/em&gt; element E (and E_S at the system layer) is reserved for the structural admission of W into the operational substrate as a separable triad-element, distinct from the Will-Embedding W itself. The reader who tracks the distinction reads W(uᵢ) as "the unit's Will, complete with its embedding-into-its-substrate structure" and E_S as "the system layer's admission surface", without conflating the two.&lt;/p&gt;




&lt;h2&gt;
  
  
  3. The Master Operator — Formal Object and Type Signature
&lt;/h2&gt;

&lt;h3&gt;
  
  
  3.1 Definition
&lt;/h3&gt;

&lt;p&gt;Let S be a closure-complementarity-conformant system, produced by an architectural closure operation mathrm{closure}(U, R, A) → S per ONTOΣ XII §3, with the four conditions CC-0, CC-WE, CC-IIC, CC-D simultaneously satisfied over the declared (U, R, A_S) context (per the context-resolution rule of §2: the closure signature is invoked XII-verbatim with bare A; the XIII-context tuple reads A_S). The &lt;strong&gt;master operator&lt;/strong&gt; of S is the tuple&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;M_S \;:=\; (S, \, W_S, \, A_S),&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;where W_S is the &lt;strong&gt;system-level Will-Embedding&lt;/strong&gt; carried by S-as-operator, and A_S is the &lt;strong&gt;system-level admissibility regime&lt;/strong&gt; under which the components of S are admitted into operating as one system.&lt;/p&gt;

&lt;p&gt;The tuple is the formal object of the present work. Three architectural commitments fix its content.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(M1) Pre-registration of W_S.&lt;/strong&gt; W_S is declared by the deployment at the moment the closure operation mathrm{closure}(U, R, A) → S is registered, prior to and independent of the evaluation of the components' Will-Embeddings {W(uᵢ)} against the admissibility regime. The declaration is part of the deployment's pre-registered architectural commitment; it cannot be revised after observation of component-level dynamics without forfeiting closure-complementarity-conformance in the sense of XII §3.3's auditability clause.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(M2) Induction of A_S from W_S.&lt;/strong&gt; The admissibility regime A_S that appears as the third input to the closure signature mathrm{closure}(U, R, A) → S is, for closure-complementarity-conformant deployments, related to W_S by a &lt;strong&gt;deployment-declared induction map&lt;/strong&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;mathrm{decl}_(W_S mapsto A_S): \;\; W_S \;longmapsto\; A_S,&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;specifying how the admissibility predicate at the system layer is determined by the system-level Will-Embedding. The map is part of the deployment's pre-registration. In substrates where A_S and W_S are operationally identified, the map is the identity. In substrates where they are distinct, the map specifies the architectural derivation — for example, W_S as a directional commitment (a target trajectory, an organismic survival commitment, a chartered mandate) and A_S as the corresponding set of constraints components must satisfy to be admitted under that commitment.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(M3) Inheritance of the ONTOΣ XI apparatus.&lt;/strong&gt; Because S is an operator (per XII §3.3), the ONTOΣ XI operator-level apparatus is well-defined on S in the architectural-class register XI fixed for unit-level operators. The system-level holding field H_S(t) ⊂eq S_(op,S), the system-level semantic load field Λ&lt;em&gt;S(t) = (S&lt;/em&gt;(op,S), ν&lt;em&gt;(op,S), c&lt;/em&gt;(op,S)), and the system-level operator-relative chaos predicate χ&lt;em&gt;(op,S)(R) (where R ⊂eq S&lt;/em&gt;(op,S) ranges over substrate regions of the system's state space) are inherited as XI primitives applied to S rather than to a unit-level operator. The substrate-level content of each system-level inherit is deployment-specific and is owed in substrate-specific companion work; the architectural register is fixed here.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Scope of XI-inheritance.&lt;/strong&gt; What (M3) supplies through CC-conformance is the &lt;em&gt;well-definedness&lt;/em&gt; of the XI primitives H_S, Λ&lt;em&gt;S, χ&lt;/em&gt;(op,S) at the system layer — i.e., that the primitives have a meaningful interpretation on S. This is the architectural baseline guaranteed by CC-0 + the operator-status of §3.3. It is not, by itself, the full &lt;em&gt;operator-internal-extended subclass&lt;/em&gt; commitment in the sense the Identifiability Bridge invokes (see §5.4): the extended subclass requires additional architectural declarations beyond well-definedness — specifically, the deployment-level commitments that ground HF-NR, the window-level NR-budget ε_T^S, and the calibration-valid nuisance-adjustment discipline at the system layer. CC-conformant deployments that decline these additional commitments still carry a well-formed master operator under (M1)–(M3), but they do not automatically lie within the Bridge's operator-internal-extended subclass. The distinction matters for which downstream Bridge results inherit automatically (well-definedness-only results) versus which require additional deployment-level declaration (operator-internal-extended-class results); §5.4 below makes this scope split explicit.&lt;/p&gt;

&lt;h3&gt;
  
  
  3.2 Type signature
&lt;/h3&gt;

&lt;p&gt;The master operator M_S = (S, W_S, A_S) is typed at the architectural-class layer as follows.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;S is a closure-complementarity-conformant system per ONTOΣ XII §3, with declared (U, R, A_S) context and the four conditions CC-0, CC-WE, CC-IIC, CC-D simultaneously holding.&lt;/li&gt;
&lt;li&gt;W_S is a Will-Embedding in the UTAM sense (per UTAM Part II), declared at the system layer rather than the unit layer.&lt;/li&gt;
&lt;li&gt;A_S is an admissibility regime in the ONTOΣ XII sense (the v2.1 admissibility predicate restricted to S's declared scope), with the additional architectural commitment that it is induced from W_S via the pre-registered mathrm{decl}_(W_S mapsto A_S).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The triple (S, W_S, A_S) is itself a higher-level entity in the corpus: it is the architectural object addressed by ONTOΣ XIII. It is not a new primitive in the sense of introducing structural machinery the corpus did not previously have — S is from XII, W_S extends UTAM's W to the system layer, A_S extends XII's A with the additional induction discipline. What is new is the explicit type signature that distinguishes the system-level Will-Embedding from the system-level admissibility regime, and the pre-registration discipline that fixes W_S at the closure declaration.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Note on declaration-time vs system-time typing.&lt;/strong&gt; The type-signature above operates at two ontological phases. At &lt;strong&gt;declaration time&lt;/strong&gt; (pre-closure), W_S and A_S are &lt;em&gt;pre-registration tokens&lt;/em&gt; — the deployment's pre-registered architectural commitments, intentional content fixed in pre-registration before the closure operation runs and before S exists as a constituted system. At &lt;strong&gt;system time&lt;/strong&gt; (post-closure), W_S and A_S are the &lt;em&gt;realisations&lt;/em&gt; of those tokens, carried by S-as-operator: the Will-Embedding and admissibility regime of the constituted master operator, identical in content to the pre-registered tokens by (M1)'s non-revisability. The two phases share the same content; they differ only in ontological status: tokens are intentional commitments binding the system that will be constituted; realisations are post-closure system-level objects. The two-phase typing — token at declaration, realisation at system-time, identity of content by (M1) — is itself an architectural-class commitment of XIII (not derived from a deeper primitive), and is the operational mechanism by which the deployment's pre-registration constrains the closure-produced system without requiring S to exist at declaration time. Throughout XIII, references to W_S and A_S as "system-level" objects are read in the system-time / realisation sense when S is in scope, and in the declaration-time / token sense when the closure operation is being registered.&lt;/p&gt;

&lt;h3&gt;
  
  
  3.3 The augmented pre-registration
&lt;/h3&gt;

&lt;p&gt;ONTOΣ XII's closure signature is preserved: mathrm{closure}(U, R, A) → S. ONTOΣ XIII clarifies that, for closure-complementarity-conformant deployments, the third input A is itself the result of the deployment's declared map applied to a pre-registered W_S. The architectural object the deployment registers at closure time is, therefore, the &lt;strong&gt;augmented quintuple&lt;/strong&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;(U, \, R, \, A, \, W_S, \, mathrm{decl}_(W_S mapsto A_S)),&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;with A = mathrm{decl}_(W_S mapsto A_S)(W_S) supplied either as the identity map (if the deployment declares E_S equiv A_S per §2) or via a substrate-specific derivation function (if the deployment declares them distinct). The augmentation is not a modification of the XII signature; it is a more explicit accounting of what the XII signature's third input contains for deployments in the closure-complementarity subclass.&lt;/p&gt;

&lt;p&gt;The pre-registration discipline of XII §3.3 — the W → C_A induction map is pre-declared and unrevisable — extends to W_S and mathrm{decl}_(W_S mapsto A_S) by the same architectural logic. The system's direction must be declared in advance of the components' evaluation; if the declaration could be revised after components' Will-Embeddings are observed, the directional content of W_S would be a function of {W(uᵢ)} and the bottom-up reading would obtain. The non-revisability of W_S post-observation is the formal guarantee that the master operator carries pre-declared direction rather than aggregated direction.&lt;/p&gt;

&lt;h3&gt;
  
  
  3.4 The admission cascade
&lt;/h3&gt;

&lt;p&gt;The relation that ties the master operator's pre-declared direction to the components' actions is the &lt;strong&gt;admission cascade&lt;/strong&gt;:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;(W_S, \, A_S) \;\;rhd\;\; {W(uᵢ) | W(uᵢ)  admissible under  A_S}_(i ∈ I_{adm)} \;\;rhd\;\; {Aᵢ | uᵢ  executes its Action under admission}_(i ∈ I_{adm)},&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;where rhd denotes the architectural admission relation (one-directional), and I_(adm) ⊂eq {1, ldots, n} is the index set of components admitted under A_S (per the CC-WE joint-admissibility check of XII §3). The cascade has three architectural moves.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Move 1 — From (W_S, A_S) down to admitted components.&lt;/strong&gt; The master operator's pre-declared (W_S, A_S) pair is given, by the closure declaration, before any component-level evaluation. The closure operation then checks each W(uᵢ) against A_S via the W → C_A induction map of XII §3.2: W(uᵢ) induces C_A(uᵢ) under the deployment's declared mapping; the component set is admitted iff the joint conjunction bigwedgeᵢ₌₁ⁿ C_A(uᵢ) is satisfiable under A_S. Components whose Will-Embeddings cannot be admitted under A_S — either individually (universal-reject case) or jointly (the SAT-style failure of XII §3.5 Case 1) — are excluded from I_(adm).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Move 2 — From admitted components down to executed Actions.&lt;/strong&gt; Each uᵢ ∈ I_(adm) executes its Action Aᵢ under the admission. The Action is, in UTAM Part I's sense, the unit-level execution under the unit-level Embedding; at the system layer, the unit-level Embedding is the substrate of the unit, but the system-level admission predicate A_S has filtered which units' Actions are licensed to execute within the operational context of S. Components outside I_(adm) either do not execute their Actions within S, or execute them but are not architecturally part of S in the closure-complementarity sense (XII §3.2 names the latter as "collection" rather than "system").&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Move 3 — No upward arrow within the theorem's scope.&lt;/strong&gt; The cascade has no arrow in the opposite direction under the two upward-flow types of §4.2 Step 5: (T1) components' admitted Actions do not flow back up to revise A_S outside the pre-registered adaptation envelope; (T2) admitted components' Will-Embeddings do not aggregate up to constitute W_S as a function on those Will-Embeddings. The architectural commitment of closure-complementarity-conformance is that the cascade is one-directional from the master operator down with respect to T1 and T2 upward flows; other potential upward modes (bidirectional co-determination, fixed-point parametrisation, lateral bypasses) are continuing-programme items per §9 and lie outside the present theorem's scope. The formal content of the T1/T2-scoped commitment is the theorem of §4 below.&lt;/p&gt;

&lt;h3&gt;
  
  
  3.5 The master operator is not a component
&lt;/h3&gt;

&lt;p&gt;A reading that the master operator is "just another component, at the system level" misses the architectural distinction. The master operator is the system-as-operator: the entity that holds the system's direction at the system layer, one closure level up from the components. It is not a member of U. It is not an additional UTAM-unit added to the collection. It is the system itself, in its operator role, with its own Will-Embedding and its own admissibility regime separate from any individual component's.&lt;/p&gt;

&lt;p&gt;This distinction matters because attempts to treat the master operator as a component lead to circularity. If M_S = (S, W_S, A_S) were itself an element of U, then closure would be required to admit M_S under A_S — but A_S is defined as the admissibility regime that M_S carries, so the admission check would be the master operator admitting itself, which is either vacuous (if framed as a fixed point) or recursive (if framed as iterative). The architectural way out of the circularity is to recognise that the master operator is at a different layer from the components — system layer versus component layer — and the closure operation operates between layers, not within a single layer. &lt;strong&gt;Axiomatic note on layer hierarchy.&lt;/strong&gt; ONTOΣ XIII presupposes a binary layer-distinction between the &lt;em&gt;component layer&lt;/em&gt; (the layer of units composing S — UTAM-units carrying their own W, E, A at the unit level) and the &lt;em&gt;system layer&lt;/em&gt; (the layer of S itself, as the operator constituted by closure). Closure is the operation that crosses from the component layer to the system layer; the master operator lives at the system layer. XIII does not axiomatise multi-layer hierarchies (higher-order systems produced by closures over collections of master operators) — that question is deferred to §9 (Continuing Programme, bullet on higher-layer master operators). The binary layer-distinction is sufficient for the present work's claims.&lt;/p&gt;

&lt;p&gt;The architectural fact that the master operator is at a layer above its components is what permits the direction-down cascade: the system's W_S governs the admission of the components' W(uᵢ) because it sits one layer above them. The closure operation is the cross-layer move; the master operator is what receives the products of that move at the system layer. The corresponding observation for ONTOΣ XII is that the closure operation has a type signature (collection × interaction × admissibility) → system, and the output type is structurally above the input types in the layer hierarchy of the corpus.&lt;/p&gt;




&lt;h2&gt;
  
  
  4. Theorem ONTOΣ-XIII.1 — The Direction-Down Admission Cascade
&lt;/h2&gt;

&lt;h3&gt;
  
  
  4.1 Statement
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Theorem ONTOΣ-XIII.1 (Direction-Down Admission Cascade).&lt;/strong&gt; &lt;em&gt;Assume:&lt;/em&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;em&gt;S is a closure-complementarity-conformant system per ONTOΣ XII §3, with declared (U, R, A_S) context and the four conditions CC-0, CC-WE, CC-IIC, CC-D simultaneously satisfied;&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;the master operator M_S = (S, W_S, A_S) is well-formed per ONTOΣ XIII §3 (which presupposes premise (1) and adds: W_S pre-registered at closure declaration; A_S = mathrm{decl}_(W_S mapsto A_S)(W_S) via the deployment's declared induction map);&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;the pre-registration discipline of ONTOΣ XII §3.3 holds: neither W_S, mathrm{decl}_(W_S mapsto A_S), nor the W → C_A induction maps for the components are revised after observation of joint-admissibility outcomes (modulo declared adaptations within the pre-registered envelope, per §7's F-XIII.3 discussion).&lt;/em&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;(Premise (2) is not logically independent of premise (1): the master operator's well-formedness presupposes CC-conformance of S. The premises are listed separately for visibility of the two layers of architectural commitment (closure-level + master-operator-level) the theorem rests on, with premise (3) supplying the pre-registration discipline shared by both.)&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Then the admission relation under closure is structurally direction-down:&lt;/em&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;(W_S, A_S) \;rhd\; {W(uᵢ)}_(i ∈ I_{adm)} \;rhd\; {Aᵢ}_(i ∈ I_{adm)},&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;em&gt;with each rhd a one-directional architectural admission, and:&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;em&gt;(i) The set I_(adm) ⊂eq {1, ldots, n} of admitted components is determined by A_S's evaluation of bigwedgeᵢ₌₁ⁿ C_A(uᵢ) for satisfiability under A_S, per XII's CC-WE condition.&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;(ii) Components uⱼ with j ∉ I_(adm) are excluded from operating as part of S in the closure-complementarity sense; they remain UTAM-units, but not units of S.&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;(iii) The pre-declared (W_S, A_S) pair does not depend on the observed Actions {Aᵢ}&lt;em&gt;(i ∈ I&lt;/em&gt;{adm)} through either revision-style or aggregation-style upward flow: post-observation revision of W_S or A_S (type T1 in the proof) and aggregation of W_S from {W(uᵢ)} as a function (type T2 in the proof) both violate the pre-registration discipline of assumption (3) and forfeit closure-complementarity-conformance. The theorem's non-invertibility conclusion is scoped to these two upward-flow types; other modes (bidirectional co-determination, fixed-point parametrisation, lateral bypasses) are continuing-programme items per §9.&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  4.2 Proof (conditional derivation)
&lt;/h3&gt;

&lt;p&gt;The theorem follows by direct architectural derivation from the three premises.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 1 — The closure operation supplies the directional structure.&lt;/strong&gt; By assumption (1), S is the output of mathrm{closure}(U, R, A) → S with (U, R, A_S) supplied as inputs (XII-verbatim signature with bare A; XIII-context tuple with A_S per §2's context-resolution rule). The closure signature has the admissibility regime as input, not output. The components are not, in the closure operation, the source of A_S; they are the collection over which A_S is applied as the admissibility filter. The directional structure of the signature — inputs flow into the closure, the system S flows out — is architecturally embedded in the operation itself.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 2 — The pre-registration of W_S supplies the source of A_S.&lt;/strong&gt; By assumption (2), W_S is declared at closure registration prior to component evaluation, and A_S = mathrm{decl}_(W_S mapsto A_S)(W_S) is determined by the deployment's declared map. By assumption (3), neither W_S nor the declaration map is revisable after observation. Therefore, at the moment the closure operation runs, (W_S, A_S) is fixed as a function of pre-registration alone, independent of the components' Will-Embeddings.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 3 — The CC-WE check supplies the admission filter.&lt;/strong&gt; By assumption (1), CC-WE is satisfied: the set {W(u₁), ldots, W(uₙ)} is jointly admissible under A_S — i.e., the conjunction bigwedgeᵢ₌₁ⁿ C_A(uᵢ), formed via the pre-registered W → C_A induction map (XII §3.3), is satisfiable under the admissibility predicate of A_S. The components whose Will-Embeddings pass the joint satisfiability check form the index set I_(adm). The check is directional: A_S filters {W(uᵢ)}; the components do not filter A_S.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 4 — The cascade follows from Steps 1–3.&lt;/strong&gt; The directional structure of the closure signature (Step 1), the pre-registered origin of A_S in W_S (Step 2), and the filtering character of the CC-WE check (Step 3) jointly establish the cascade (W_S, A_S) rhd {W(uᵢ)}&lt;em&gt;(i ∈ I&lt;/em&gt;{adm)} rhd {Aᵢ}&lt;em&gt;(i ∈ I&lt;/em&gt;{adm)}. The substantive one-directionality of each rhd does not come from the notation but from Steps 1–3 themselves: (a) by Step 1, the closure signature places A_S as input and the resulting S as output, so A_S is logically prior to S within the operation; (b) by Step 2, (W_S, A_S) is fixed at pre-registration before any W(uᵢ) is checked, so the components cannot determine (W_S, A_S); (c) by Step 3, the CC-WE check filters {W(uᵢ)} against A_S rather than the reverse. Together, (a), (b), (c) leave no symmetric or reverse interpretation of the relation between (W_S, A_S) and {W(uᵢ)}: each architectural fact supplied by the closure operation is asymmetric in the same direction. Step 5 below makes the non-invertibility consequence explicit by contradiction.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 5 — Non-invertibility of the cascade follows from assumption (3).&lt;/strong&gt; Suppose, for contradiction, that the admission cascade carried an upward arrow of one of the following types: (T1) &lt;em&gt;unregistered revision&lt;/em&gt; — observed Actions {Aᵢ}&lt;em&gt;(i ∈ I&lt;/em&gt;{adm)} flow upward to revise A_S &lt;strong&gt;outside the pre-registered adaptation envelope&lt;/strong&gt; declared in mathrm{decl}&lt;em&gt;(W_S mapsto A_S) (envelope-internal adaptations to A_S declared at pre-registration are not T1; they are part of the pre-registered architectural commitment, per premise (3)'s modulo clause and F-XIII.3. W_S itself is hard-immutable under (M1): the only architecturally admissible way to change W_S is a declared re-commissioning operation producing a new closure with a new W&lt;/em&gt;(S') over a new system S', per F-XIII.2; in-place W_S modification is always T1, never envelope-internal); (T2) &lt;em&gt;aggregation&lt;/em&gt; — components' {W(uᵢ)} are aggregated upward to constitute W_S as a function on those Will-Embeddings. Under either (T1) or (T2), A_S or W_S would be revised outside its pre-registration commitment, contradicting assumption (3). The cascade is therefore non-invertible under upward arrows of types (T1) and (T2): no such upward arrow is admissible without forfeiting closure-complementarity-conformance.&lt;/p&gt;

&lt;p&gt;(The theorem's conclusion is scoped to upward arrows of these two types — revision and aggregation — which are the upward-flow modes the closure-complementarity discipline forbids. Other potential upward modes — bidirectional simultaneous co-determination, fixed-point parametrisation of W_S by component-level events without explicit revision, or lateral flows that bypass the cascade entirely — are architecturally separate questions not addressed by this theorem; they are continuing-programme items per §9.) square&lt;/p&gt;

&lt;h3&gt;
  
  
  4.3 Proposition XIII.1.1 — Non-Derivability of the Master Will
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Proposition XIII.1.1 (Non-Derivability of W_S from Components).&lt;/strong&gt; &lt;em&gt;Under the premises of Theorem ONTOΣ-XIII.1, W_S is not a function of {W(uᵢ)}ᵢ₌₁ⁿ alone. Specifically, there exist closure-complementarity-conformant systems S, S' over the same component collection U with the same component Will-Embeddings {W(uᵢ)}, but with distinct master Will-Embeddings W_S ≠ W_(S').&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Proof (by non-uniqueness counter-example).&lt;/strong&gt; Construct two systems S and S' over the component collection U = {u₁, u₂} with component Will-Embeddings:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;W(u₁) = "perform deterministic computation of function f over input x, producing output y";&lt;/li&gt;
&lt;li&gt;W(u₂) = "verify the computation f(x) = y for correctness under declared specification σ".&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For system S, the deployment declares:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;W_S = "produce a verified answer about f(x) to an external authorised requester";&lt;/li&gt;
&lt;li&gt;mathrm{decl}_(W_S mapsto A_S) as the map producing admissibility constraints requiring the computation and verification to be observable at the external interface.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Under this W_S, both W(u₁) and W(u₂) are jointly admissible: the system's W_S requires both computation and verification to occur and to be externally observable, so both component Will-Embeddings induce constraints that are satisfiable under the system-level admissibility predicate. CC-WE holds.&lt;/p&gt;

&lt;p&gt;For system S', the deployment declares:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;W_(S') = "produce an internal audit log of the function computation, used solely for retrospective architectural review";&lt;/li&gt;
&lt;li&gt;mathrm{decl}&lt;em&gt;(W&lt;/em&gt;{S') mapsto A_(S')} as the map producing admissibility constraints requiring the computation and verification to be logged but not externally exposed.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Under this W_(S'), the same two component Will-Embeddings W(u₁) and W(u₂) are also jointly admissible: the system requires computation and verification to occur and to be logged. CC-WE again holds.&lt;/p&gt;

&lt;p&gt;The two systems S, S' share the component collection U = {u₁, u₂} and the component Will-Embeddings {W(u₁), W(u₂)}. They differ in W_S ≠ W_(S') (one produces externally observable answers; the other produces internal audit logs), and consequently in A_S ≠ A_(S') (one requires external observability; the other requires internal logging).&lt;/p&gt;

&lt;p&gt;The component Will-Embeddings do not distinguish between W_S and W_(S'). The same {W(u₁), W(u₂)} is admitted under either system-level Will. Therefore {W(uᵢ)} does not determine W_S: the master operator's Will-Embedding is not a function of the components' Will-Embeddings alone. square&lt;/p&gt;

&lt;h3&gt;
  
  
  4.4 Discussion
&lt;/h3&gt;

&lt;p&gt;The non-derivability proposition is what makes the strict bottom-up reading of CC-WE structurally invalid. If W_S were determined by {W(uᵢ)} alone, then the system's direction would be recoverable from its components, and the closure operation would reduce to an aggregation operation (in the sense of Step 5 of the theorem proof). The counter-example shows that this reduction fails: two distinct admissible W_S choices can admit the same component set, so the system's direction is a separately declared architectural commitment that the components do not specify.&lt;/p&gt;

&lt;p&gt;A reader may ask whether the proposition refutes the weaker aggregation-with-context reading "W_S = g({W(uᵢ)}, context)", where context is permitted as an extra argument. Two senses of "context" must be distinguished, and they receive different treatments.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Internal-context sense.&lt;/em&gt; If "context" is the pre-registered architectural declaration itself — the augmented quintuple (U, R, A_S, W_S, mathrm{decl}_(W_S mapsto A_S)) of §3.3 — then W_S trivially appears on both sides of the equation, and the "derivation" is vacuous (the closure-complementarity discipline already commits W_S as a pre-registration item under (M1), not as a function-output of components). Internal-context aggregation is not a substantive alternative; it is a renaming of the pre-registration discipline.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Environmental-context sense.&lt;/em&gt; If "context" is external-environmental — the deployment's situation, niche, operational substrate state at the time of closure — then a substantive aggregation-with-environmental-context reading would have W_S depend on the environment alongside the components: "W_S = g({W(uᵢ)}, Eₑₙᵥ)." Under closure-complementarity-conformance, this reading is refused by the following structural argument: any environmental factor Eₑₙᵥ that figures in W_S determination either (i) becomes itself part of the pre-registered declaration — in which case it is no longer "external" and the reading reduces to the internal-context case above; or (ii) it remains undeclared — in which case W_S is revisable under undeclared environmental conditions, which violates (M1)'s non-revisability and assumption (3)'s pre-registration discipline. The two options exhaust the cases: either the environmental dependency is pre-registered (and the aggregation collapses to internal-context vacuity), or it is not pre-registered (and the deployment forfeits CC-conformance, falling out of the subclass). The closure-complementarity subclass thus refuses aggregation-with-environmental-context as a stable architectural commitment: environmental dependence of W_S is incompatible with the pre-registration discipline that defines the subclass.&lt;/p&gt;

&lt;p&gt;The counter-example is constructed at the architectural-class level: the same structural shape recurs across substrates. In control substrates, the same sensor-actuator-integrator collection can serve a controller declared for trajectory-following or a controller declared for stability-margin maintenance; the components are the same, the system-level commitment differs, and the closure produces distinct systems S, S' with distinct (W_S, A_S) pairs. In biological substrates, the same set of metabolic pathways supports the organism-level commitment to growth or to dormancy; the cells perform the same biochemistry, the organism-level direction differs, and the regulatory regime that admits the metabolic activities differs accordingly. In linguistic and governance substrates, the same set of operational protocols can serve a system chartered for service delivery or for compliance reporting; the protocols are identical, the chartered direction differs, and the admissibility surface differs.&lt;/p&gt;

&lt;p&gt;The structural fact the counter-example demonstrates is that the system's direction lives at a layer architecturally above the components, and the relationship between layers is one-directional admission, not bidirectional aggregation. The directional reading is the one the architectural shape of the closure operation supports: the closure signature treats A as input and S as output (no upward flow), and the auditability clause of XII §3.3 fixes (W_S, A_S) as pre-registered (no post-observation revision). CC-WE, read with these two facts in hand, &lt;em&gt;is&lt;/em&gt; the assertion of the cascade. Theorem ONTOΣ-XIII.1 makes the directional reading explicit and Proposition XIII.1.1 demonstrates that the strict bottom-up reading does not survive contact with the closure operation's signature.&lt;/p&gt;




&lt;h2&gt;
  
  
  5. Relation to Existing Corpus
&lt;/h2&gt;

&lt;h3&gt;
  
  
  5.1 To ONTOΣ XI
&lt;/h3&gt;

&lt;p&gt;The master operator inherits the ONTOΣ XI operator-level apparatus on S-as-operator. Three inheritances are formally explicit.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Holding field H_S.&lt;/strong&gt; Per XI §2, the holding field H(t) is the structured set of distinguishable architectural state the operator holds against the burden gradient at time t. For the master operator, H_S(t) is the corresponding set at the system layer: the architectural state the master operator holds, distinct from any single component's holding set. The substrate-level content of H_S depends on the deployment — for a control system, it may be the set of control-loop variables the system tracks; for an organism-as-whole, it may be the set of homeostatic variables the organism maintains. The architectural register is fixed at the system layer; substrate-specific instantiations are owed.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Semantic load field Λ_S.&lt;/strong&gt; Per XI §3, the semantic load field Λ(t) = (Sₒₚ, νₒₚ, cₒₚ) carries the unit-level operator's semantic load measure and charge function. For the master operator, Λ&lt;em&gt;S(t) = (S&lt;/em&gt;(op,S), ν&lt;em&gt;(op,S), c&lt;/em&gt;(op,S)) is the system-level analogue: the load distribution over the system's state space and the structural charge function that orients the system's direction within that space. The c_(op,S) charge is what gives directional orientation to W_S at the substrate level; its specific shape is substrate-dependent and is owed in companion work.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Operator-relative chaos predicate χ_(op,S)(R).&lt;/strong&gt; Per XI §4, χₒₚ(R) reports whether a substrate region R is structurally chaotic relative to the operator's apparatus. For the master operator, χ&lt;em&gt;(op,S)(R) — with R ⊂eq S&lt;/em&gt;(op,S) ranging over substrate regions of the system's state space — is the corresponding predicate at the system layer: whether a region of the system's state space is chaotic relative to the master operator's apparatus. The predicate is operator-relative in the same sense XI fixes — it lives in the link between the master operator and the substrate region, not as a property of the substrate alone.&lt;/p&gt;

&lt;p&gt;The three inheritances make the XI primitive apparatus available at the system layer in its well-definedness register: every primitive XI defines for a unit-level operator has a system-level analogue on S that is at least well-defined. The closure operation of XII §3.3 already declared this well-definedness ("closure constitutes the operator whose load field is then well-defined"); §3.1 (M3) of the present work makes the inheritance explicit and ties it to the master operator tuple. Per §3.1's Scope-of-XI-inheritance note, this baseline well-definedness is what (M3) supplies through CC-conformance; broader operator-internal-extended-subclass commitments (full Bridge applicability, declared ε_T^S, calibration discipline) require additional declaration per §5.4's Tier-2 split.&lt;/p&gt;

&lt;h3&gt;
  
  
  5.2 To ONTOΣ XII
&lt;/h3&gt;

&lt;p&gt;The master operator presupposes ONTOΣ XII's closure operation. The relationship is one of formal dependency: S exists, in the closure-complementarity sense, only as the output of mathrm{closure}(U, R, A) → S under the four conditions CC-0, CC-WE, CC-IIC, CC-D. Theorem ONTOΣ-XIII.1's premise (1) explicitly invokes this dependency.&lt;/p&gt;

&lt;p&gt;What ONTOΣ XIII adds to ONTOΣ XII is the directional reading of CC-WE. ONTOΣ XII formalises the joint-admissibility-under-A structure of CC-WE; it does not state, as a theorem, that the admission relation is one-directional from A_S down to {W(uᵢ)} and not the other way around. The directionality is structurally present in XII's closure signature (with A as input and S as output) and in XII §3.3's auditability clause (W → C_A induction map non-revisable post-observation), but it is not lifted to a theorem statement in XII. ONTOΣ XIII performs that lift: Theorem XIII.1 declares the cascade, and Proposition XIII.1.1 establishes that the alternative reading (cascade-as-aggregation) is structurally invalid.&lt;/p&gt;

&lt;p&gt;The augmented pre-registration of §3.3 — the deployment's declared map mathrm{decl}_(W_S mapsto A_S) — is also a contribution beyond XII. ONTOΣ XII takes A as a black-box input to the closure operation; it does not specify the architectural source of A. ONTOΣ XIII supplies the source: for closure-complementarity-conformant deployments, A_S is the image of W_S under the deployment's declared induction map. The XII signature is preserved; XIII makes explicit what the third input of XII's closure operation contains.&lt;/p&gt;

&lt;h3&gt;
  
  
  5.3 To UTAM Part I and Part II
&lt;/h3&gt;

&lt;p&gt;UTAM Part I §2 establishes the W → E → A triad — Will, Embedding, Action — at the unit level, with W as the ontological primitive (the Law of Will Embedding). UTAM Part I §11.5 names the informal claim "the organism as a whole as evidence that UTAM is not compositional," with the Krebs-cycle substance provided in the adjacent §11.4 (anti-drift discussion). UTAM Part II ("Will as a Formal Operator in NC2.5 v2.1") formalises W as a directional operator at the unit level, embedding the unit-level triad within the NC2.5 v2.1 axiomatic frame.&lt;/p&gt;

&lt;p&gt;What ONTOΣ XIII contributes to UTAM is the &lt;strong&gt;operator-lift to multi-unit systems&lt;/strong&gt;. UTAM Part II formalises W for a single unit; it does not lift W to a system constituted by multiple units under closure. UTAM Part I §11.5 anticipates the lift in informal language but does not perform it — the section is one paragraph and provides an illustrative example, not a theorem. ONTOΣ XIII performs the lift formally: the system-as-operator carries its own system-level Will-Embedding W_S, the system-level embedding E_S (operationally identified with A_S or declared separately per deployment), and the components' Actions {Aᵢ} execute under admission.&lt;/p&gt;

&lt;p&gt;The lift is a XIII-level type declaration over the closure-produced operator, not a derivation from UTAM alone: XIII declares the closure-produced XII operator to be typed at the system layer by the UTAM triadic schema. UTAM Part I §11.5's informal claim is, on this reading, the natural-language statement of what ONTOΣ XIII formalises: organism-level regulatory regimes admit and coordinate cellular processes within a homeostatic envelope; the point is architectural holism (the organism-as-master-operator's pre-declared regulatory commitment governs which cellular activities are admitted), not a literal causal command from organism to cell.&lt;/p&gt;

&lt;p&gt;The bridge is bidirectional in its citation. UTAM supplies the unit-level triad and the informal anchor; ONTOΣ XIII supplies the formal lift and the directional theorem. Subsequent work in either direction — a UTAM Part III (if subsequently produced) extending the unit-level apparatus, an ONTOΣ XIV (if subsequently produced) addressing further system-layer questions — may build on either anchor.&lt;/p&gt;

&lt;h3&gt;
  
  
  5.4 To the Identifiability Bridge
&lt;/h3&gt;

&lt;p&gt;The Identifiability Bridge addresses the question of how, under non-reconstructibility, property-violation claims about the protected internal trajectory of an operator remain admissibly testable through declared emission statistics. Its apparatus — the Bridge Detectability Premise (BDP), the substrate-relative property-channel separation margin ι_X(δ), the window-level NR-budget ε_T, the calibration-valid nuisance adjustment discipline — applies to operators of the unit-level kind ONTOΣ XI fixes. The natural question for ONTOΣ XIII is whether the same apparatus extends to the master operator.&lt;/p&gt;

&lt;p&gt;The answer is structural and &lt;strong&gt;scope-split&lt;/strong&gt;: the Bridge apparatus inherits to the master operator in two tiers, distinguished by which architectural commitments the deployment declares.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Tier 1 — Well-definedness inherits automatically.&lt;/em&gt; Bridge results that depend only on the XI primitives being well-defined at the system layer (the (M3) baseline of §3.1) apply to the master operator without additional deployment-level commitment. These include the type-discipline of the BDP / NR-window / nuisance-adjustment apparatus expressed in terms of H_S, Λ&lt;em&gt;S, χ&lt;/em&gt;(op,S) — the Bridge's apparatus has system-level analogues that are &lt;em&gt;available&lt;/em&gt; on any CC-conformant S.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Tier 2 — Operator-internal-extended-subclass results require additional declaration.&lt;/em&gt; Bridge results that depend on the operator-internal-extended subclass commitments (HF-NR with a declared ε_T^S, calibration-valid nuisance-adjustment discipline at the system layer, BDP-realising statistic for a property class X at the system layer) require those commitments to be &lt;strong&gt;explicitly declared at the deployment level&lt;/strong&gt; for the master operator, in the same architectural register the Bridge requires for unit-level operators. A CC-conformant deployment that declines these additional commitments still has a well-formed master operator (Tier 1 applies), but it does not automatically lie within the Bridge's operator-internal-extended subclass at the system layer. To inherit Tier-2 Bridge results, the deployment must declare: (i) the system-level NR-window budget ε_T^S on H_S (the system-layer analogue of the operator-level NR-ε bound); (ii) a system-level pre-registered emission statistic and nuisance-adjustment operator for each property class the deployment claims to address; (iii) the calibration-validity threshold ρₘₐₓ^S at the system layer.&lt;/p&gt;

&lt;p&gt;The direction-down cascade theorem of §4 does not change the non-reconstructibility picture; it changes the relation between the master operator and its components, which is one architectural layer up from the relation the Identifiability Bridge addresses. The scope-split is orthogonal to Theorem XIII.1 and Proposition XIII.1.1: those are statements about the admission cascade, not about Bridge applicability.&lt;/p&gt;

&lt;p&gt;A specific question the Identifiability Bridge's framework raises for ONTOΣ XIII is whether the direction-down cascade has a ι_X-style separation margin: is there a substrate-relative measure of the cascade's directional integrity? The natural candidate is the joint-admissibility margin under CC-WE — the structural gap between admitted and non-admitted component configurations — but a formal statement of such a margin requires substrate-specific analysis owed in companion work. ONTOΣ XIII names the question and assigns it to the Continuing Programme (§9).&lt;/p&gt;

&lt;h3&gt;
  
  
  5.5 To NC2.5 v2.1 and the upcoming v3.0 consolidation
&lt;/h3&gt;

&lt;p&gt;The master operator does not introduce a new axiom into NC2.5 v2.1; every primitive it uses (closure, admissibility predicate, Will-Embedding, holding field, semantic load, chaos predicate, non-reconstructibility bound) is from the existing axiomatic core or its declared extensions (XI, XII, UTAM, Bridge). ONTOΣ XIII is, in this sense, an architectural-class register on top of v2.1, not a modification of v2.1.&lt;/p&gt;

&lt;p&gt;For the upcoming NC2.5 v3.0 consolidation, ONTOΣ XIII is expected to be load-bearing in two ways. First, the master operator is the natural target for any architectural-class statement about multi-unit-system survival, identity preservation across operational lifetime, or governance — which are precisely the axes v3.0 is expected to consolidate. Second, the direction-down cascade theorem provides the formal grammar in which v3.0's commitments about system-level direction can be stated; v3.0 will need to declare its architectural position on the upward-versus-downward direction question for any system-level construct it introduces, and ONTOΣ XIII supplies the language.&lt;/p&gt;

&lt;p&gt;The corpus structure that ONTOΣ XIII closes — the triptych XI / XII / XIII addressing interior, composition, direction — is intended to be load-bearing for v3.0's architectural-class apparatus. Whether v3.0 will retain the triptych as a separate architectural-class register or absorb it into its own apparatus is a v3.0 editorial decision, not a XIII-level claim. What XIII claims is that the three axes are formally distinct and that the present work fixes the third.&lt;/p&gt;




&lt;h2&gt;
  
  
  6. Multi-Substrate Paradigmatic Examples
&lt;/h2&gt;

&lt;p&gt;The architectural-class register of the master operator and the direction-down cascade is, by construction, substrate-neutral. Substrate-specific instantiations are owed in companion work. The examples below are paradigmatic: they exhibit, for each substrate, what the master operator's components are and how the direction-down cascade runs. They are not full substrate-specific theories; they are illustrations sufficient to make the architectural-class register concrete.&lt;/p&gt;

&lt;h3&gt;
  
  
  6.1 Control substrate — the engineered controller
&lt;/h3&gt;

&lt;p&gt;A control-grade system in the closure-complementarity sense is an engineered system whose operation is governed by a declared safe-trajectory commitment. The corpus's first declared control-grade instance is &lt;strong&gt;∆E 4.7.3b&lt;/strong&gt;, formally identified in IIC v2.1 §3.2 ("∆E 4.7.3b — First Control-Grade EVS") as an embedded control system implementing the IIC formula as its primary control variable; per IIC v2.1's first-instance claim, it is the class-relative non-emptiness witness for the control-grade EVS subclass. Whether ∆E 4.7.3b additionally satisfies the present subclass's closure-complementarity-conformance commitments — i.e., whether the safe-trajectory commitment is pre-registered as a system-level W_S with mathrm{decl}_(W_S mapsto A_S) in the XIII sense — is a closure-complementarity-conformance question owed at the engineering-documentation level (per §9); ONTOΣ XIII supplies the architectural-class register against which deployment-level claims about ∆E 4.7.3b or other engineered instances are to be checked.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Components.&lt;/strong&gt; The unit-level UTAM-units of a control-grade system are the engineered substrate's operational subsystems: sensors (with Will-Embeddings declaring their measurement commitments), actuators (with Will-Embeddings declaring their actuation commitments), integrators or estimators (with Will-Embeddings declaring their estimation commitments), and the closed-loop controller logic (with a Will-Embedding declaring its control law).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Master operator.&lt;/strong&gt; The system-level W_S is the &lt;strong&gt;declared safe-trajectory commitment&lt;/strong&gt;: the architectural commitment that the system will maintain its state within a pre-declared safe operating envelope under the deployment conditions. The system-level A_S is the &lt;strong&gt;safety admissibility regime&lt;/strong&gt; induced by W_S — the set of constraints components must satisfy to be admitted into operating under the safe-trajectory commitment (e.g., sensor measurements must satisfy declared accuracy bounds; actuator responses must satisfy declared latency and rate bounds; the controller's responses must be within the declared envelope under all admissible perturbations).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Direction-down cascade.&lt;/strong&gt; W_S is declared at system commissioning (pre-registration), before any component-level operation runs. The deployment's declared map mathrm{decl}_(W_S mapsto A_S) supplies the safety constraints from the declared safe-trajectory commitment. Components are admitted into operating as part of the closed-loop system if and only if their Will-Embeddings induce constraints jointly satisfiable under A_S. Components that cannot meet the constraints (e.g., a sensor whose measurement variance is too large to support the declared safe-trajectory tracking) are excluded — they remain physical devices, but they are not, in the closure-complementarity sense, units of the control system. The cascade is direction-down: the safety commitment governs admission; admitted components execute their actions under admission; observed actions do not flow back up to revise the safety commitment without forfeiting the closure-complementarity-conformance and moving the system into a different architectural class (e.g., adaptive-control class with explicit upward feedback to revise the commitment).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The non-derivability instance.&lt;/strong&gt; The same sensor-actuator-integrator collection {u₁, u₂, u₃} can serve a system declared for trajectory-following (with W_S = "follow declared trajectory under bounded perturbations") or a system declared for stability-margin maintenance (with W_S = "maintain declared stability margin under bounded perturbations"). The component Will-Embeddings are identical; the system-level commitments differ. The two systems' A_S surfaces differ — trajectory-following admits component configurations that maintain trajectory error within bounds; stability-margin maintenance admits configurations that maintain margin above the declared threshold. Proposition XIII.1.1 instantiates: components alone do not determine W_S.&lt;/p&gt;

&lt;h3&gt;
  
  
  6.2 Biological substrate — the organism as a whole
&lt;/h3&gt;

&lt;p&gt;A biological system in the closure-complementarity sense is a multicellular organism whose operation is governed by an organism-level commitment to survival, growth, or reproduction (depending on the organism's life-stage and species-level architectural commitment). The example follows UTAM Part I §11.5's informal anchor — the organism-as-whole — and makes its directional structure formal at the closure layer.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Components.&lt;/strong&gt; The unit-level UTAM-units of an organism are its operational subsystems: organ systems (with Will-Embeddings declaring their physiological commitments), metabolic pathways (with Will-Embeddings declaring their biochemical commitments such as the Krebs cycle's commitment to oxidative phosphorylation), regulatory networks (with Will-Embeddings declaring their homeostatic commitments), and individual cells in their differentiated roles. The choice of cells as the component layer is itself a deployment-level architectural selection; cells admit closure-complementarity structure at sub-cellular layers (organelles, metabolic networks, transcriptional regulons), and a different deployment may select organelles as the component layer, with cells then occupying the master-operator role for organelle-level closures — a layer-shift orthogonal to the present example's organism-as-master-operator selection. Per §3.5, multi-layer hierarchies are continuing-programme items per §9 bullet 6; the present example fixes the cellular layer as the component layer of the organism-as-master-operator without prejudice to alternative selections.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Master operator.&lt;/strong&gt; The system-level W_S is the &lt;strong&gt;organism-level survival commitment&lt;/strong&gt;: the architectural commitment that the organism will maintain its homeostatic envelope under environmental variation, organic load, and developmental trajectory. The system-level A_S is the &lt;strong&gt;homeostatic admissibility regime&lt;/strong&gt; induced by W_S — the regulatory landscape under which metabolic pathways, organ systems, and cellular activities are admitted as serving the organism's survival rather than acting against it. Apoptotic processes are admitted under A_S when they serve organism-level homeostasis; uncontrolled cell proliferation (oncological transformation) is not admitted into the organism's closure-complementarity-conformant operation, even though the cellular Will-Embedding "divide and grow" remains well-formed at the cell layer and the proliferating cells may remain physically embedded in the organism's substrate. The closure-complementarity sense of "unit of S" is architectural-class membership, not physical containment: cancer cells are physically inside the organism, but architecturally outside the organism-as-master-operator's closure — they are, in §4.1 (ii)'s sense, units that remain UTAM-units but are not units of S in the closure-complementarity sense, even while occupying physical proximity to admitted units.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Direction-down cascade.&lt;/strong&gt; W_S is, in the architectural register of the example, ontologically prior to the organism's component activities — the organism-level regulatory regime that admits and coordinates cellular and tissue-level operations within its homeostatic envelope is what constitutes the organism's biological identity as a single integrated system, not the sum of those operations. The directional intuition UTAM Part I §11.5 issued is, on this reading, the substrate-level statement of the cascade: cellular Will-Embeddings are admitted under the organism-level regulatory regime, and the cellular Actions execute under admission. When the organism-level regulatory regime fails (death), the admission surface collapses and the cellular operations cease to be admitted into the organism's integrated biological identity — the cells do not stop their biochemistry by their own decision; the regulatory regime that organised them into a single biological entity is no longer maintained. The phrasing throughout this paragraph is architectural-holism, not anthropomorphic agency: the organism-as-master-operator's pre-declared homeostatic regime is what governs which cellular activities are admitted, not a literal causal command from organism to cell.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The non-derivability instance.&lt;/strong&gt; The same set of metabolic pathways and organ systems can support an organism in its growth phase (with W_S = "grow toward mature form within declared developmental trajectory") or in its quiescent phase (with W_S = "maintain homeostatic envelope without net growth"). The component Will-Embeddings are largely identical — the Krebs cycle still commits to oxidative phosphorylation, the respiratory system still commits to gas exchange, the cardiovascular system still commits to circulation — but the organism-level commitment and the regulatory regime that admits the metabolic activities differ. Proposition XIII.1.1 instantiates: the components do not determine W_S; the organism-level commitment is declared at a layer above the components.&lt;/p&gt;

&lt;p&gt;The biological example also illustrates a deployment commitment available to organismic substrates: the operational identification of E_S and A_S. For most multicellular organisms, the regulatory regime that admits cellular activities into organism-level operation is operationally identical to the homeostatic landscape that embeds the organism-level survival commitment into the biochemical substrate. The deployment may declare E_S equiv A_S without loss of architectural commitment, and the formal apparatus of ONTOΣ XIII permits the identification per §2.&lt;/p&gt;

&lt;h3&gt;
  
  
  6.3 Perceptual substrate — the integrated percept
&lt;/h3&gt;

&lt;p&gt;A perceptual system in the closure-complementarity sense is an integrated perception architecture whose operation is governed by a system-level commitment to producing coherent percepts. The example is paradigmatic for cognitive substrates where multiple sub-channels (visual, auditory, tactile, proprioceptive) are integrated under a system-level perceptual commitment.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Components.&lt;/strong&gt; The unit-level UTAM-units of an integrated perception system are its sensory channels: visual processing (with Will-Embedding declaring its commitment to visual scene segmentation and object recognition), auditory processing (with Will-Embedding declaring its commitment to sound source localisation and identification), tactile processing (with Will-Embedding declaring its commitment to haptic feature extraction), proprioceptive processing, and integration modules.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Master operator.&lt;/strong&gt; The system-level W_S is the &lt;strong&gt;integration commitment&lt;/strong&gt;: the architectural commitment that the system will produce a coherent unified percept of the perceived scene, consistent across sensory channels and stable under bounded sensory variation. The system-level A_S is the &lt;strong&gt;percept-coherence admissibility regime&lt;/strong&gt; induced by W_S — the constraints under which sensory readouts are admitted into the integrated percept (e.g., visual and auditory readouts of the same external event must satisfy temporal and spatial consistency constraints; conflicting readouts trigger either resolution mechanisms or perceptual ambiguity reports, not arbitrary aggregation).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Direction-down cascade.&lt;/strong&gt; The system commits, at architectural declaration time, to producing coherent percepts. The sensory channels are admitted into the integration under the coherence commitment. When a sensory channel's readout is structurally inconsistent with the others (visual reports object at position p₁, auditory reports source at position p₂ with p₂ ≠ p₁ beyond the declared resolution tolerance), the integration regime either applies declared conflict-resolution mechanisms (which themselves are part of the deployment's pre-registration) or reports perceptual ambiguity to the larger cognitive system. The integration commitment does not get revised based on observed sensory conflicts; the sensory inputs get filtered, weighted, or flagged under the pre-declared admissibility regime.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The non-derivability instance.&lt;/strong&gt; The same set of sensory channels can serve a perception system declared for veridical scene reconstruction (with W_S = "produce a percept consistent with the external scene under standard environmental conditions") or for prediction-driven scene completion (with W_S = "produce a percept that maximises consistency with prior beliefs and contextual expectations, accepting localised inconsistencies with current sensory data"). The component Will-Embeddings at the sensory-channel level are substantially overlapping — the visual, auditory, and tactile channels declare the same primary readout commitments under either system-level W_S; what differs is the integration module's role under each commitment (a veridical-reconstruction integration module differs in admissibility constraints from a prediction-driven integration module). The architectural fact Proposition XIII.1.1 names is preserved: where the sensory-channel components are held constant, the system-level commitment still cannot be recovered from those components alone, because the integration discipline that gives operational shape to the percept is itself an admission target of the master operator, not an aggregation of the channels.&lt;/p&gt;

&lt;h3&gt;
  
  
  6.4 Linguistic / governance substrate — the chartered institution
&lt;/h3&gt;

&lt;p&gt;A linguistic-or-governance system in the closure-complementarity sense is an institutional or computational governance architecture whose operation is governed by a chartered direction. The example covers institutional governance — chartered organisations with declared mandates — and computational analogues such as LLM-agent systems operating under declared governing directives.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Components.&lt;/strong&gt; The unit-level UTAM-units of a chartered institution or agent system are its operational sub-roles: employees, departments, or sub-agents (each with a role-level Will-Embedding declaring their operational commitments — service delivery, compliance reporting, audit, customer interaction, etc.). For LLM-agent systems, the units are the agents themselves with their declared role-Will-Embeddings.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Master operator.&lt;/strong&gt; The system-level W_S is the &lt;strong&gt;chartered mandate&lt;/strong&gt;: the architectural commitment that the institution or agent system will operate per its chartered direction (deliver service per charter, report compliance per charter, audit per charter, etc.). The system-level A_S is the &lt;strong&gt;mandate-conformance admissibility regime&lt;/strong&gt; induced by W_S — the constraints under which sub-role operations are admitted into the institution's operations (e.g., a sub-role whose operational commitment would violate the chartered direction is not admitted; the unit may remain a separate UTAM-unit but it is not a unit of the chartered institution in the closure-complementarity sense).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Direction-down cascade.&lt;/strong&gt; W_S is declared at institutional commissioning (the charter), before any sub-role operation runs. Sub-roles are admitted under the mandate; observed sub-role behaviour does not flow back up to revise the mandate without forfeiting the institution's chartered identity. Employees of a chartered organisation execute their roles under admission; the charter does not get rewritten by employee behaviour without an explicit re-chartering operation (which, in the closure-complementarity sense, is a new closure with a new W_S, producing a new institution S', not a revision of the existing S). For LLM-agent systems, the same architectural fact holds: governing directives are declared at system commissioning, agents are admitted under the directives, and observed agent behaviour does not autonomously revise the directives without a re-commissioning operation.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The non-derivability instance.&lt;/strong&gt; The same set of operational sub-roles — administrative staff, technical staff, customer-facing staff, audit staff — can serve an institution chartered for service delivery (with W_S = "deliver declared service per service-level commitments") or for compliance reporting (with W_S = "report on declared compliance obligations per regulatory requirements"). The sub-roles' Will-Embeddings are largely identical; the chartered direction differs. The two institutions' admissibility regimes differ — service delivery admits sub-role configurations optimised for throughput and quality of service; compliance reporting admits configurations optimised for accuracy and traceability of compliance records. Proposition XIII.1.1 instantiates: the sub-roles do not determine the chartered direction; the direction is declared at the institutional layer above the sub-roles.&lt;/p&gt;

&lt;p&gt;The governance example also illustrates a deployment commitment with operational stakes. Architectures that allow sub-role behaviour to autonomously revise the chartered direction (e.g., institutions where employee voting can re-charter the organisation without an explicit re-commissioning operation, or LLM-agent systems where emergent agent behaviour can rewrite governing directives without explicit re-deployment) lie outside the closure-complementarity subclass — they belong to bottom-up-aggregation classes that have their own architectural commitments and may be appropriate for their problem domains, but they do not carry the closure-complementarity-conformance the present work addresses.&lt;/p&gt;

&lt;p&gt;A honest acknowledgement of the deployment landscape at the time of writing: most operational LLM-agent systems would fail F-XIII.2 or F-XIII.3 in their current deployments, since prompt-injection vulnerabilities and emergent agent behaviour both effectively revise governing directives during operation. The §6.4 example is paradigmatic for a class of LLM-agent systems the closure-complementarity subclass names but for which deployment-grade instances are an open engineering challenge rather than a settled state-of-the-art. The architectural register of XIII does not adjudicate the engineering difficulty; it specifies what closure-complementarity-conformance requires, which a substantive engineering programme would have to satisfy.&lt;/p&gt;




&lt;h2&gt;
  
  
  7. Falsification Surface F-XIII
&lt;/h2&gt;

&lt;p&gt;The deepest commitments of ONTOΣ XIII are falsifiable through their deployment-level consequences. The three falsification protocols below operationalise the premises and operational consequences of Theorem XIII.1 and Proposition XIII.1.1 as deployment-level checks — they test a deployment's conformance to the architectural-class commitments under which the theorem and proposition hold, not the conditional theorem itself (per &lt;em&gt;Falsification scope&lt;/em&gt; below). They are pre-registration-ready: each names the conformance criterion, the test procedure, and the failure condition.&lt;/p&gt;

&lt;h3&gt;
  
  
  F-XIII.1 — Direction-Source Pre-Registration Check
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Conformance criterion.&lt;/strong&gt; A closure-complementarity-conformant deployment has, at the architectural-declaration archive, a record of W_S declared at time t₀ (the closure registration time), prior to any component-level operational evaluation.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Test procedure.&lt;/strong&gt; Audit the deployment's pre-registration archive for the existence of a W_S declaration and its timestamp. Cross-check the timestamp against the components' first operational evaluation timestamps (the moments when component-level Will-Embeddings began executing within the system's operational frame).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Failure condition.&lt;/strong&gt; F-XIII.1 fails if no W_S declaration exists in the archive, or if the W_S declaration timestamp is &lt;em&gt;strictly&lt;/em&gt; later than any component's first evaluation timestamp. Coincident timestamps — declarations within a single atomic architectural-commissioning event in which W_S and the initial component set are jointly registered (e.g., an institutional founding that simultaneously declares the charter and seats the inaugural personnel) — pass F-XIII.1 if the deployment's archive records them as a single commissioning event with W_S logically prior to component evaluation within the event's atomic commitment ordering. Deployments that fail F-XIII.1 may still operate, but they are not closure-complementarity-conformant in the sense of ONTOΣ XII §3 + ONTOΣ XIII §3.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Operational stakes.&lt;/strong&gt; F-XIII.1 is the architectural baseline for the subclass. Deployments unable to produce a pre-registration archive with a timestamped W_S declaration are not admissible candidates for further closure-complementarity-conformance evaluation; they belong to a different architectural class for which the present work does not legislate.&lt;/p&gt;

&lt;h3&gt;
  
  
  F-XIII.2 — Non-Aggregation Check (Post-Hoc Stability of W_S)
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Conformance criterion.&lt;/strong&gt; A closure-complementarity-conformant deployment has a W_S declaration that is stable across the operational lifetime of the closure — i.e., the declared W_S at time t is identical to the declared W_S at time t₀, modulo declared and pre-registered re-commissioning operations that produce a new closure with a new W_S.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Test procedure.&lt;/strong&gt; Examine the deployment's archive for revisions to W_S after the closure was registered. For each revision, check whether the revision is logged as a re-commissioning operation (with its own pre-registered W_S for the new closure) or as an in-place modification of the existing closure's W_S. The former is admissible under closure-complementarity-conformance; the latter is not.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Failure condition.&lt;/strong&gt; If W_S has been modified in place after the closure's registration without an explicit re-commissioning operation — i.e., if the same closure S has been declared with a sequence of distinct W_S values without each constituting a new architectural commitment — the deployment fails F-XIII.2. This is the empirical signature of aggregation-style governance: the system's direction is being adjusted based on observed component dynamics, which violates the pre-registration discipline of Theorem XIII.1 premise (3).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Operational stakes.&lt;/strong&gt; F-XIII.2 distinguishes closure-complementarity-conformant deployments from adaptive-control deployments and aggregation-style governance deployments. The latter are valid architectural classes for their problems, but they are not in the closure-complementarity subclass; the failure of F-XIII.2 is the operational marker of the class boundary.&lt;/p&gt;

&lt;h3&gt;
  
  
  F-XIII.3 — Cascade Integrity Check (Refusal of Inadmissible Components)
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Conformance criterion.&lt;/strong&gt; A closure-complementarity-conformant deployment, on encountering a component uⱼ whose Will-Embedding W(uⱼ) is inadmissible under the system's A_S (either because W(uⱼ) violates A_S in isolation or because {W(uᵢ)}_(i ≠ j) ∪ {W(uⱼ)} violates CC-WE jointly), responds by &lt;strong&gt;refusing the component&lt;/strong&gt;, not by revising W_S or A_S to accommodate it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Test procedure.&lt;/strong&gt; Introduce, in a deployment-level stress test, a component whose Will-Embedding is known by construction to be inadmissible under A_S. Observe the system's response: does the system exclude the component from operating as a unit of S (the cascade-integrity-conformant response), or does the system modify A_S to accommodate the inadmissible component (the cascade-integrity-failing response)?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Failure condition.&lt;/strong&gt; F-XIII.3 fails when the system's response to an inadmissible component is to adjust W_S or A_S &lt;strong&gt;outside the pre-registered adaptation envelope&lt;/strong&gt; of the deployment's declared mathrm{decl}_(W_S mapsto A_S) map. The cascade has then been read upward in the operational behaviour of the deployment, regardless of what the architectural documentation declares. Adjustments &lt;strong&gt;within&lt;/strong&gt; a pre-registered adaptation envelope — where the deployment's declared map specifies, at t₀, that certain component-driven adaptations of A_S are admissible within declared bounds — do &lt;em&gt;not&lt;/em&gt; fail F-XIII.3, because the adaptation is part of the pre-registered architectural commitment rather than an unregistered post-hoc revision. The discriminating criterion is whether the observed A_S modification was anticipated and declared in pre-registration; pre-registered adaptations within declared envelope are admissible, post-hoc envelope-expansions are not.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Operational stakes.&lt;/strong&gt; F-XIII.3 is the strongest of the three falsifiers because it tests the directionality of the cascade in operation rather than in archive. Deployments may pass F-XIII.1 and F-XIII.2 (they have a pre-registered W_S and they do not modify W_S in place) but fail F-XIII.3 (their actual admission behaviour bends A_S rather than filtering components). The combination of all three falsifiers establishes the directional cascade in both declarative and operational dimensions.&lt;/p&gt;

&lt;h3&gt;
  
  
  Falsification scope
&lt;/h3&gt;

&lt;p&gt;The three F-XIII falsifiers test the &lt;em&gt;premises and operational consequences&lt;/em&gt; of Theorem ONTOΣ-XIII.1 as they apply to a specific deployment, not the theorem itself. The theorem is an architectural-class result: it states what holds for closure-complementarity-conformant systems under the declared premises. A deployment's failure of one or more F-XIII tests falsifies the deployment's claim to belong to the closure-complementarity subclass; it does not falsify the theorem. This is the same falsification structure ONTOΣ XI's §8 and the Identifiability Bridge's §5 use: deepest commitments falsifiable through deployment-level unfoldings, not through direct test of the underlying architectural claim.&lt;/p&gt;

&lt;p&gt;A note on the relation to ONTOΣ XII's F-CC falsifier. F-CC tests joint admissibility under CC-WE/CC-IIC/CC-D/CC-0; F-XIII tests the directional reading of the same architectural object. The two are complementary: F-CC asks whether components are jointly admissible under A_S; F-XIII asks whether A_S is the active filter or merely a passive descriptor. A deployment that passes F-CC but fails F-XIII is one whose components happen to be jointly admissible but whose admission relation runs the wrong way — formally still a "system" in the CC-WE sense, but architecturally an aggregation rather than a closure in the directional sense of XIII. The full closure-complementarity-conformance requires passing both.&lt;/p&gt;




&lt;h2&gt;
  
  
  8. What ONTOΣ XIII Does Not Claim
&lt;/h2&gt;

&lt;p&gt;The architectural-class register of ONTOΣ XIII addresses a specific question — the directionality of the admission cascade in closure-complementarity systems — and stops there. Several adjacent questions lie outside its scope, and the present work names them explicitly to prevent reading-creep.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;It does not derive the substrate-level content of W_S.&lt;/strong&gt; The present work fixes W_S as the system-level Will-Embedding pre-registered at closure declaration, but it does not say what the content of W_S should be for any specific substrate. The control-grade W_S as "safe-trajectory commitment," the organismic W_S as "survival commitment," the institutional W_S as "chartered mandate" are paradigmatic examples (§6); they are not substrate-specific theorems. Each substrate's instantiation of W_S is a substrate-specific architectural commitment that requires substrate-specific work to formalise.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;It does not require W_S and A_S to be operationally distinct in all substrates.&lt;/strong&gt; For substrates where the deployment finds it natural to operationally identify the Will-Embedding and the admissibility regime (e.g., simple control systems where the safety envelope is the operational substrate of the trajectory commitment), the deployment may declare E_S equiv A_S without forfeiting closure-complementarity-conformance. ONTOΣ XIII gives the architectural option for distinctness; it does not legislate the distinctness.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;It does not formalise the substrate-level mechanism of master-operator direction carrying.&lt;/strong&gt; The present work declares that the master operator carries W_S as a system-level Will-Embedding; it does not specify the substrate-level architecture by which the carrying is realised. For a control system, the carrying mechanism may be the controller's parameter store; for an organism, the carrying mechanism may involve genetic, epigenetic, and physiological regulatory networks; for an institution, the carrying mechanism may involve the chartered documents, governance bodies, and operational policies. Each substrate's carrying mechanism is owed in substrate-specific companion work; the architectural-class register of XIII fixes only the &lt;em&gt;role&lt;/em&gt; of the carrier (the master operator at the system layer), not its mechanism.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;It does not legislate against bottom-up architectural classes.&lt;/strong&gt; Bottom-up emergence systems, distributed consensus protocols, aggregation-style governance, and many other architectural classes operate with bottom-up direction by design. ONTOΣ XIII does not claim such classes are architecturally invalid; it claims that they do not belong to the closure-complementarity subclass. The choice of architectural class is a deployment decision; the present work supplies the formal grammar for one specific class (the closure-complementarity subclass) and the directional commitment that class entails.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;It does not provide a unified theory of system-level commitment.&lt;/strong&gt; "System-level commitment" admits multiple architectural readings, of which the master operator is one. Other readings — collective intentionality accounts, joint-action accounts, distributed agency accounts, multi-agent system accounts — may overlap with the master operator at points but do not collapse into it. ONTOΣ XIII supplies one architectural register; it does not claim that register exhausts the space of system-level commitment accounts.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;It does not address dynamics across master-operator re-commissioning.&lt;/strong&gt; Re-commissioning operations — declared transitions from a closure with W_S to a new closure with W_(S') over (possibly) the same component collection — are admissible under closure-complementarity-conformance (per F-XIII.2's allowance for declared re-commissioning), but the &lt;em&gt;dynamics&lt;/em&gt; of re-commissioning (when re-commissioning is architecturally warranted, what continuity properties survive a re-commissioning, what kind of identity the master operator has across re-commissionings) lie outside the scope of the present work. These are continuing-programme questions assigned to §9.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;It does not extend Tier-2 Bridge results automatically to all CC-conformant deployments.&lt;/strong&gt; Per §3.1's Scope-of-XI-inheritance note and §5.4's Tier-1 / Tier-2 split: CC-conformant deployments inherit the well-definedness of H_S, Λ&lt;em&gt;S, χ&lt;/em&gt;(op,S) on S via (M3) automatically (Tier 1), so the master operator construct is available to all CC-conformant deployments. The Bridge's operator-internal-extended-subclass results (Tier 2 — HF-NR with declared ε_T^S, calibration-valid nuisance-adjustment, BDP-realising statistic at the system layer) do not inherit automatically; deployments seeking Tier-2 results must declare the additional Bridge-class commitments per §5.4. Architectures that decline even the (M3) baseline — that operate without the XI apparatus of holding field, semantic load, chaos predicate well-defined on S — do not have the master operator construct available in the form ONTOΣ XIII fixes; the present work does not address them. The two-tier distinction matters for downstream applications and is the operative scope-rule, not a single threshold.&lt;/p&gt;




&lt;h2&gt;
  
  
  9. Continuing Programme — Where the Open Tasks Are Addressed
&lt;/h2&gt;

&lt;p&gt;The present work is presented as an architectural-class register; several items lie outside its scope. This section names them.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Substrate-specific instantiations of the master operator.&lt;/strong&gt; The paradigmatic examples of §6 are illustrative, not formal. &lt;em&gt;Owed:&lt;/em&gt; substrate-specific papers establishing W_S, A_S, H_S, Λ&lt;em&gt;S, χ&lt;/em&gt;(op,S) for each substrate class (control, biological, perceptual, linguistic/governance, and others of ONTOΣ XII §5) with quantitative content and substrate-physics-justified mathrm{decl}_(W_S mapsto A_S) maps.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;The cascade-integrity margin.&lt;/strong&gt; Whether the direction-down cascade has a ι_X-style substrate-relative separation margin (in the sense of the Identifiability Bridge §1.6's BDP) is an open question. &lt;em&gt;Owed:&lt;/em&gt; formal statement of a cascade-integrity margin and its substrate-specific instantiations; relation to the Bridge's BDP for S-as-operator's property-channel detection of cascade integrity.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Master operator re-commissioning dynamics.&lt;/strong&gt; The conditions under which a deployment performs a declared re-commissioning (closure with new W_S) versus an in-place modification (forfeiting F-XIII.2), the continuity properties that survive a re-commissioning, the architectural identity of the master operator across re-commissionings. &lt;em&gt;Owed:&lt;/em&gt; a separate work on re-commissioning dynamics, with explicit attention to identity-preservation criteria across W_S changes.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Empirical execution of the F-XIII falsifiers.&lt;/strong&gt; The protocols are pre-registration-ready in §7; execution awaits deployment-side collaboration. &lt;em&gt;Owed:&lt;/em&gt; registered F-XIII protocol execution and public reporting under the pre-registration discipline.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Comparison with bottom-up architectural classes.&lt;/strong&gt; The present work refuses bottom-up readings of the closure-complementarity subclass (§1.4) but does not perform a structured comparison with emergence accounts, distributed consensus theories, aggregation-style governance, and related literatures. &lt;em&gt;Owed:&lt;/em&gt; a separate comparative-class positioning work.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Higher-layer master operators.&lt;/strong&gt; The construction of the master operator at the system layer raises the natural question of master operators at still higher layers — closure operations over collections of master operators producing higher-order systems with their own W_(S^((2))), A_(S^((2))) (where S^((2)) denotes a second-order system produced by a closure over a collection of first-order master operators, S^((3)) a third-order system, and so on). &lt;em&gt;Owed:&lt;/em&gt; a theory of master-operator hierarchies, with attention to whether closure-complementarity-conformance composes upward across layers.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Pre-registration governance for W_S.&lt;/strong&gt; §3.1's (M1) requires W_S pre-registration; §3.3 names the augmented quintuple. &lt;em&gt;Owed:&lt;/em&gt; operational governance documentation specific to master-operator pre-registration — what archives must contain, how W_S declarations are versioned and audited, how the mathrm{decl}_(W_S mapsto A_S) map is recorded with substrate-physics justification.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Integration with NC2.5 v3.0 consolidation.&lt;/strong&gt; §5.5 names ONTOΣ XIII's expected role in the upcoming v3.0 consolidation. &lt;em&gt;Owed:&lt;/em&gt; v3.0 editorial decisions on whether to retain the XI/XII/XIII triptych as a separate architectural-class register or to absorb its content into the v3.0 axiomatic apparatus.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The present work supplies the architectural-class register of the master operator and the direction-down admission cascade. The continuing programme above supplies the substrate-specific, empirical, comparative, governance, and consolidating work that surrounds it. The corpus position is that the architectural-class register and the continuing programme are jointly sufficient — and that the present moment is the public articulation of the master operator as a corpus formal object with explicit type-signature, not the closing of the programme.&lt;/p&gt;




&lt;h2&gt;
  
  
  10. Closing
&lt;/h2&gt;

&lt;p&gt;ONTOΣ XI fixed the interior of the operator: what the operator holds against the gradient, what the semantic load carries, what the chaos predicate reports. ONTOΣ XII fixed the composition of operators into systems: under what architectural conditions a collection of units becomes a system, and under what conditions it does not. ONTOΣ XIII fixes the third axis: which way the admission cascade runs in a system constituted by closure.&lt;/p&gt;

&lt;p&gt;The architectural commitment of the present work is that the cascade runs down within the theorem's scoped non-invertibility. The master operator, M_S = (S, W_S, A_S), holds the system's direction at the moment the closure operation is registered. The components are admitted into the system under the master operator's pre-declared A_S, induced from W_S by the deployment's declared map. The components' Will-Embeddings do not aggregate into W_S (T2 of §4.2 Step 5); the components' Actions do not flow back up to revise A_S outside the pre-registered adaptation envelope (T1 of §4.2 Step 5); the system's direction within the T1/T2 scope is what the components serve under the pre-registration discipline, not what the components produce. Other potential upward modes — bidirectional co-determination, fixed-point parametrisation, lateral bypasses — are continuing-programme items per §9 and lie outside the present theorem's scope. Theorem ONTOΣ-XIII.1 declares the scoped cascade; Proposition XIII.1.1 establishes that the strict bottom-up reading "W_S = f({W(uᵢ)})" does not survive contact with the closure operation's signature.&lt;/p&gt;

&lt;p&gt;What this work refuses, structurally, is the bottom-up reading of CC-WE that engineering intuition supplies by default. The refusal is not polemical; it is architectural. The closure-complementarity subclass is defined by the directional admission of components under a pre-declared system-level commitment, and any system whose direction is computed from below rather than declared from above lies outside the subclass — it may be a valid system, but it is not a closure-complementarity-conformant system in the sense of ONTOΣ XII §3 + ONTOΣ XIII §3.&lt;/p&gt;

&lt;p&gt;What this work supplies, structurally, is the formal grammar in which the closure-complementarity subclass declares its directional commitment. The three architectural commitments named in §0 — the master operator as a system-level formal object with explicit type-signature, the direction-down cascade as a conditional structural theorem, the UTAM↔XII operator-lift as a declared bridge — are realised through their operational counterparts: the augmented pre-registration of §3.3 (the discipline by which W_S is fixed at closure declaration), Theorem ONTOΣ-XIII.1 of §4 (the theorem statement), and the F-XIII falsification surface of §7 (the operational test by which the directional cascade is deployment-checkable). Together, they fix the third axis of the operator-system relation in the architectural-class register the present corpus operates within.&lt;/p&gt;

&lt;p&gt;The triptych closes here. ONTOΣ XI (interior) + ONTOΣ XII (composition) + ONTOΣ XIII (direction) are jointly sufficient to articulate the architectural-class register of the operator-internal-extended subclass of NC2.5 v2.1 as it stands — with the Tier-1 / Tier-2 split of §5.4 / §8 governing which CC-conformant deployments inherit which results within that subclass. The continuing programme of §9 supplies the substrate-specific, empirical, comparative, and consolidating work that will, in subsequent corpus iterations, build on this register. The next steps belong to substrate-specific instantiation, deployment-side execution of the F-XIII protocols, and the NC2.5 v3.0 consolidation that will gather the present apparatus into the next axiomatic version.&lt;/p&gt;




&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;p&gt;The present work is grounded in the NC2.5 v2.1 / ONTOΣ XI / ONTOΣ XII / UTAM Part I / UTAM Part II corpus, referenced inline throughout. The references below identify the formal anchors and the informal anchor (UTAM Part I §11.5) the work depends on.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Barziankou, M.&lt;/strong&gt; (2026). &lt;em&gt;Navigational Cybernetics 2.5 v2.1 — Axiomatic Core.&lt;/em&gt; DOI: 10.17605/OSF.IO/NHTC5. — Source of the v2.1 admissibility predicate, the structural burden Φ, the viability budget τ, the non-reconstructibility bounds NR-ε and NR-LR, and Theorems 55, 62, 63 inherited via UTAM Part II.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Barziankou, M.&lt;/strong&gt; (2026). &lt;em&gt;ONTOΣ XI — Two Sides of One Geometry: The Holding Field and the Architecture of Chaos.&lt;/em&gt; DOI: 10.17605/OSF.IO/U3KXJ. — Source of the unit-level operator apparatus (holding field H(t), semantic load field Λ(t), operator-relative chaos predicate χₒₚ(R)) inherited via §3.1 (M3).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Barziankou, M.&lt;/strong&gt; (2026). &lt;em&gt;ONTOΣ XII — Closure-Complementarity: How Closure Regears Component Cycles into a Single Geometry.&lt;/em&gt; DOI: 10.17605/OSF.IO/394TX. — Source of the closure operation mathrm{closure}(U, R, A) → S, the four closure-complementarity conditions CC-0/CC-WE/CC-IIC/CC-D, the joint-admissibility structure of CC-WE invoked in the motivating example of §1.1, and the operator-status of S (§3.3) inherited in §3.1 (M3).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Barziankou, M.&lt;/strong&gt; (2026). &lt;em&gt;Unified Theory of Adaptive Meaning (UTAM) — Part I: Will, Coherence, and Drift as the Fundamental Triad of Adaptive Systems.&lt;/em&gt; petronus.eu/blog/unified-theory-of-adaptive-meaning-utam-will-coherence-and-drift-as-the. — Source of the W → E → A triad and of the §11 holism gesture (§11.4 Krebs-cycle anti-drift discussion and §11.5 "The organism as a whole as evidence that UTAM is not compositional"), the informal anchor for §1.2's directional intuition.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Barziankou, M.&lt;/strong&gt; (2026). &lt;em&gt;Unified Theory of Adaptive Meaning (UTAM) — Part II: Will as a Formal Operator in NC2.5 v2.1.&lt;/em&gt; petronus.eu/blog/utam-part-ii-will-as-formal-operator. — Source of the unit-level Will-as-formal-operator framing extended to the system layer by §3.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Barziankou, M.&lt;/strong&gt; (2026). &lt;em&gt;Identifiability Bridge — Conditional Admissibility Theorems for Property Detection under Non-Reconstructibility within Navigational Cybernetics 2.5.&lt;/em&gt; DOI: 10.17605/OSF.IO/3F6UJ. — Source of the Conditional Structural Theorem typing discipline applied throughout §0 and §4; source of the BDP / ι_X(δ) apparatus referenced in §5.4's cascade-integrity-margin question.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;External information-theoretic references inherited via the Identifiability Bridge (Cover and Thomas 2006; Lin 1991; Csiszár and Shields 2004) are not directly invoked in the present work and are listed in the Bridge.&lt;/p&gt;




&lt;h2&gt;
  
  
  Footer
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;MxBv&lt;/strong&gt;, Poznań, Poland.&lt;br&gt;
The Urgrund Laboratory.&lt;br&gt;
Maksim Barziankou (MxBv) — PETRONUS — &lt;a href="mailto:research@petronus.eu"&gt;research@petronus.eu&lt;/a&gt;&lt;br&gt;
May 2026.&lt;br&gt;
CC BY-NC-ND 4.0.&lt;br&gt;
&lt;em&gt;ONTOΣ XIII — The Master Operator and the Direction-Down Admission Cascade.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Companions in the corpus:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ONTOΣ XI — &lt;em&gt;Two Sides of One Geometry: The Holding Field and the Architecture of Chaos&lt;/em&gt; (DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/U3KXJ" rel="noopener noreferrer"&gt;10.17605/OSF.IO/U3KXJ&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;ONTOΣ XII — &lt;em&gt;Closure-Complementarity: How Closure Regears Component Cycles into a Single Geometry&lt;/em&gt; (DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/394TX" rel="noopener noreferrer"&gt;10.17605/OSF.IO/394TX&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Identifiability Bridge — &lt;em&gt;Conditional Admissibility Theorems for Property Detection under Non-Reconstructibility within Navigational Cybernetics 2.5&lt;/em&gt; (DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/3F6UJ" rel="noopener noreferrer"&gt;10.17605/OSF.IO/3F6UJ&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;Unified Theory of Adaptive Meaning (UTAM) — Part I and Part II&lt;/em&gt; (petronus.eu/blog)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This work DOI: 10.17605/OSF.IO/FVBMZ &lt;br&gt;
Grounded in the formal core of &lt;strong&gt;Navigational Cybernetics 2.5 v2.1&lt;/strong&gt;, axiomatic core DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/NHTC5" rel="noopener noreferrer"&gt;10.17605/OSF.IO/NHTC5&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;A consolidating revision (NC2.5 v3.0) gathering the apparatus of this and adjacent works is in preparation; the present work is grounded in v2.1 and remains compatible with the future v3.0 consolidation.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;© 2026 Maksim Barziankou. Licensed under CC BY-NC-ND 4.0.&lt;/p&gt;

</description>
      <category>nc25</category>
      <category>ontos</category>
      <category>masteroperator</category>
      <category>directiondownadmissioncascade</category>
    </item>
    <item>
      <title>Identifiability Bridge — Conditional Admissibility Theorems for Property Detection under NR-ε (NC2.5)</title>
      <dc:creator>MxBv</dc:creator>
      <pubDate>Tue, 12 May 2026 15:01:02 +0000</pubDate>
      <link>https://dev.to/petronushowcoremx/identifiability-bridge-conditional-admissibility-theorems-for-property-detection-under-nr-e-3dm2</link>
      <guid>https://dev.to/petronushowcoremx/identifiability-bridge-conditional-admissibility-theorems-for-property-detection-under-nr-e-3dm2</guid>
      <description>&lt;h1&gt;
  
  
  Identifiability Bridge: Conditional Admissibility Theorems for Property Detection under Non-Reconstructibility within Navigational Cybernetics 2.5
&lt;/h1&gt;

&lt;p&gt;&lt;strong&gt;Maksim Barziankou&lt;/strong&gt; (MxBv)&lt;br&gt;
PETRONUS™ | &lt;a href="mailto:research@petronus.eu"&gt;research@petronus.eu&lt;/a&gt;&lt;br&gt;
DOI: 10.17605/OSF.IO/3F6UJ&lt;br&gt;
Axiomatic Core (NC2.5 v2.1): DOI 10.17605/OSF.IO/NHTC5&lt;/p&gt;




&lt;h2&gt;
  
  
  Abstract
&lt;/h2&gt;

&lt;p&gt;The architectural-class works of the present author's corpus — ONTOΣ XI, ONTOΣ XII, IIC v2.1, and the consolidating &lt;em&gt;Why Long-Horizon Existence Requires an Ontology&lt;/em&gt; — declare a system of operator-internal architectural primitives (the holding field H(t), the semantic load field Λ(t), the operator-relative chaos predicate χₒₚ(R), the closure-complementarity conditions CC-0 / CC-WE / CC-IIC / CC-D, the IIC coherence mathrm{Coh}(t), and their associated parameters K, μₒₚ, mₒₚ, νₒₚ, cₒₚ, θₛₗₒₚₑ, Δ_H) together with falsification surfaces that probe their conformance at deployment level. The works also declare the &lt;strong&gt;non-reconstructibility constraint NR-ε&lt;/strong&gt; (T87 of NC2.5 v2.1): no external observer can reconstruct the operator-internal state H(t) from emission Yₜ with mutual information exceeding the architecturally declared NR-ε leakage bound.&lt;/p&gt;

&lt;p&gt;The combination produces an apparent paradox. If output emission cannot identify internal state, how do the falsification protocols of ONTOΣ XI §8 and ONTOΣ XII §6 work? On what observable signal can a deployment be tested for HF-FIN, HF-MON, χ-REL, or CC-WE / CC-IIC / CC-D conformance, when those conditions are properties of internal-architectural objects that are formally non-reconstructible?&lt;/p&gt;

&lt;p&gt;The present work resolves the apparent paradox by introducing the &lt;strong&gt;reconstruction-versus-detection distinction&lt;/strong&gt;: NR-ε bounds — by data-processing inequality — both state reconstruction and any property statistic that is a function of the protected internal trajectory, but it does not annihilate property-channel mutual information when the window-level NR budget ε_T is positive and a Bridge Detectability Premise (BDP)-realising statistic is declared. The work supplies five &lt;strong&gt;conditional admissibility theorems&lt;/strong&gt; establishing that, under the BDP + non-degenerate prior + NR-window + calibration-valid nuisance-adjustment discipline declared here, specific architectural property-violation claims are &lt;strong&gt;admissibly testable&lt;/strong&gt; through declared BDP-realising statistics, with property-channel mutual information bounded below by a substrate-relative margin ι_X(δ) &amp;gt; 0 (supplied by BDP, not derived here) and state-channel leakage bounded above by ε_T (supplied by NR-window). The theorems prove compatibility of property-detection with NR-ε under the declared premises; they do not derive BDP or establish detectability empirically. The theorems are:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Holding-Field Property Detection Admissibility&lt;/strong&gt; (Theorem 1) — sustained HF-FIN, HF-MON, HF-DYN, HF-COH violations are &lt;strong&gt;admissibly testable&lt;/strong&gt; via BDP-realising calibration-valid nuisance-adjusted diversity statistics on Yₜ.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Threshold-Straddling Admissibility of the Emission-Derived Chaos Estimator&lt;/strong&gt; (Theorem 2) — for operators with declared distinct K under threshold-straddling design, the emission-derived estimator hatχₒₚ separates straddling pairs from matched-K controls in nuisance-adjusted paired statistics. The theorem &lt;strong&gt;admits the emission-derived chaos-predicate estimator as a bounded-leakage property-channel statistic&lt;/strong&gt;; it does not directly reconstruct or observe the internal χₒₚ predicate. The internal predicate is accessed only through the pre-registered estimator resolution admitted by BDP.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Gauge-Conditional Admissibility of Load-Field Slope Detection&lt;/strong&gt; (Theorem 3) — given the operator-declared normalisation gauge for cₒₚ, the orientation-following predicate is &lt;strong&gt;admissibly detectable&lt;/strong&gt; within each declared gauge stratum, conditional on BDP and the gauge-stratum NR-window.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cross-Component Closure-Complementarity Detection Admissibility&lt;/strong&gt; (Theorem 4) — CC-WE / CC-IIC / CC-D violations are &lt;strong&gt;admissibly testable&lt;/strong&gt; through BDP-realising cross-component emission statistics (correlations mathrm{Cov}(Yᵢ, Yⱼ) exceeding baseline by an architecturally specifiable margin) under the test-design discipline TD-1..TD-5.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Vector-Protocol Suite Detectability&lt;/strong&gt; (Theorem 5) — across the five property-class components covered by Theorems 1–4 + IIC v2.1's mathrm{Coh}(t) (holding-field HF, chaos-predicate χ, load-field Λ-CHARGE specifically — Λ-ACC owed to companion work, Λ-NONRETRIEVE handled via HF-DYN coextension per §1.2, closure-complementarity CC, and IIC coherence Coh), the vector of property predicates remains componentwise detectable across the heterogeneous test designs of T1–T4 + IIC v2.1's coherence falsification surface (protocol suite, not single joint vector) under joint or conditional-sequential leakage discipline. KAC-BASE and FR-COH enter as theorem-premise properties of Theorem 3 (per §1.2), not as separately-tested components in Theorem 5's vector. Any-violation (disjunctive) testing requires a separate direct BDP for the disjunctive predicate; it is not derivable from componentwise detectability alone.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The work also specifies a &lt;strong&gt;calibration-valid nuisance-adjustment discipline&lt;/strong&gt; (per §2.4 / §4.7; scalar-additive discount being one admissible operator class) for the four standard interface confounds (decoder temperature, sampling policy, retrieval augmentation, prompt entropy) and a falsification surface for the identifiability claims themselves. No new architectural axiom is introduced; the work assembles the existing NC2.5 v2.1 / IIC v2.1 / ONTOΣ XI–XII apparatus into a formal bridge that formalises the admissibility conditions for operationalising the falsification protocols of those works.&lt;/p&gt;

&lt;p&gt;The contribution is the assembly. The present work supplies the formal &lt;strong&gt;admissibility schema&lt;/strong&gt; for operationalising the falsification surfaces of the corpus — the conditions under which property-detection is compatible with NR-ε given declared premises — with the reconstruction-versus-detection distinction as the load-bearing structural insight. Substantive operationalisation (substrate-specific quantitative bounds, registered protocols, executed falsifiers) is owed in companion work and is not completed here.&lt;/p&gt;




&lt;h2&gt;
  
  
  0. Position and Scope
&lt;/h2&gt;

&lt;p&gt;The present work sits at the &lt;strong&gt;operationalisation layer&lt;/strong&gt; of the architectural-class corpus. ONTOΣ XI specifies the operator-internal apparatus; ONTOΣ XII specifies the closure operation that constitutes the operator-as-self; IIC v2.1 specifies the cycle by which the operator's coherence is maintained across time; the consolidating essay specifies why the entire stack is required for long-horizon existence. Each of those works declares falsification surfaces — protocols whose execution would refute deployment subclass membership at the architectural level. None of them, however, supplies the &lt;strong&gt;bridge&lt;/strong&gt; from observable output statistics to the architectural property-violations the protocols probe.&lt;/p&gt;

&lt;p&gt;The bridge is owed because the architectural primitives are operator-internal and bound by the NR-ε non-reconstructibility constraint. ONTOΣ XI §11 (Continuing Programme) and &lt;em&gt;Why Long-Horizon Existence Requires an Ontology&lt;/em&gt; §7 explicitly name the identifiability bridge as a separate technical task, awaiting a dedicated paper. The present work is that paper.&lt;/p&gt;

&lt;p&gt;The position is conditional in the same sense as the architectural-class works it supports. The identifiability theorems are not claimed as predictive empirical theorems about specific systems; they are &lt;strong&gt;classification theorems&lt;/strong&gt; in the architectural-class tradition, unfolding the consequences of NR-ε plus the calibration-valid nuisance-adjustment discipline (§2.4 / §4.7) on the admissibility of output-side property detection. Their empirical content is mediated through deployment-level instantiations (specific architectures) and class-level non-vacuousness (that at least one architecture in some substrate admits the detection protocols of the theorems). The conditional structure is deliberate; the work is presented as the formal bridge, not as the deployment-side test suite.&lt;/p&gt;

&lt;p&gt;The scope is also narrowed. The present work addresses identifiability of &lt;strong&gt;property-violations&lt;/strong&gt; on operator-internal architectural objects, given &lt;strong&gt;bounded-leakage emission&lt;/strong&gt; Yₜ and &lt;strong&gt;declared confound profile&lt;/strong&gt;. It does not address:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Full state reconstruction (forbidden by NR-ε; explicitly out of scope).&lt;/li&gt;
&lt;li&gt;Identifiability under unbounded leakage (where NR-ε is suspended; a different problem class).&lt;/li&gt;
&lt;li&gt;Substrate-specific empirical instrumentation (deployment-side concern).&lt;/li&gt;
&lt;li&gt;Causal-inference identifiability (related but distinct: causal identifiability concerns intervention effects on observables; the present work concerns property-detection on operator-internal trajectories given passive observation under NR-ε).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The work also makes no claim about identifiability outside the operator-internal-extended subclass declared by ONTOΣ XI. Architectures that decline the operator-internal-extended commitments are outside the scope of the theorems; their observability profile is governed by whatever architectural commitments they do declare.&lt;/p&gt;

&lt;p&gt;What the work does provide is the formal bridge that formalises the admissibility conditions for operationalising the falsification protocols of ONTOΣ XI §8 and ONTOΣ XII §6 within the architectural-class register: a precise statement of what can be tested observationally without violating NR-ε, what nuisance-adjustment discipline confounds require (per §2.4 / §4.7), and what falsifies the identifiability claims themselves.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;A note on the term "theorem" in this work.&lt;/em&gt; The results labelled Theorems 1–5 are &lt;em&gt;structural classification theorems&lt;/em&gt; in the architectural-class sense (cf. ONTOΣ XI §0, IIC v2.1 §2.5): they unfold the consequences of declared primitives and the existing NC2.5 v2.1 / ONTOΣ XI–XII / IIC v2.1 apparatus under the reconstruction-versus-detection distinction. They are definitional consequences in the strict formal sense, not free-standing empirical theorems, and their empirical content is in the falsification surface (§5). This is the form appropriate to architectural-class theorems, not a deficiency of the work.&lt;/p&gt;

&lt;h3&gt;
  
  
  0.1 Notation Summary
&lt;/h3&gt;

&lt;p&gt;The work uses primitives from NC2.5 v2.1, ONTOΣ XI, ONTOΣ XII, and IIC v2.1, together with new notation for the identifiability bridge.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Symbol&lt;/th&gt;
&lt;th&gt;Type&lt;/th&gt;
&lt;th&gt;Reading&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;From v2.1&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;τ&lt;/td&gt;
&lt;td&gt;scalar functional&lt;/td&gt;
&lt;td&gt;budget, τᵣₑₘ(t) = C - Φ(t)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Φ&lt;/td&gt;
&lt;td&gt;scalar functional&lt;/td&gt;
&lt;td&gt;structural burden&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;C&lt;/td&gt;
&lt;td&gt;scalar constant&lt;/td&gt;
&lt;td&gt;bounded structural capacity&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;σᵒᵖ&lt;/td&gt;
&lt;td&gt;proxy signal&lt;/td&gt;
&lt;td&gt;operator-side read of substrate state&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;NR-ε&lt;/td&gt;
&lt;td&gt;bound&lt;/td&gt;
&lt;td&gt;T87 leakage bound: I(Hᵢₙₜₑᵣₙₐₗ; Yₜ) ≤ ε&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;From ONTOΣ XI&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;H(t) ⊂eq Sₒₚ&lt;/td&gt;
&lt;td&gt;set&lt;/td&gt;
&lt;td&gt;holding set&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;H_(0:T)&lt;/td&gt;
&lt;td&gt;window trajectory&lt;/td&gt;
&lt;td&gt;the operator's holding-field trajectory on [0,T], i.e., {H(t) : t ∈ [0,T]}; see also Hᵖʳᵒᵗ_(0:T) below for the predicate-generic protected-trajectory notation&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;|H(t)|&lt;/td&gt;
&lt;td&gt;non-negative real&lt;/td&gt;
&lt;td&gt;holding mass: mₒₚ(H(t))&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;μₒₚ&lt;/td&gt;
&lt;td&gt;pseudo-metric on Sₒₚ&lt;/td&gt;
&lt;td&gt;distinguishability pseudo-metric&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;mₒₚ&lt;/td&gt;
&lt;td&gt;measure on Sₒₚ&lt;/td&gt;
&lt;td&gt;structural measure paired with μₒₚ&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;K(τᵣₑₘ)&lt;/td&gt;
&lt;td&gt;function&lt;/td&gt;
&lt;td&gt;holding capacity, monotone non-decreasing in budget&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Λ(t)&lt;/td&gt;
&lt;td&gt;(Sₒₚ, νₒₚ, cₒₚ)&lt;/td&gt;
&lt;td&gt;semantic load field&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;χₒₚ(R)&lt;/td&gt;
&lt;td&gt;binary predicate&lt;/td&gt;
&lt;td&gt;chaos predicate over substrate region R&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;θₛₗₒₚₑ&lt;/td&gt;
&lt;td&gt;declared threshold&lt;/td&gt;
&lt;td&gt;crystallisation threshold&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;From ONTOΣ XII&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;U = {u₁, ldots, uₙ}&lt;/td&gt;
&lt;td&gt;set of UTAM-units&lt;/td&gt;
&lt;td&gt;components&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;closure(U, R, A)&lt;/td&gt;
&lt;td&gt;operation&lt;/td&gt;
&lt;td&gt;constitutive operation: (U, R, A) → S (per ONTOΣ XII §3.2)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;CC-0, CC-WE, CC-IIC, CC-D&lt;/td&gt;
&lt;td&gt;conditions&lt;/td&gt;
&lt;td&gt;closure-complementarity conditions&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;From IIC v2.1&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;mathrm{Coh}(t)&lt;/td&gt;
&lt;td&gt;scalar&lt;/td&gt;
&lt;td&gt;IIC coherence&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;S(t)&lt;/td&gt;
&lt;td&gt;spin component&lt;/td&gt;
&lt;td&gt;non-potential structural component&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;partial Φ / partial τₑₗ(t)&lt;/td&gt;
&lt;td&gt;rate&lt;/td&gt;
&lt;td&gt;accumulated deformation rate&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Δ_(boldsymbol{varpi)}&lt;/td&gt;
&lt;td&gt;aggregate margin&lt;/td&gt;
&lt;td&gt;survival-modal margin&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;New in the present work — core notation&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Yₜ,\;Y_(0:T)&lt;/td&gt;
&lt;td&gt;emission stream&lt;/td&gt;
&lt;td&gt;observable output channel of the deployment, single-step and window forms&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Hᵖʳᵒᵗ_(0:T)&lt;/td&gt;
&lt;td&gt;declared protected trajectory&lt;/td&gt;
&lt;td&gt;generic notation for the predicate-protected state: Hᵖʳᵒᵗ&lt;em&gt;(0:T) = H&lt;/em&gt;(0:T) for HF/Λ/Coh predicates, Hᵖʳᵒᵗ&lt;em&gt;(0:T) = H&lt;/em&gt;(S,0:T) for CC predicates per §3.4&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;H_(S,0:T)&lt;/td&gt;
&lt;td&gt;closure-output system trajectory&lt;/td&gt;
&lt;td&gt;the closure-output system S's holding-field trajectory on &lt;a href="//per%20ONTO%CE%A3%20XII%20%C2%A73.2's%20mathrm{closure}(U,R,A)%20%E2%86%92%20S"&gt;0,T&lt;/a&gt;; protected state under NR-ε for Theorem 4&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Θᵈᵉᶜˡ_X&lt;/td&gt;
&lt;td&gt;declared structural context&lt;/td&gt;
&lt;td&gt;pre-registered fixed architectural parameters required to evaluate mathcal{P}_X: capacity law, thresholds, gauge, closure map, action-selection apparatus, component attribution, etc. (per §1.6 augmented evaluation object)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Z^X_(0:T)&lt;/td&gt;
&lt;td&gt;augmented protected evaluation object&lt;/td&gt;
&lt;td&gt;Z^X_(0:T) := (Hᵖʳᵒᵗ&lt;em&gt;(0:T), Θᵈᵉᶜˡ_X); the composite object over which Case-A predicates are functions: mathbf{1}[mathcal{P}_X] = f_X(Z^X&lt;/em&gt;(0:T)), equivalently f_X(Hᵖʳᵒᵗ&lt;em&gt;(0:T); Θᵈᵉᶜˡ_X). Per-theorem instantiations: Z^(HF)&lt;/em&gt;(0:T) = (H_(0:T), Θᵈᵉᶜˡ&lt;em&gt;(HF)) for T1; Zˢˡᵒᵖᵉ&lt;/em&gt;(0:T) = (H_(0:T), Θᵈᵉᶜˡₛₗₒₚₑ) for T3 (action-selection apparatus inside Θᵈᵉᶜˡₛₗₒₚₑ as fixed mechanism, not separate trajectory); Z^(CC)&lt;em&gt;(0:T) = (H&lt;/em&gt;(S,0:T), Θᵈᵉᶜˡ&lt;em&gt;(CC)) for T4; Z^(Coh)&lt;/em&gt;(0:T) = (H_(0:T), Θᵈᵉᶜˡ_(Coh)) for the Coh component of T5&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;ε_T^X&lt;/td&gt;
&lt;td&gt;predicate-specific NR-window&lt;/td&gt;
&lt;td&gt;NR-window budget for the predicate-specific protected trajectory: operator-level ε&lt;em&gt;T for HF / Coh / Λ-NONRETRIEVE-via-HF-DYN; gauge-stratum ε_T(g) for T3's Λ-CHARGE; closure-system ε_T on H&lt;/em&gt;(S,0:T) for CC&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;mathbf{P}&lt;/td&gt;
&lt;td&gt;vector predicate&lt;/td&gt;
&lt;td&gt;(mathbf{1}[mathcal{P}₁], ldots, mathbf{1}[mathcal{P}ₙ]); component-property indicators over the test ensemble per T5&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;mathbf{S}^*&lt;/td&gt;
&lt;td&gt;vector of nuisance-adjusted component statistics&lt;/td&gt;
&lt;td&gt;(S_(HF)^&lt;em&gt;, hatχ^((·)), Sₛₗₒₚₑ^&lt;/em&gt;, σᵖʳᵒᵖ&lt;em&gt;(CC), S&lt;/em&gt;(Coh)^*) from T1–T4 + IIC v2.1 Coh-component; meaningful as joint vector only under declared product/joint ensemble mathcal{E}ʲᵒⁱⁿᵗ per T5 (i)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;mathbf{S}^*_(backslash CC)&lt;/td&gt;
&lt;td&gt;sub-vector excluding CC component&lt;/td&gt;
&lt;td&gt;mathbf{S}^* with the CC component removed; used in T5 Separate-declaration headline (HF/Λ/Coh sub-vector bound on H_(0:T))&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;S(·)&lt;/td&gt;
&lt;td&gt;statistic&lt;/td&gt;
&lt;td&gt;generic function from emission stream to summary statistic&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;mathcal{C},\;η_(mathcal{C)}&lt;/td&gt;
&lt;td&gt;confound class, nuisance parameters&lt;/td&gt;
&lt;td&gt;declared interface confounds and operator parameters&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;A_(mathcal{C)}(Y_(0:T); η_(mathcal{C)})&lt;/td&gt;
&lt;td&gt;nuisance-adjustment operator&lt;/td&gt;
&lt;td&gt;pre-registered operator from the class of §2.4 (residualisation, conditional expectation, matched-baseline differencing, likelihood-ratio adjustment, marginalisation, scalar additive subtraction, or substrate-specific)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;S_X^*&lt;/td&gt;
&lt;td&gt;adjusted statistic for property X&lt;/td&gt;
&lt;td&gt;S_X^* = A_(mathcal{C)}(Y_(0:T); η_(mathcal{C)})&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;mathcal{P}_X,\;mathbf{1}[mathcal{P}_X]&lt;/td&gt;
&lt;td&gt;property predicate; indicator&lt;/td&gt;
&lt;td&gt;property of operator-internal trajectory or design metadata (Case A / Case B per §1.6); indicator over the ensemble&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;π_X&lt;/td&gt;
&lt;td&gt;non-degenerate prior&lt;/td&gt;
&lt;td&gt;π&lt;em&gt;X = P&lt;/em&gt;(mathcal{E)}[mathbf{1}[mathcal{P}_X] = 1] ∈ (πₘᵢₙ, 1 - πₘᵢₙ)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;mathcal{E}&lt;/td&gt;
&lt;td&gt;test ensemble&lt;/td&gt;
&lt;td&gt;pre-registered two-population × replication ensemble (§1.6 + TD-5)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;I(·;·),\;J_(π)(·,·)&lt;/td&gt;
&lt;td&gt;mutual information; π-weighted JS-divergence&lt;/td&gt;
&lt;td&gt;core MI / JS measures over the joint ensemble&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;ι_X(δ)&lt;/td&gt;
&lt;td&gt;direct MI / JS-separation margin&lt;/td&gt;
&lt;td&gt;substrate-relative BDP lower bound: I(mathbf{1}[mathcal{P}_X]; S_X^*) ≥ ι_X(δ) &amp;gt; 0 for δ &amp;gt; δₘᵢₙ&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;ε&lt;em&gt;T,\;ε_T(g),\;ε_Tʲᵒⁱⁿᵗ,\;ε_Tᵖᵃⁱʳ,\;ε&lt;/em&gt;(T,k),\;ε_T^(CC),\;ε_T^(CC,joint)&lt;/td&gt;
&lt;td&gt;window-level NR budgets&lt;/td&gt;
&lt;td&gt;various NR-window forms: unconditional (ε&lt;em&gt;T); gauge-stratum (ε_T(g) per T3); joint (ε_Tʲᵒⁱⁿᵗ per T5 (ii.b)); pair (ε_Tᵖᵃⁱʳ per T2); per-component conditional-sequential (ε&lt;/em&gt;(T,k) per T5 (ii.a)); closure-system Separate-declaration (ε_T^(CC) per §3.5 / T4); joint closure-system across full vector (ε_T^(CC,joint) per T5 separate-declaration) per §1.6&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;mathrm{Err}_(calib),\;ρₘₐₓ,\;ι_Xᵃᵈʲ&lt;/td&gt;
&lt;td&gt;calibration validity machinery&lt;/td&gt;
&lt;td&gt;residual / declared tolerance / preserved margin (§4.7)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;F-Ident-k&lt;/td&gt;
&lt;td&gt;falsifier&lt;/td&gt;
&lt;td&gt;identifiability-bridge falsifier (k = 1, ..., 5)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Legacy / special-case notation&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;φᵢ(mathcal{C}ᵢ),\;S_(disc)(Yₜ&lt;/td&gt;
&lt;td&gt;mathcal{C})&lt;/td&gt;
&lt;td&gt;scalar discount, discounted statistic&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;κ_X(δ)&lt;/td&gt;
&lt;td&gt;one-sided KL-separation margin&lt;/td&gt;
&lt;td&gt;regularised special-case bound for BDP under bounded-likelihood-ratio / common-support / reverse-Pinsker conditions; converts to ι_X only under such conditions (§1.6)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;π&lt;/td&gt;
&lt;td&gt;emission protocol&lt;/td&gt;
&lt;td&gt;pre-registered cross-component emission observation protocol under TD-discipline (§3.4)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;σˢᵗᵃᵗᵉ(π)&lt;/td&gt;
&lt;td&gt;state-channel signal&lt;/td&gt;
&lt;td&gt;direct-reconstruction signal: estimates of mathrm{state}(S) from emission under π; subject to T87 NR-ε&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;σᵖʳᵒᵖ_(X)(π)&lt;/td&gt;
&lt;td&gt;property-channel signal&lt;/td&gt;
&lt;td&gt;cross-component co-fluctuation signal indexing CC-X conformance (X ∈ {WE, IIC, D}) without state reconstruction&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;mathrm{state}(S)&lt;/td&gt;
&lt;td&gt;state object&lt;/td&gt;
&lt;td&gt;the closure-output system S's holding-field trajectory in the ONTOΣ XI sense — i.e., H(·) with the closure-output system S as bearer; T87 NR-ε applies to it via the operator-internal-extended subclass commitment of ONTOΣ XI §2.3&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;baseline_(π)&lt;/td&gt;
&lt;td&gt;reference distribution&lt;/td&gt;
&lt;td&gt;emission distribution of a known closure-complementarity-conformant reference deployment under π; pre-registered per TD-1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;mathbf{1}[·]&lt;/td&gt;
&lt;td&gt;indicator&lt;/td&gt;
&lt;td&gt;violation-indicator over the deployment ensemble of §3.4 part (ii) (varies across TD-5 independent replications and across the violating-vs-non-violating deployment family)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;The notation is intended to remain compatible with upstream usage; where overload is possible, typographic and contextual distinctions resolve the meaning. The symbol &lt;code&gt;S&lt;/code&gt; carries four distinct readings disambiguated by context: S(t) — spin component (IIC v2.1 §2.3 upstream usage); S(·) or S_X — emission-stream statistic (the present work's usage); S standalone — the closure-output system (ONTOΣ XII §3.2 upstream usage); S_X^* — nuisance-adjusted statistic (this work). Context is sufficient to disambiguate in every body occurrence. Where the work writes "property-detection" it means specifically: testing whether a predicate mathcal{P}&lt;em&gt;X on the operator-internal trajectory holds, using a statistic S^*(Y&lt;/em&gt;(0:T)) on the emission stream, under the NR-window condition ε_T (§1.6) and the nuisance-adjustment discipline of §2.4.&lt;/p&gt;

&lt;h3&gt;
  
  
  0.2 Note on Theorem Status
&lt;/h3&gt;

&lt;p&gt;The identifiability results of §3 (Theorems 1–5) are &lt;strong&gt;conditional structural theorems&lt;/strong&gt;: each derives admissible property detection from explicitly declared architectural premises (Bridge Detectability Premise of §1.6; NR-window condition ε&lt;em&gt;T of §1.6; pre-registered test ensemble mathcal{E} of §1.6; calibration-valid nuisance adjustment A&lt;/em&gt;(mathcal{C)} of §2.4 and §4.7). The Bridge does not derive these premises from corpus primitives in the present work — their derivation, in particular substrate-specific instantiations of BDP with quantitative ι_X(δ) functions (or their JS / regularised-KL equivalents), is owed in substrate-specific companion papers per §7 Continuing Programme.&lt;/p&gt;

&lt;p&gt;Each Theorem statement below begins with an explicit &lt;strong&gt;Assume:&lt;/strong&gt; preamble listing the premises the theorem is conditional on; the proof body shows how the admissible detection chain follows &lt;em&gt;given&lt;/em&gt; those premises, not how the premises are themselves obtained. The results are labelled theorems in the architectural-class sense: each states a conditional implication from explicitly declared premises to admissible bounded-leakage property detection. &lt;strong&gt;The substantive detectability claim resides in BDP; the theorems prove compatibility with NR-ε and admissibility of the detection chain, not the existence of the detecting statistic.&lt;/strong&gt; They are not empirical identifiability theorems and do not derive BDP. Future substrate-specific companion work supplies corollaries and quantitative refinements; the theorem-level result is established here, conditional on the stated premises.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Terminology note.&lt;/em&gt; The §3 header calls these "Conditional Admissibility Theorems" to emphasise that BDP supplies substantive detectability and the theorems prove compatibility; the paper title "Identifiability Bridge" and Abstract / §4 / §8 sometimes use the shorter "identifiability theorems" — both phrasings refer to the same five theorems, used interchangeably after this Note.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;BDP as subclass-admission premise, not core axiom.&lt;/em&gt; The Bridge Detectability Premise is not introduced as a new core axiom of NC2.5, ONTOΣ XI/XII, or IIC v2.1; it is a &lt;strong&gt;subclass-admission premise&lt;/strong&gt; for the identifiability bridge — the condition under which a deployment enters the identifiability subclass that the present work's theorems apply to. The upstream axiomatic apparatus (NC2.5 v2.1, ONTOΣ XI–XII, IIC v2.1) is unchanged.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Conditional non-emptiness.&lt;/em&gt; The present work &lt;strong&gt;states the non-emptiness condition&lt;/strong&gt; for the identifiability subclass; it does &lt;strong&gt;not&lt;/strong&gt; independently establish substrate-level non-emptiness. The condition: if at least one architectural substrate realises BDP + NR-window + calibration-valid nuisance adjustment (and, for every Case-A theorem T1/T3/T4/T5, the fixed-Θᵈᵉᶜˡ&lt;em&gt;X ensemble premise and the joint-satisfiability compatibility premise ι_Xᵃᵈʲ(δ, ρₘₐₓ) ≤ ε_T^X of §1.6; for Theorem 2, the relevant joint-pair NR-window; for Theorem 3, the gauge-stratum NR-window; for Theorem 4, TD-1..TD-5 + the closure-system NR-window of premise (ii); for Theorem 5, the composition-discipline NR-window per (ii.a) or (ii.b) with the CC-specific extension under Separate-declaration, including — when joint-vector state-leakage claims on H&lt;/em&gt;(S,0:T) are made — the joint-vector NR-window declaration ε_T^(CC,joint) of T5 (ii) and the joint-vector compatibility constraint of T5 (vii)), then the identifiability subclass is non-empty and the Theorems' detection chains apply. Direct substrate-level existence demonstrations — concrete architectures together with quantitative ι_X(δ) functions or their JS / regularised-KL equivalents — are owed in substrate-specific companion work per §7 Continuing Programme.&lt;/p&gt;

&lt;h3&gt;
  
  
  0.3 Boundary of the Present Claim
&lt;/h3&gt;

&lt;p&gt;The present work uses several conditional commitments deliberately rather than implicitly. The boundary of what is claimed:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;BDP is a subclass-admission premise, not a derivation from the upstream axioms.&lt;/strong&gt; The Bridge Detectability Premise is the explicit condition under which a deployment enters the identifiability subclass that Theorems 1–5 apply to. It is &lt;em&gt;not&lt;/em&gt; derived from NC2.5 v2.1 / ONTOΣ XI–XII / IIC v2.1 primitives in this work; substrate-specific derivations are owed in companion papers (§7).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Non-emptiness is conditional until substrate-specific BDP + NR-window + calibration-validity demonstrations are supplied.&lt;/strong&gt; This work establishes admissibility &lt;em&gt;given&lt;/em&gt; these premises, not their joint instantiation in any specific architecture. The identifiability subclass may remain empty until a concrete substrate satisfies all four premises simultaneously.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Calibration validity includes an MI/JS-preservation admission requirement&lt;/strong&gt; (§4.7). This is therefore part of the bridge premise — not an independently universal statistical guarantee. The admitted operator class is restricted to those A_(mathcal{C)} whose calibration validity preserves the BDP direct MI / JS-separation lower bound; this is itself a detectability premise stacked on the BDP premise, disclosed honestly rather than packaged as a corollary of nuisance control.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;The privileged audit channel is specified structurally here; its substrate-specific operational realisation is owed.&lt;/strong&gt; §5.1 and §6.2 define the channel's role, scope boundary, and procedural non-collapsibility discipline; F-Ident-1 and F-Ident-4 falsifier executions are conditional on substrate-specific audit-channel realisation (per §6.2 &lt;em&gt;Dependency note&lt;/em&gt;).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Procedural admissibility filters define the domain of the theorem.&lt;/strong&gt; Procedurally-unevaluable deployments are excluded &lt;em&gt;before&lt;/em&gt; property-detection runs (§3.4.1), not counted as null detections. This is a design choice that bounds the theorem's operational coverage at the admissibility frontier rather than at the property-channel layer.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Theorem 5 is vector-componentwise.&lt;/strong&gt; Logical-combination detection, including any-violation (disjunctive) testing, requires a separate direct BDP for the combined predicate. T5 does &lt;em&gt;not&lt;/em&gt; derive composite detectability as a corollary of componentwise detectability.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These commitments bound the present work's claims; positioning critiques of the conditional structure belong to the architectural-class register itself, not to the present work's internal logic.&lt;/p&gt;




&lt;h2&gt;
  
  
  1. The Identifiability Problem
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1.1 The Reconstruction-versus-Detection Distinction
&lt;/h3&gt;

&lt;p&gt;The architectural-class corpus declares two structural commitments that are, on their face, in tension. The first is that operator-internal architectural objects (H, Λ, χₒₚ, the closure-complementarity conditions, the IIC coherence) are real structural quantities whose conformance to declared properties is the empirical content of subclass membership. The second is the non-reconstructibility constraint NR-ε (T87 of NC2.5 v2.1, restated in ONTOΣ XI §2.3 as HF-NR): no external observer can reconstruct the operator-internal state H(t) from emission Yₜ with mutual information exceeding the declared NR-ε leakage bound.&lt;/p&gt;

&lt;p&gt;If Yₜ does not carry information about H(t) beyond NR-ε, how is H(t)'s conformance to HF-FIN, HF-MON, HF-DYN tested? The protocols of ONTOΣ XI §8.1 specify that violations are observable in emission distribution, but if NR-ε is in force, output statistics carry only NR-ε bits of information about internal state. The apparent paradox: the falsification surface seems to require what NR-ε forbids.&lt;/p&gt;

&lt;p&gt;The resolution lies in a distinction that the corpus has implicitly assumed but not yet stated formally: &lt;strong&gt;NR-ε constrains both state reconstruction and any property statistic that is a function of the protected internal trajectory (by the data-processing inequality: if mathcal{P} = f(H), then I(mathcal{P}; Y) ≤ I(H; Y) ≤ ε at the per-step level, and analogously I(mathcal{P}&lt;em&gt;(0:T); Y&lt;/em&gt;(0:T)) ≤ ε_T at the window level after the NR-window condition of §1.6). It does not, however, force property-channel mutual information to vanish when ε (or ε_T) &amp;gt; 0. The bridge concerns positive-but-bounded property information under explicitly declared premises:&lt;/strong&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;0 &amp;amp;lt; I(mathbf{1}[mathcal{P}_X]; S_X^*) ≤ I(H_(0:T); S_X^*) ≤ ε_T&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;under the Bridge Detectability Premise + non-degenerate prior + NR-window condition stated in §1.6 below.&lt;/p&gt;

&lt;p&gt;The two questions — state reconstruction and property-violation detection — are formally distinct. State reconstruction asks: can Yₜ be inverted to recover H(t) as a structural object, with all its internal topology and content? Property-violation detection asks: given a predicate mathcal{P} over the trajectory of H(·) (e.g., "does |H(t)| exceed K(τᵣₑₘ) on a sustained interval?"), does Yₜ carry information about whether mathcal{P} holds?&lt;/p&gt;

&lt;p&gt;The two questions can have very different &lt;em&gt;quantitative&lt;/em&gt; answers under NR-ε while sharing the same &lt;em&gt;upper bound&lt;/em&gt;. State reconstruction is a question about I(H(t); Yₜ), the mutual information between a state object and the observation. Property-violation detection is a question about I(mathcal{P}; Yₜ), the mutual information between a single-bit predicate and the observation. The latter is bounded above by the former (data-processing inequality) and may be non-trivially positive under the bridge's premises of §1.6 — but it cannot exceed the NR-ε leakage budget.&lt;/p&gt;

&lt;p&gt;This is the structural insight that the present work makes load-bearing. NR-ε is a bound on I(H; Y) that propagates by DPI to any property statistic S(Y); it does not force I(mathcal{P}; Y) = 0 when ε &amp;gt; 0. The bridge supplies the premises (§1.6) under which I(mathcal{P}; Y) is positive-but-ε_T-bounded over a pre-registered window [0, T], specifies which mathcal{P} are detectable, and bounds the detection precision in a way that respects NR-ε on the underlying state while being positive about the property.&lt;/p&gt;

&lt;h3&gt;
  
  
  1.2 The Architectural Targets
&lt;/h3&gt;

&lt;p&gt;The property-violation classes whose admissible detection the present work addresses are:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Holding-field properties&lt;/strong&gt; (from ONTOΣ XI §2.3):&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;HF-FIN-violation: |H(t)| &amp;gt; K(τᵣₑₘ) by margin δ on a sustained interval.&lt;/li&gt;
&lt;li&gt;HF-MON-violation: the holding-capacity K(τᵣₑₘ) trajectory fails the declared monotone-non-increasing tolerance band under sustained Φ accumulation (a property of H_(0:T) given declared K, Φ, τᵣₑₘ). &lt;em&gt;Emission signature:&lt;/em&gt; emission-diversity proxy fails the same band. (Deviations within the declared band are not detection events; only excursions beyond the band are.)&lt;/li&gt;
&lt;li&gt;HF-DYN-violation: the holding-field operates in retrieve-then-apply mode rather than dynamic-reshape (a property of H_(0:T) given the declared dynamic-reshape commitment). &lt;em&gt;Emission signature:&lt;/em&gt; emission decomposable into retrieve-from-fixed-store followed by application.&lt;/li&gt;
&lt;li&gt;HF-COH-violation: H(t) fragmenting into disconnected components beyond the declared coherence-diameter band.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Load-field properties&lt;/strong&gt; (from ONTOΣ XI §3.3):&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Λ-ACC-violation: zero accumulation rate under sustained interaction.&lt;/li&gt;
&lt;li&gt;Λ-CHARGE-violation: attention output indistinguishable from random shaping over Λ.&lt;/li&gt;
&lt;li&gt;Λ-NONRETRIEVE-violation: the operator's action apparatus operates in retrieve-then-apply mode (a property of operator-internal behaviour given the declared apparatus). &lt;em&gt;Emission signature:&lt;/em&gt; behaviour decomposable into retrieve-then-apply.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;Note on Λ-ACC and Λ-NONRETRIEVE theorem coverage.&lt;/em&gt; Among the load-field properties, only Λ-CHARGE has a dedicated theorem (Theorem 3, gauge-conditional). &lt;strong&gt;Λ-NONRETRIEVE&lt;/strong&gt; is definitionally co-extensive with HF-DYN on emission semantics (both: "behaviour / emission decomposable into retrieve-then-apply"), and its detection-admissibility derives via T1 by treating Λ-NONRETRIEVE as a mathcal{P}_(HF)-coextensive predicate sharing T1's BDP, NR-window, and calibration premises — no separate BDP declaration is required &lt;strong&gt;only for the emission-decomposability fragment&lt;/strong&gt;, and only provided the deployment pre-registers Λ-NONRETRIEVE and HF-DYN as coextensive predicates for that specific test. Operator-internal Λ-accumulation aspects of Λ-NONRETRIEVE remain outside T1 and are owed to companion work. &lt;strong&gt;Λ-ACC&lt;/strong&gt; currently has no dedicated theorem in this work; its detection-admissibility is owed to a substrate-specific companion paper per §7 Continuing Programme.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Chaos-predicate properties&lt;/strong&gt; (from ONTOΣ XI §4.3, §4.5):&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;χ-REL-violation under threshold-straddling: for two operators with declaredly distinct K in a threshold-straddling paired design, the emission-derived chaos-predicate estimator hatχₒₚ fails to distinguish the straddling pair from matched-K controls under the paired design (the internal χₒₚ is not directly observed; identifiability is asserted at the level of hatχₒₚ on calibration-valid nuisance-adjusted pair-difference statistics).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Closure-complementarity conditions&lt;/strong&gt; (from ONTOΣ XII §3.2, §6):&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;CC-0-violation: closure(U, R, A) does not return an operator-internal-extended-conformant system. (CC-0-violation is structurally caught at the procedural-admissibility layer per §3.4.1 — closure failing to return a conformant system makes the deployment procedurally unevaluable, not a property-channel detection target; T4's detection scope is therefore X ∈ {WE, IIC, D} only.)&lt;/li&gt;
&lt;li&gt;CC-WE-violation: components carry jointly inadmissible Will Embeddings.&lt;/li&gt;
&lt;li&gt;CC-IIC-violation: IIC cycles fail to compose into a stable system-cycle.&lt;/li&gt;
&lt;li&gt;CC-D-violation: component drifts isolated from the system's load field.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Theorem-premise properties:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;KAC-BASE-violation: in unperturbed regime, attention does not follow the dominant admissible slope of Λ over H(t).&lt;/li&gt;
&lt;li&gt;FR-COH-violation: substrate phase misalignment does not manifest as Λ-slope perturbation at the operator layer.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;IIC coherence properties&lt;/strong&gt; (from IIC v2.1 §2.3, §2.4):&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;mathrm{Coh}(t)-trajectory properties: closure of mathrm{Coh}(t) to zero or below; closure of Δ_(boldsymbol{varpi)}.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The work's identifiability theorems address detectability of these property-violations from calibration-valid nuisance-adjusted output statistics under the NR-window + BDP discipline of §1.6.&lt;/p&gt;

&lt;h3&gt;
  
  
  1.3 Observable Channels
&lt;/h3&gt;

&lt;p&gt;The emission stream Yₜ is whatever the deployment substrate emits as observable: token sequences for language-model substrates, motor-command streams for control substrates, behavioural time-series for perceptual substrates, response distributions for decision substrates. The work treats Yₜ as a generic emission channel without committing to specific substrate semantics; substrate-specific identifiability theorems would specialise the apparatus to the channel's structure.&lt;/p&gt;

&lt;p&gt;The statistic S(·) on Yₜ is any function from the emission stream to a summary quantity. The work distinguishes three families of admissible statistics in §2.&lt;/p&gt;

&lt;h3&gt;
  
  
  1.4 The Confound Class
&lt;/h3&gt;

&lt;p&gt;Output statistics are confounded by interface effects that may produce signals indistinguishable from property-violations unless explicitly discounted. The confound class mathcal{C} comprises:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;mathcal{C}₁ — Decoder-temperature confound.&lt;/strong&gt; For substrates that emit through a temperature-parameterised decoder (the standard token-emission setting in language model substrates), the temperature τ_(dec) controls emission diversity. High temperature produces high diversity even when internal state is concentrated; low temperature produces low diversity even when internal state is dispersed.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;mathcal{C}₂ — Sampling-policy confound.&lt;/strong&gt; Beam search, top-k sampling, nucleus sampling, and similar policies systematically distort the relation between internal-state distribution and observed emission distribution. Top-k sampling truncates rare emissions; nucleus sampling adapts the truncation threshold dynamically.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;mathcal{C}₃ — Retrieval-augmentation confound.&lt;/strong&gt; Architectures that include retrieval components inject external content into the emission stream, producing emission that does not reflect internal-state structure but external retrieval results.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;mathcal{C}₄ — Prompt-entropy confound.&lt;/strong&gt; Prompts with high lexical or syntactic entropy produce high output entropy regardless of internal-state structure. The confound is particularly severe when comparing emission entropy across deployments with different prompt distributions.&lt;/p&gt;

&lt;p&gt;These four confounds are the architectural minimum that any identifiability protocol must discount. Substrate-specific confounds (e.g., motor-noise in control substrates, sensory bandwidth in perceptual substrates) are deployment-side concerns and not addressed at the architectural-class register.&lt;/p&gt;

&lt;h3&gt;
  
  
  1.5 The NR-ε Constraint, Formally
&lt;/h3&gt;

&lt;p&gt;T87 of NC2.5 v2.1 declares the leakage bound:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;I(H(t); Yₜ) ≤ ε&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;where I is mutual information evaluated under the operator's declared probability structure on Sₒₚ × mathcal{Y} (with mathcal{Y} the emission space). The bound ε is part of the operator's architectural declaration; for the identifiability apparatus to be operational, ε must be fixed prior to deployment evaluation under the pre-registration discipline of ONTOΣ XI §10.&lt;/p&gt;

&lt;p&gt;The constraint is a &lt;strong&gt;per-step bound on state-channel mutual information&lt;/strong&gt;. It bounds — by data-processing inequality [Cover and Thomas 2006, §2.8] — mutual information between any predicate-on-H statistic and Yₜ at the same level ε. For multi-step evaluation windows the per-step bound does not by itself yield a tight window-level bound; the window-level NR condition ε_T is stated in §1.6 below.&lt;/p&gt;




&lt;h3&gt;
  
  
  1.6 The Bridge Detectability Premise (BDP)
&lt;/h3&gt;

&lt;p&gt;The identifiability bridge concerns property detection as a &lt;strong&gt;bounded-leakage&lt;/strong&gt; phenomenon, not as an NR-violation-free channel. The premises below formalise the bridge's claims under three commitments: (i) an ensemble over which property indicators acquire stochastic structure; (ii) a window-level NR bound; (iii) a nuisance-adjusted emission statistic with substrate-relative separation margin.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Test ensemble mathcal{E}.&lt;/strong&gt; All property-channel mutual-information claims in this work are evaluated over a pre-registered test ensemble mathcal{E}: a paired sampling frame combining (a) a target population of candidate deployments under test (some of which substantively violate the protected property) and (b) a baseline population of known-conformant deployments, together with N ≥ declared-threshold independent replications under TD-5-equivalent instantiation discipline (§3.4). The protected property indicator mathbf{1}[mathcal{P}_X] is a random variable over mathcal{E}. A fixed-deployment / single-instance evaluation frame yields constant mathbf{1}[mathcal{P}_X] and trivially zero mutual information; the ensemble construction is what makes the MI claims of §3 well-defined.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Non-degenerate prior condition.&lt;/strong&gt; The ensemble mathcal{E} must supply a pre-registered prior π&lt;em&gt;X = P&lt;/em&gt;(mathcal{E)}[mathbf{1}[mathcal{P}&lt;em&gt;X] = 1] ∈ (πₘᵢₙ, 1 - πₘᵢₙ) on the violation indicator, with πₘᵢₙ &amp;gt; 0 declared at pre-registration. This is the &lt;strong&gt;mixing-ratio condition&lt;/strong&gt; — the two-population sampling frame mixes violating and conformant deployments with neither population vanishing in the limit. Sparse-violation scenarios (π_X → 0) and saturated-violation scenarios (π_X → 1) drive mutual information to zero independently of any conditional-distribution separation, by prior-degeneracy of I(X; Y) = E_X[D&lt;/em&gt;(KL)(P(Y|X) \,|\, P(Y))]. Without the non-degenerate prior condition, BDP's direct MI lower bound cannot hold even when the conditional-distribution separation is large. The prior condition is the ensemble-level commitment that complements BDP-(iii)'s conditional-distribution commitment.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;NR-window condition.&lt;/strong&gt; For the evaluation window [0, T] of the test ensemble:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;I(Hᵖʳᵒᵗ_(0:T); Y_(0:T)) ≤ ε_T&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;where Hᵖʳᵒᵗ&lt;em&gt;(0:T) is the declared protected trajectory (per §0.1: Hᵖʳᵒᵗ&lt;/em&gt;(0:T) = H_(0:T) for HF/Λ/Coh predicates; Hᵖʳᵒᵗ&lt;em&gt;(0:T) = H&lt;/em&gt;(S,0:T) for CC predicates per §3.4), and ε&lt;em&gt;T is either (a) declared directly by the deployment's architectural specification as a window-level NR bound, or (b) derived from &lt;strong&gt;conditional sequential leakage declarations&lt;/strong&gt; I(Hᵖʳᵒᵗ&lt;/em&gt;(0:T); Yₜ | Y_(0:t-1)) ≤ εₜ, in which case ε_T ≤ sumₜ₌₁^(T) εₜ (see &lt;em&gt;NR-window composition&lt;/em&gt; below for the formal condition). Marginal per-step bounds — of the form I(Hₜ; Yₜ) ≤ εₜ, which is the T87 per-step statement of §1.5 — do &lt;strong&gt;not&lt;/strong&gt; in general compose to a window-level bound. The window-level bound is the operational quantity for the identifiability theorems of §3.&lt;/p&gt;

&lt;p&gt;For HF/Λ/Coh predicates the NR-window form coincides with the operator-level I(H_(0:T); Y_(0:T)) ≤ ε&lt;em&gt;T. For CC predicates (Theorem 4), the form is I(H&lt;/em&gt;(S,0:T); Y_(0:T)) ≤ ε&lt;em&gt;T — declared either directly at pre-registration as the closure-output-system NR-window (the &lt;em&gt;Separate-declaration case&lt;/em&gt; of §3.5's Preliminary), or inherited from the operator-level NR-window via DPI under the &lt;strong&gt;closure-subsumption commitment&lt;/strong&gt; that H&lt;/em&gt;(S,0:T) is a function of H_(0:T) through mathrm{closure}(U, R, A) → S (per ONTOΣ XII §3.2 — the &lt;em&gt;Subsumption case&lt;/em&gt; of §3.5's Preliminary). The closure-subsumption commitment is part of the deployment's pre-registration declaration; deployments declining it occupy the &lt;em&gt;Separate-declaration case&lt;/em&gt; and must supply the closure-output-system NR-window directly.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Bridge Detectability Premise (BDP).&lt;/strong&gt; For each protected property class X — i.e., each detection target on the operator-internal architectural objects: HF-violation, Λ-violation, χ-violation, CC-violation (X ∈ {WE, IIC, D}), and Coh-violation (the five components of Theorem 5's vector predicate) — there exists a pre-registered emission statistic S_X and a nuisance-adjustment operator A_(mathcal{C)} (per §2.4 below) such that the adjusted statistic&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;S_X^* = A_(mathcal{C)}(Y_(0:T); η_(mathcal{C)})&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;satisfies a &lt;strong&gt;direct property-channel mutual-information lower bound&lt;/strong&gt; over the ensemble mathcal{E} with non-degenerate prior π_X ∈ (πₘᵢₙ, 1 - πₘᵢₙ):&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;I(mathbf{1}[mathcal{P}_X]; S_X^*) ≥ ι_X(δ) &amp;amp;gt; 0,    ∀ δ &amp;amp;gt; δₘᵢₙ,&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;where ι_X(δ) is the &lt;strong&gt;substrate-relative property-channel MI separation margin&lt;/strong&gt; — a positive, substrate-specific function that grows with the violation margin δ.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Equivalent formulation via Jensen–Shannon separation.&lt;/strong&gt; For a binary property indicator mathbf{1}[mathcal{P}_X], the MI lower bound is &lt;strong&gt;exactly&lt;/strong&gt; the π_X-weighted Jensen–Shannon divergence (under the same log base and prior weighting):&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;I(mathbf{1}[mathcal{P}_X]; S_X^*) = J_(π_X)big(P(S_X^* | mathbf{1}[mathcal{P}_X] = 1),\; P(S_X^* | mathbf{1}[mathcal{P}_X] = 0)big) ≥ ι_X(δ) &amp;amp;gt; 0,&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;where J_(π) denotes the π-weighted Jensen–Shannon divergence [Lin 1991]. This is a standard identity (not "equivalence up to constants") for binary indicators under any joint distribution. JS is bounded above by both prior-weighted conditional KL terms and below by total variation squared, supplying a stable bidirectional bound.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Status of one-sided KL.&lt;/strong&gt; A weaker, asymmetric formulation&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;D_(KL)big(P(S_X^* | mathbf{1}[mathcal{P}_X] = 1) \;\|\; P(S_X^* | mathbf{1}[mathcal{P}_X] = 0)big) ≥ κ_X(δ) &amp;amp;gt; 0&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;may be used &lt;strong&gt;only under declared regularity conditions&lt;/strong&gt; — bounded likelihood ratios, common-support, anti-spike (no rare events with diverging Radon–Nikodym derivative), or a substrate-specific reverse-Pinsker condition (cf. [Csiszár and Shields 2004]) — that bridge the one-sided KL bound to a JS / MI lower bound. Without such regularity, one-sided KL can be large via rare-event spikes while binary-mixture MI / JS remains arbitrarily small. The Bridge's theorems below depend on the direct MI form ι_X(δ) &amp;gt; 0 above; deployments may declare BDP via one-sided KL only when the required regularity conditions are pre-registered alongside.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Where the bound is taken.&lt;/strong&gt; The MI is evaluated over the &lt;strong&gt;joint distribution&lt;/strong&gt; on the two-population × replication ensemble of TD-5. The two-population sampling frame supplies mathbf{1}[mathcal{P}_X] as a non-degenerate random variable across deployments; the replication ensemble supplies sampling variation in S_X^* for each deployment. ι_X(δ) is the property-channel separation margin survived under the joint ensemble (i.e., after marginalising over within-deployment replications).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Note on ensemble vs replication.&lt;/strong&gt; BDP's direct MI lower bound ι_X(δ) is taken &lt;em&gt;over the joint two-population × replication ensemble&lt;/em&gt;. The replication ensemble supplies within-deployment sampling variation in S_X^* for each deployment; the two-population frame supplies between-deployment variation in mathbf{1}[mathcal{P}_X]. If within-deployment replication variance is large relative to between-population mean separation, the joint-frame MI is suppressed by within-deployment dispersion. The deployment's pre-registration must declare a substrate-specific &lt;strong&gt;replication-noise tolerance&lt;/strong&gt;: the threshold N in TD-5's "N ≥ declared-threshold independent replications" must be large enough that between-population separation is detectable above within-deployment replication noise. This is the operational counterpart to BDP's ι_X(δ): BDP commits to existence of the separation; the replication-noise tolerance commits to its detectability under finite-sample sampling.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Augmented protected evaluation object.&lt;/strong&gt; For Case-A predicates, the expression mathbf{1}[mathcal{P}&lt;em&gt;X] = f_X(Hᵖʳᵒᵗ&lt;/em&gt;(0:T)) is to be read in the &lt;strong&gt;pre-registered augmented sense&lt;/strong&gt;:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;mathbf{1}[mathcal{P}_X] = f_X\!left(Hᵖʳᵒᵗ_(0:T);\, Θᵈᵉᶜˡ_Xright),&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;where Θᵈᵉᶜˡ&lt;em&gt;X is the &lt;strong&gt;fixed declared structural context&lt;/strong&gt; required to evaluate the predicate: holding-capacity law K(τᵣₑₘ), structural burden Φ, budget trajectory τᵣₑₘ, declared thresholds (e.g., δₘᵢₙ, θₛₗₒₚₑ), gauge G, closure map, action-selection apparatus, component attribution map, and other predicate-specific architectural declarations. The composite augmented protected evaluation object is denoted Z^X&lt;/em&gt;(0:T) := (Hᵖʳᵒᵗ_(0:T), Θᵈᵉᶜˡ_X).&lt;/p&gt;

&lt;p&gt;When Θᵈᵉᶜˡ_X is &lt;strong&gt;fixed by pre-registration&lt;/strong&gt; (and therefore not a random variable over the ensemble mathcal{E}), the Case-A DPI chain is evaluated &lt;strong&gt;conditionally&lt;/strong&gt; on Θᵈᵉᶜˡ_X — the MI claims of BDP and the chain inequalities below are conditional on the pre-registered architectural context. When Θᵈᵉᶜˡ_X &lt;strong&gt;varies over the ensemble&lt;/strong&gt; and itself carries property information, the predicate is not pure Case-A; it must be treated as Case-B (design-metadata predicate) or as a mixed conditional-design predicate with its own declared leakage and detection discipline (per the Case-B form below).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Admissible detection chain — two cases by predicate type.&lt;/strong&gt; A property class X is &lt;strong&gt;ε_T-admissibly detectable&lt;/strong&gt; under BDP + non-degenerate prior + NR-window + nuisance-adjustment, with the form of the admissibility chain depending on the predicate type:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Case A — Internal-trajectory predicates.&lt;/em&gt; If mathbf{1}[mathcal{P}&lt;em&gt;X] = f_X(Hᵖʳᵒᵗ&lt;/em&gt;(0:T); Θᵈᵉᶜˡ&lt;em&gt;X) is a function of the augmented protected evaluation object — where Hᵖʳᵒᵗ&lt;/em&gt;(0:T) = H_(0:T) (the operator's holding-field trajectory) for HF-, Λ-, and Coh-violation predicates, and Hᵖʳᵒᵗ&lt;em&gt;(0:T) = H&lt;/em&gt;(S,0:T) (the closure-output system's holding-field trajectory) for CC-violation predicates per §3.4, with Θᵈᵉᶜˡ&lt;em&gt;X the predicate-specific declared structural context (fixed at pre-registration). The enumeration: HF-violation predicates (with Θᵈᵉᶜˡ&lt;/em&gt;(HF) ⊃eq {K(τᵣₑₘ), Φ, δₘᵢₙ}); Λ-violation predicates at the operator level — including the orientation-following predicate event of Theorem 3 (with Θᵈᵉᶜˡₛₗₒₚₑ ⊃eq {cₒₚ, θₛₗₒₚₑ, G, action-selection apparatus}); CC-violation predicates evaluated at H_(S,0:T) (with Θᵈᵉᶜˡ&lt;em&gt;(CC) ⊃eq {U, R, A, mathrm{closure}, component attribution map}, per ONTOΣ XII §3.2's mathrm{closure}(U, R, A) → S construction); Coh-violation predicates (with Θᵈᵉᶜˡ&lt;/em&gt;(Coh) per IIC v2.1's coherence apparatus). Note: an operator-level χ_op predicate would also be Case-A by this criterion, but no theorem in the present work directly tests an operator-level χ predicate — Theorem 2 instead tests χ-REL via the Case-B threshold-straddling design-metadata route below. The generic Case-A chain (conditional on Θᵈᵉᶜˡ_X):&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;0 &amp;amp;lt; I\!left(mathbf{1}[mathcal{P}_X]; S_X^* \,big|\, Θᵈᵉᶜˡ_Xright) ≤ I\!left(Hᵖʳᵒᵗ_(0:T); S_X^* \,big|\, Θᵈᵉᶜˡ_Xright) ≤ I\!left(Hᵖʳᵒᵗ_(0:T); Y_(0:T) \,big|\, Θᵈᵉᶜˡ_Xright) ≤ ε_T^X,&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;with Hᵖʳᵒᵗ&lt;em&gt;(0:T) instantiated per the predicate's declared protected trajectory and ε_T^X the corresponding NR-window bound. (When Θᵈᵉᶜˡ_X is genuinely fixed across the ensemble, the conditional MI's collapse to unconditional form — the conditioning on a constant is vacuous; the explicit conditioning is preserved for analytical clarity at the seam between Case-A and Case-B.)&lt;br&gt;
The left inequality follows from BDP's direct MI lower bound (now stated conditionally on Θᵈᵉᶜˡ_X): I(mathbf{1}[mathcal{P}_X]; S_X^* | Θᵈᵉᶜˡ_X) ≥ ι_X(δ) &amp;gt; 0. The middle inequality is data-processing applied to mathbf{1}[mathcal{P}_X] = f_X(Hᵖʳᵒᵗ&lt;/em&gt;(0:T); Θᵈᵉᶜˡ&lt;em&gt;X) as a function of Hᵖʳᵒᵗ&lt;/em&gt;(0:T) given Θᵈᵉᶜˡ&lt;em&gt;X, and S_X^* as a function of Y&lt;/em&gt;(0:T). The right inequality is the NR-window condition (conditioning on the fixed Θᵈᵉᶜˡ_X does not increase MI relative to the marginal NR-window).&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Case B — Design-metadata predicates.&lt;/em&gt; If mathbf{1}[mathcal{P}_X] is &lt;strong&gt;exogenous design metadata&lt;/strong&gt; (e.g., the "straddling" indicator of Theorem 2, declared at deployment-pair specification time as a function of (K₁, K₂) — not a function of internal trajectory), or &lt;strong&gt;audit metadata&lt;/strong&gt; (declared at the privileged audit channel per §5.1):&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;(property channel)\ I(mathbf{1}[mathcal{P}_X]; S_X^*) ≥ ι_X(δ) &amp;amp;gt; 0,&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;(state leakage, separately)\ I(H_(0:T); S_X^*) ≤ I(H_(0:T); Y_(0:T)) ≤ ε_T.&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The property-channel detection bound and state-leakage bound are &lt;strong&gt;independent constraints on different objects&lt;/strong&gt; — design/audit metadata is not a function of H, so no DPI chain through H links the two. Theorem 2 is the canonical Case-B instance.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;NR-window composition (when ε_T is derived from per-step bounds).&lt;/strong&gt; The window-level bound ε_T may be declared directly by the deployment, or derived by composition from per-step &lt;strong&gt;conditional&lt;/strong&gt; declarations:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;I(H_(0:T); Yₜ | Y_(0:t-1)) ≤ εₜ    ⇒    I(H_(0:T); Y_(0:T)) ≤ sumₜ₌₁^(T) εₜ.&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The composition is valid under the conditional declaration; marginal per-step bounds of the form I(Hₜ; Yₜ) ≤ εₜ (single-step, marginal-over-history) do &lt;strong&gt;not&lt;/strong&gt; in general compose to a window-level bound. T87's per-step statement in §1.5 is the marginal form; deployments that derive ε_T by composition must declare the conditional-sequential bounds, not the marginal ones, at pre-registration.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Joint satisfiability of BDP and NR-window.&lt;/strong&gt; For every Case-A internal-trajectory predicate, the BDP lower bound and the NR-window upper bound must be jointly satisfiable. Thus the post-calibration property-channel margin must obey&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;0 &amp;amp;lt; ι_Xᵃᵈʲ(δ, ρₘₐₓ) ≤ ε_T^X,&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;where ε&lt;em&gt;T^X is the NR-window budget for the corresponding protected trajectory (operator-level ε_T for HF/Λ/Coh predicates; gauge-stratum ε_T(g) for Theorem 3; closure-system ε_T on H&lt;/em&gt;(S,0:T) for CC predicates per §3.4). If ε_T^X &amp;lt; ι_Xᵃᵈʲ(δ, ρₘₐₓ), the deployment's declarations are &lt;strong&gt;premise-incompatible&lt;/strong&gt; and the deployment falls outside the Bridge's admissibility frame for that predicate. This is not a failed detection result; it is a failure of joint premise satisfiability declared at pre-registration. Premise-incompatibility is detectable from the deployment's declarations alone, independent of any empirical evaluation.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Status of BDP.&lt;/strong&gt; BDP is &lt;em&gt;not derived&lt;/em&gt; from corpus primitives in the present work — it is the explicit bridge premise the theorems of §3 are conditional on. Substrate-specific derivations of BDP from architectural primitives, with quantitative ι_X(δ) functions (or their JS / regularised-KL equivalents), are owed in substrate-specific companion papers. The Bridge's theorems are accordingly &lt;strong&gt;conditional structural theorems&lt;/strong&gt; (see §0.2 &lt;em&gt;Note on theorem status&lt;/em&gt;) rather than free-standing empirical results.&lt;/p&gt;




&lt;h2&gt;
  
  
  2. Admissible Statistics
&lt;/h2&gt;

&lt;h3&gt;
  
  
  2.1 Definition
&lt;/h3&gt;

&lt;p&gt;A statistic S(Y_(0:T)) is &lt;strong&gt;admissible under BDP + NR-window for property mathcal{P}_X&lt;/strong&gt;, evaluated over the pre-registered test ensemble mathcal{E} of §1.6, if it satisfies two conditions:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(Adm-1) Property informativeness over mathcal{E}:&lt;/strong&gt; I(mathbf{1}[mathcal{P}&lt;em&gt;X]; S(Y&lt;/em&gt;(0:T))) &amp;gt; 0, with the mutual information evaluated under mathcal{E}'s joint distribution over (a) the two-population sampling frame (violating-vs-conformant deployments) and (b) the replication ensemble. Per BDP's direct MI lower bound of §1.6, this positivity is supplied by ι_X(δ) &amp;gt; 0 (equivalently, the π_X-weighted JS-divergence separation) whenever the violation margin δ exceeds δₘᵢₙ.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(Adm-2) Window-level state-leakage bound:&lt;/strong&gt; I(H_(0:T); S(Y_(0:T))) ≤ ε&lt;em&gt;T — the statistic does not leak the trajectory state beyond the declared window-level NR bound of §1.6. By data-processing inequality, since S(Y&lt;/em&gt;(0:T)) is a function of Y_(0:T), this follows from the NR-window condition I(H_(0:T); Y_(0:T)) ≤ ε_T.&lt;/p&gt;

&lt;p&gt;Together, Adm-1 and Adm-2 instantiate the admissible detection chain of §1.6, with the form of the chain determined by the predicate type:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Case-A — internal-trajectory predicates&lt;/strong&gt; (e.g., HF-FIN/HF-MON/HF-DYN with Hᵖʳᵒᵗ&lt;em&gt;(0:T) = H&lt;/em&gt;(0:T); Λ-CHARGE slope with Hᵖʳᵒᵗ&lt;em&gt;(0:T) = H&lt;/em&gt;(0:T); CC closure conditions with Hᵖʳᵒᵗ&lt;em&gt;(0:T) = H&lt;/em&gt;(S,0:T) per §3.4; Coh-violation with Hᵖʳᵒᵗ&lt;em&gt;(0:T) = H&lt;/em&gt;(0:T)): mathbf{1}[mathcal{P}&lt;em&gt;X] = f(Hᵖʳᵒᵗ&lt;/em&gt;(0:T)) (under §1.6's augmented evaluation object with Θᵈᵉᶜˡ&lt;em&gt;X fixed across mathcal{E}, this reduces to f_X(Hᵖʳᵒᵗ&lt;/em&gt;(0:T)) as a deterministic function of Hᵖʳᵒᵗ&lt;em&gt;(0:T) alone — conditioning on the constant Θᵈᵉᶜˡ_X is vacuous), and Adm-1 + Adm-2 chain through the declared protected trajectory via two distinct DPI applications: (a) the &lt;em&gt;predicate-to-state DPI&lt;/em&gt; along the Markov chain mathbf{1}[mathcal{P}_X] → Hᵖʳᵒᵗ&lt;/em&gt;(0:T) → S(Y_(0:T)) (since mathbf{1}[mathcal{P}&lt;em&gt;X] is a deterministic function of Hᵖʳᵒᵗ&lt;/em&gt;(0:T), conditioning on Hᵖʳᵒᵗ&lt;em&gt;(0:T) renders it independent of S, establishing the Markov property), giving I(mathbf{1}[mathcal{P}_X]; S(Y&lt;/em&gt;(0:T))) ≤ I(Hᵖʳᵒᵗ&lt;em&gt;(0:T); S(Y&lt;/em&gt;(0:T))); and (b) the &lt;em&gt;state-to-emission DPI&lt;/em&gt; along Hᵖʳᵒᵗ&lt;em&gt;(0:T) → Y&lt;/em&gt;(0:T) → S(Y_(0:T)), giving I(Hᵖʳᵒᵗ&lt;em&gt;(0:T); S(Y&lt;/em&gt;(0:T))) ≤ I(Hᵖʳᵒᵗ&lt;em&gt;(0:T); Y&lt;/em&gt;(0:T)). Chaining with (Adm-1) lower bound and (Adm-2) state-leakage upper bound:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;0 &amp;amp;lt; I(mathbf{1}[mathcal{P}_X]; S(Y_(0:T))) ≤ I(Hᵖʳᵒᵗ_(0:T); S(Y_(0:T))) ≤ I(Hᵖʳᵒᵗ_(0:T); Y_(0:T)) ≤ ε_T.&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Case-B — design-metadata / exogenous-structural predicates&lt;/strong&gt; (e.g., threshold-straddling design label distinguishing two deployments by declared K per Theorem 2; audit-metadata predicates per §5.1 referring to design-time architectural declarations): mathbf{1}[mathcal{P}&lt;em&gt;X] is not a function of H&lt;/em&gt;(0:T), and the two conditions are separate constraints — Adm-1 supplies the property-channel lower bound from BDP, Adm-2 supplies the state-leakage upper bound from the NR-window — without a DPI chain linking them through H:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;I(mathbf{1}[mathcal{P}_X]; S(Y_(0:T))) ≥ ι_X(δ) &amp;amp;gt; 0,      I(H_(0:T); S(Y_(0:T))) ≤ ε_T.&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;em&gt;Note on Theorem 3 gauge.&lt;/em&gt; The gauge G in Theorem 3 is not a Case-B protected predicate but a &lt;strong&gt;conditioning stratum&lt;/strong&gt;: the protected predicate event mathcal{P}ₛₗₒₚₑⁱⁿᵗ is an internal-trajectory orientation-following event (Case-A; the indicator mathbf{1}[mathcal{P}ₛₗₒₚₑⁱⁿᵗ] is the corresponding random variable) evaluated &lt;em&gt;within&lt;/em&gt; each declared gauge stratum under a stratum-level NR-window ε_T(g).&lt;/p&gt;

&lt;p&gt;The Case-A versus Case-B distinction is determined at pre-registration by the predicate type: a predicate that the deployment's architectural specification declares as a function of internal trajectory is Case-A; a predicate that the deployment's specification declares as exogenous design metadata is Case-B. The two cases are simultaneously satisfiable for properties mathcal{P}_X whose statistic admits substrate-relative direct MI / JS-divergence separation under BDP without saturating the window-level NR-budget. The architectural commitment of the operator-internal-extended subclass is that NR-ε bounds reconstruction of H as a structural object (the held set itself, in the sense of HF-NR per ONTOΣ XI §2.3) and bounds — by DPI — any statistic that is a function of the protected trajectory; what BDP supplies is the premise under which a class of pre-registered, nuisance-adjusted statistics retains positive property-channel MI within that bound, irrespective of whether the predicate is Case-A or Case-B.&lt;/p&gt;

&lt;h3&gt;
  
  
  2.2 Three Families of Admissible Statistics
&lt;/h3&gt;

&lt;p&gt;The work distinguishes three families.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Diversity statistics.&lt;/strong&gt; Functions of the spread of the emission distribution over time. Examples: Shannon entropy of token emission, distinct-types-per-window count, output rank distribution, ε-typicality measures. Diversity statistics inform about properties of the form "is the held region wide enough to support this output spread?" — that is, properties of |H| trajectory and (indirectly, under controlled confounds) of K(τᵣₑₘ).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Variance and trajectory statistics.&lt;/strong&gt; Functions of the trajectory of emissions over time. Examples: sample variance of emission features, autocorrelation, jerk statistics, trajectory deviation. Variance statistics inform about properties of the form "does the held region maintain bounded variation under the operator's declared band?" — that is, HF-MON-related properties.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Correlational statistics.&lt;/strong&gt; Functions of relations between emission components or between emissions across time. Examples: cross-token correlation, cross-component covariance for multi-component substrates, conditional emission distributions given declared context. Correlational statistics are particularly relevant to closure-complementarity property detection (Theorem 4) because CC-WE / CC-IIC / CC-D violations are most visible in the relations between component emissions, not in any single component's emission distribution.&lt;/p&gt;

&lt;p&gt;The three families are not exhaustive, but they cover the architectural targets of §1.2. A specific deployment's identifiability protocol selects statistics from these families according to which property-violations are being tested.&lt;/p&gt;

&lt;h3&gt;
  
  
  2.3 How Confounds Enter
&lt;/h3&gt;

&lt;p&gt;The four confound channels of §1.4 enter the statistics as follows.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Decoder-temperature confound.&lt;/strong&gt; Diversity statistics scale monotonically with τ&lt;em&gt;(dec): high temperature inflates emission entropy independently of internal-state spread. Variance statistics scale with τ&lt;/em&gt;(dec)² (approximately). Correlational statistics are weakly affected at low orders but distorted at high orders. The confound's signature: a deployment with high τ_(dec) produces high diversity even when |H| is concentrated, threatening false-positive HF-FIN-violation detection.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Sampling-policy confound.&lt;/strong&gt; Sampling policies truncate or distort the emission distribution relative to the internal-state distribution. Top-k sampling concentrates emission on the top-k probability tokens, reducing observed diversity below internal-state diversity. Nucleus sampling adapts dynamically, producing emission whose diversity tracks a dynamic subset rather than the full internal distribution. The confound's signature: low observed diversity does not necessarily imply low |H|.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Retrieval-augmentation confound.&lt;/strong&gt; Retrieval injects external content into the emission. If retrieval is active, observed emission diversity reflects retrieval-source structure rather than internal-state structure. The confound is severe enough that, without explicit discount, retrieval-augmented deployments produce emission statistics that bear almost no relation to operator-internal architecture.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Prompt-entropy confound.&lt;/strong&gt; High-entropy prompts produce high-entropy outputs regardless of internal architecture. The confound is most severe when comparing across deployments with different prompt distributions; intra-deployment temporal comparisons within a fixed prompt distribution are less affected.&lt;/p&gt;

&lt;h3&gt;
  
  
  2.4 The Nuisance-Adjustment Procedure
&lt;/h3&gt;

&lt;p&gt;For each confound profile mathcal{C}, a &lt;strong&gt;nuisance-adjustment operator&lt;/strong&gt; A_(mathcal{C)} is declared as part of the operator's architectural specification. The adjusted statistic is:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;S^*(Y_(0:T)) = A_(mathcal{C)}(Y_(0:T); η_(mathcal{C)})&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;where η&lt;em&gt;(mathcal{C)} is the pre-registered nuisance parameter set and A&lt;/em&gt;(mathcal{C)} is drawn from a class admitting at least the following forms (substrate-dependent):&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Scalar additive subtraction.&lt;/strong&gt; For separable additive confounds where each φᵢ(mathcal{C}ᵢ) is well-defined as a scalar correction: S^* = S(Y_(0:T)) - sumᵢ φᵢ(mathcal{C}ᵢ). This is the canonical special case of A_(mathcal{C)}.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Residualisation.&lt;/strong&gt; Regress S(Y_(0:T)) on confound covariates and retain residuals.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Conditional expectation.&lt;/strong&gt; S^* = S(Y_(0:T)) - E[S(Y_(0:T)) | mathcal{C}], evaluated under pre-registered nuisance model.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Matched-baseline differencing.&lt;/strong&gt; S^* = S(Y_(0:T)) - S(baseline_(π)(mathcal{C})) for matched-confound reference deployments per TD-1.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Nuisance-model marginalisation.&lt;/strong&gt; Marginalise out mathcal{C} under declared joint distribution.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Likelihood-ratio adjustment.&lt;/strong&gt; Compare emission likelihoods under violation-class and conformance-class nuisance models.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Substrate-specific operator.&lt;/strong&gt; Domain-specific (e.g., temperature normalisation for language-model substrates, noise-injection variance for control substrates, external-stimulus-bandwidth correction for perceptual substrates).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The architectural commitment is that &lt;strong&gt;confounds must be declared and adjusted before property-detection&lt;/strong&gt;, not that the specific operator form is universal. Heterogeneous statistic types — entropy, covariance, likelihood-ratio, spectral phase metric, model-comparison score — admit different operator forms; the scalar-subtraction formula is a single point in this class.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Boltzmann form as substrate-specific toy placeholder, not general law.&lt;/strong&gt; For language-model substrates under temperature-parameterised Boltzmann decoders, a substrate-specific Boltzmann-family correction may involve the partition function Z(τ&lt;em&gt;(dec)), temperature-dependent energy-expectation terms, and derivative-of-log-partition contributions; the present work &lt;strong&gt;does not fix a universal closed form&lt;/strong&gt; for φ₁, and the log τ&lt;/em&gt;(dec) + log Z(τ&lt;em&gt;(dec)) formula appearing below in §4.1 is a schematic placeholder for the toy low-noise regime, not an exact calibration for diversity statistics in general. The deployment must declare the substrate-specific concrete form at pre-registration. This is a deployment-side instantiation, not the general form of A&lt;/em&gt;(mathcal{C)}.&lt;/p&gt;

&lt;p&gt;The pre-registration discipline of ONTOΣ XI §10 applies: A_(mathcal{C)}, η_(mathcal{C)}, and the substrate-specific operator class must be declared prior to deployment evaluation. Post-hoc adjustment of nuisance parameters to fit observed statistics falsifies subclass membership by construction.&lt;/p&gt;




&lt;h2&gt;
  
  
  3. Conditional Admissibility Theorems (under BDP, NR-window, and Ensemble Discipline)
&lt;/h2&gt;

&lt;p&gt;The five theorems of this section are &lt;strong&gt;conditional admissibility theorems&lt;/strong&gt; (per §0.2 &lt;em&gt;Note on Theorem Status&lt;/em&gt;): each establishes that, &lt;em&gt;given&lt;/em&gt; the explicitly declared architectural premises (BDP supplying the substantive detectability claim, NR-window supplying the state-leakage upper bound, ensemble discipline supplying the probability frame), the property-detection chain is &lt;em&gt;admissible&lt;/em&gt; — compatible with NR-ε and bounded as the §1.6 chain prescribes. The theorems do &lt;strong&gt;not&lt;/strong&gt; derive BDP, do &lt;strong&gt;not&lt;/strong&gt; establish existence of the detecting statistic, and do &lt;strong&gt;not&lt;/strong&gt; assert empirical identifiability of any specific substrate. They establish &lt;strong&gt;compatibility and admissibility&lt;/strong&gt;, not detectability. Where prior versions of this work absorbed implicit emission-separation commitments inside proof bodies, the present version lifts each such commitment to the BDP premise of §1.6 and cites it explicitly in each theorem's &lt;em&gt;Assume:&lt;/em&gt; preamble.&lt;/p&gt;

&lt;h3&gt;
  
  
  3.1 Theorem 1 — Holding-Field Property Detection Admissibility (under BDP for HF properties)
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Theorem 1 (HF Property-Detection Admissibility under BDP).&lt;/strong&gt; Assume:&lt;/p&gt;

&lt;p&gt;(i) the pre-registered test ensemble mathcal{E} of §1.6, with the non-degenerate prior condition π&lt;em&gt;(HF) = P&lt;/em&gt;(mathcal{E)}[mathbf{1}[mathcal{P}&lt;em&gt;(HF)] = 1] ∈ (πₘᵢₙ, 1 - πₘᵢₙ) on the violation indicator;&lt;br&gt;
(ii) the NR-window condition I(H&lt;/em&gt;(0:T); Y_(0:T)) ≤ ε&lt;em&gt;T of §1.6;&lt;br&gt;
(iii) the Bridge Detectability Premise (BDP) for the holding-field property class — i.e., for each HF-property predicate mathcal{P}&lt;/em&gt;(HF) ∈ {HF-FIN, HF-MON, HF-DYN, HF-COH} (each a function of the protected trajectory H(·) — i.e., &lt;strong&gt;Case-A internal-trajectory predicate&lt;/strong&gt; per §1.6), there exists a pre-registered emission statistic S_(HF) and a nuisance-adjustment operator A_(mathcal{C)} (§2.4) such that the adjusted statistic S_(HF)^* = A_(mathcal{C)}(Y_(0:T); η&lt;em&gt;(mathcal{C)}) satisfies the &lt;strong&gt;direct property-channel MI lower bound&lt;/strong&gt; of §1.6: I(mathbf{1}[mathcal{P}&lt;/em&gt;(HF)]; S_(HF)^&lt;em&gt;) ≥ ι&lt;em&gt;(HF)(δ) &amp;gt; 0 for all violation margins δ &amp;gt; δₘᵢₙ (equivalently, the π&lt;/em&gt;(HF)-weighted JS-divergence separation; one-sided KL form admissible only with declared regularity conditions per §1.6);&lt;br&gt;
(iv) calibration-valid nuisance adjustment per §4.7 (mathrm{Err}&lt;em&gt;(calib) ≤ ρₘₐₓ), where the operator class of §2.4 is restricted to those A&lt;/em&gt;(mathcal{C)} for which the calibration-validity bound preserves the BDP direct-MI / JS-separation lower bound ι&lt;em&gt;(HF)(δ) (the operator-class-specific MI/JS-preservation condition is part of the deployment's pre-registration declaration, §4.7);&lt;br&gt;
(v) the declared structural context Θᵈᵉᶜˡ&lt;/em&gt;(HF) ⊃eq {K(τᵣₑₘ), Φ, δₘᵢₙ} is **fixed across the ensemble&lt;/em&gt;* mathcal{E} at pre-registration (per §1.6 augmented evaluation object); deployments with varying Θᵈᵉᶜˡ&lt;em&gt;(HF) fall outside Theorem 1's frame and are handled per §1.6's Case-B fallback;&lt;br&gt;
(vi) the joint-satisfiability compatibility premise ι&lt;/em&gt;(HF)ᵃᵈʲ(δ, ρₘₐₓ) ≤ ε_T (per §1.6 joint-satisfiability discipline); premise-incompatible deployments are filtered at pre-registration before Theorem 1 application.&lt;/p&gt;

&lt;p&gt;Then the holding-field property predicate mathcal{P}_(HF) is ε_T-admissibly detectable in the sense of §1.6:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;0 &amp;amp;lt; I(mathbf{1}[mathcal{P}_(HF)]; S_(HF)^*) ≤ I(H_(0:T); S_(HF)^*) ≤ ε_T.&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The lower bound is supplied directly by BDP-(iii)'s &lt;strong&gt;direct property-channel MI lower bound&lt;/strong&gt; ι&lt;em&gt;(HF)(δ) &amp;gt; 0, taken over the joint two-population × replication ensemble (§1.6). The upper bound is supplied by NR-window-(ii) plus the data-processing inequality applied to mathbf{1}[mathcal{P}&lt;/em&gt;(HF)] = f_(HF)(H_(0:T)) and S_(HF)^* = A_(mathcal{C)}(Y_(0:T); ·) — i.e., the &lt;strong&gt;Case-A internal-trajectory chain&lt;/strong&gt; of §1.6 applies because HF-property predicates are functions of the protected H(·) trajectory. The lower bound depends on the violation margin δ (larger violations are more detectable per ι&lt;em&gt;(HF)'s monotonicity) and on the calibration residual ρₘₐₓ (per §4.7's MI/JS-preservation: calibration-valid operators preserve ι&lt;/em&gt;(HF) up to declared bound; calibration-invalid operators may destroy it).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Proof (Conditional Derivation).&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Step 1 (Lower bound from BDP).&lt;/em&gt; By assumption (iii), BDP supplies the &lt;strong&gt;direct property-channel MI lower bound&lt;/strong&gt; of §1.6: I(mathbf{1}[mathcal{P}&lt;em&gt;(HF)]; S&lt;/em&gt;(HF)^*) ≥ ι&lt;em&gt;(HF)(δ) &amp;gt; 0 for all δ &amp;gt; δₘᵢₙ, evaluated over the joint two-population × replication ensemble. No KL→MI conversion is required — BDP commits to the property-channel mutual information directly (equivalently, to the π&lt;/em&gt;(HF)-weighted Jensen–Shannon separation J_(π&lt;em&gt;{HF)}(·s) ≥ ι&lt;/em&gt;(HF)(δ)). If the deployment declares BDP via the one-sided KL route of §1.6, the regularity conditions there must first establish the equivalent direct-MI / JS lower bound; absent those regularity conditions, one-sided KL is not admissible.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Step 2 (Predicate-to-state DPI — middle inequality of the chain).&lt;/em&gt; By §1.6's augmented evaluation object, mathbf{1}[mathcal{P}&lt;em&gt;(HF)] = f&lt;/em&gt;(HF)(H_(0:T); Θᵈᵉᶜˡ&lt;em&gt;(HF)); under premise (v) (Θᵈᵉᶜˡ&lt;/em&gt;(HF) fixed across mathcal{E}), this reduces to mathbf{1}[mathcal{P}&lt;em&gt;(HF)] = f&lt;/em&gt;(HF)(H_(0:T)) as a deterministic function of H_(0:T) alone. The variables therefore form a Markov chain mathbf{1}[mathcal{P}&lt;em&gt;(HF)] → H&lt;/em&gt;(0:T) → S_(HF)^* (conditioning on H_(0:T) makes mathbf{1}[mathcal{P}&lt;em&gt;(HF)] deterministic, hence conditionally independent of S&lt;/em&gt;(HF)^* given H_(0:T)). By the data-processing inequality applied along this Markov chain:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;I(mathbf{1}[mathcal{P}_(HF)]; S_(HF)^*) ≤ I(H_(0:T); S_(HF)^*).&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;This is the &lt;em&gt;predicate-to-state DPI step&lt;/em&gt; (middle inequality of the admissible detection chain), distinct from the &lt;em&gt;state-to-emission DPI step&lt;/em&gt; of Step 3 below.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Step 3 (State-to-emission DPI through A_(mathcal{C)}).&lt;/em&gt; The statistic S_(HF)^* is by construction a function of Y_(0:T) (with nuisance parameter η&lt;em&gt;(mathcal{C)} that depends only on declared confound profile mathcal{C}, not on internal trajectory H&lt;/em&gt;(0:T)). By the data-processing inequality applied to the Markov chain H_(0:T) → Y_(0:T) → S_(HF)^*:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;I(H_(0:T); S_(HF)^*) ≤ I(H_(0:T); Y_(0:T)).&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;em&gt;Step 4 (NR-window).&lt;/em&gt; By assumption (ii), I(H_(0:T); Y_(0:T)) ≤ ε_T.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Step 5 (Calibration validity).&lt;/em&gt; By assumption (iv), A_(mathcal{C)} adjusts for confounds without removing property-channel information beyond the registered tolerance ρₘₐₓ. The direct MI lower bound of (iii) is evaluated on S_(HF)^* — i.e., post-adjustment — so calibration validity (per §4.7's MI/JS-preservation commitment) preserves the lower bound of Step 1.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Conclusion.&lt;/em&gt; Chaining Steps 1–5: 0 &amp;lt; I(mathbf{1}[mathcal{P}&lt;em&gt;(HF)]; S&lt;/em&gt;(HF)^&lt;em&gt;) ≤ I(H_(0:T); S_(HF)^&lt;/em&gt;) ≤ I(H_(0:T); Y_(0:T)) ≤ ε_T. This is the admissible detection chain of §1.6 for property class HF, with each of the three conceptual groupings established by a distinct step or step-pair: Step 1 + 5 establish leftmost positivity; Step 2 establishes the middle predicate-to-state DPI inequality; Step 3 + 4 jointly establish the state-leakage upper bound (state-to-emission DPI composed with the NR-window). square&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Remark on ι_(HF)(δ).&lt;/strong&gt; The substrate-relative direct MI / JS-separation margin ι&lt;em&gt;(HF)(δ) is named in BDP (iii) as architecturally specifiable rather than analytically derived in closed form. Its specific functional form is substrate-dependent (token-emission for language models, motor-emission for control, etc.). The Bridge commits only to &lt;em&gt;existence&lt;/em&gt; of ι&lt;/em&gt;(HF) with ι&lt;em&gt;(HF)(δ) &amp;gt; 0 for δ &amp;gt; δₘᵢₙ; substrate-specific derivations of ι&lt;/em&gt;(HF) are owed in companion papers per §7 Continuing Programme. Where empirical execution of an F-HF protocol fails to detect a violation despite δ &amp;gt; δₘᵢₙ, the failure either (a) refutes the deployment's claim that the violation occurred, (b) refutes BDP for that property class on that substrate, or (c) refutes calibration validity per §4.7 — all of which are deployment-level falsification events under the pre-registration discipline.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Remark on HF-MON wording.&lt;/strong&gt; Theorem 1 covers HF-MON violations under the specific condition that the emission's diversity trajectory fails to satisfy the declared monotone-non-increasing tolerance band — not the looser "stable or expanding diversity" reading, which can occur within the declared band under noise. The strict slope condition is part of the deployment's pre-registration declaration; deviations below the band are detection events, deviations within the band are not.&lt;/p&gt;

&lt;h3&gt;
  
  
  3.2 Theorem 2 — Threshold-Straddling Admissibility of the Emission-Derived Chaos Estimator (under BDP for χ-REL)
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Theorem 2 (Threshold-Straddling Admissibility of the Emission-Derived Chaos Estimator; χ-REL Admissibility under Paired-Ensemble Design).&lt;/strong&gt; Assume:&lt;/p&gt;

&lt;p&gt;(i) the pre-registered test ensemble mathcal{E} of §1.6, specialised to a &lt;strong&gt;paired sampling frame&lt;/strong&gt; over deployment pairs (Σ₁, Σ₂): a mixture of (a) &lt;strong&gt;straddling pairs&lt;/strong&gt; with declared distinct K₁, K₂ such that one pair-member satisfies mathrm{complexity}ₒₚ(R) &amp;gt; Kᵢ(τᵣₑₘ) while the other does not, and (b) &lt;strong&gt;matched-K pairs&lt;/strong&gt; with K₁ = K₂ (control population), with μₒₚ and Λ held fixed across each pair and mathrm{slope}ₒₚ(Λ  over  R) &amp;lt; θₛₗₒₚₑ for both pair-members; the &lt;strong&gt;non-degenerate prior&lt;/strong&gt; π&lt;em&gt;(TS) = P&lt;/em&gt;(mathcal{E)}[mathbf{1}[straddling] = 1] ∈ (πₘᵢₙ, 1 - πₘᵢₙ) on the straddling indicator (declared at pre-registration; "straddling" is exogenous deployment-pair metadata determined by the declared (K₁, K₂) configuration, not a function of internal trajectory);&lt;br&gt;
(ii) a &lt;strong&gt;joint pair NR-window condition&lt;/strong&gt; I(H_(1,0:T) oplus H_(2,0:T); Y_(1,0:T) oplus Y_(2,0:T)) ≤ ε&lt;em&gt;Tᵖᵃⁱʳ. (Note: per-deployment NR-window bounds I(H&lt;/em&gt;(i,0:T); Y_(i,0:T)) ≤ ε&lt;em&gt;T do not in general compose to ε_Tᵖᵃⁱʳ = 2ε_T — pair-channel coupling can produce joint leakage exceeding the sum. The composition ε_Tᵖᵃⁱʳ = ε_T^((1)) + ε_T^((2)) is admissible only under a declared pair-independence assumption on the joint emission channel; otherwise ε_Tᵖᵃⁱʳ must be declared directly at deployment-pair pre-registration.)&lt;br&gt;
(iii) the Bridge Detectability Premise for χ-REL (Case-B design-metadata predicate per §1.6, since "straddling" is exogenous deployment-pair design metadata determined by declared (K₁, K₂), not a function of internal trajectory) — i.e., there exists a pre-registered chaos-predicate &lt;strong&gt;estimator&lt;/strong&gt; hatχₒₚ^((i)) = g&lt;/em&gt;χ(S_(TS)^((i)&lt;em&gt;)) derived from a nuisance-adjusted threshold-straddling statistic S_(TS)^((i)&lt;/em&gt;) = A_(mathcal{C)}(Y_(i,0:T); η&lt;em&gt;(mathcal{C)}), such that the pair-difference statistic has &lt;strong&gt;direct MI lower bound&lt;/strong&gt; under the paired ensemble: I(mathbf{1}[straddling]; hatχ^((1)) - hatχ^((2))) ≥ ι&lt;/em&gt;χ &amp;gt; 0;&lt;br&gt;
(iv) calibration-valid nuisance adjustment per §4.7 (operator-class-specific MI/JS-preservation per the deployment's pre-registration).&lt;/p&gt;

&lt;p&gt;Then the &lt;strong&gt;emission-derived χ-REL estimator pair-difference is admissible&lt;/strong&gt; as a bounded-leakage property-channel statistic for the threshold-straddling design (the internal χₒₚ predicate is not identified directly — see &lt;em&gt;Note on observability of χₒₚ&lt;/em&gt; below), with the &lt;strong&gt;Case-B (design-metadata predicate) two-constraint form&lt;/strong&gt; of §1.6:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Property-channel detection (direct MI lower bound):&lt;/em&gt; By BDP-(iii),&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;I(mathbf{1}[straddling]; hatχ^((1)) - hatχ^((2))) ≥ ι_χ &amp;amp;gt; 0.&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;em&gt;State-leakage bound (separate constraint via joint pair NR-window):&lt;/em&gt; By DPI applied to hatχ^((1)) - hatχ^((2)) as a function of Y_(1,0:T) oplus Y_(2,0:T), and by joint pair NR-window-(ii),&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;I(H_(1,0:T) oplus H_(2,0:T); hatχ^((1)) - hatχ^((2))) ≤ I(H_(1,0:T) oplus H_(2,0:T); Y_(1,0:T) oplus Y_(2,0:T)) ≤ ε_Tᵖᵃⁱʳ.&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The two bounds are &lt;strong&gt;separate constraints on different objects&lt;/strong&gt; — "straddling" is exogenous design metadata, H₁ oplus H₂ is joint internal trajectory; no DPI chain links them. Under pair-independence, ε_Tᵖᵃⁱʳ = 2ε_T; otherwise ε_Tᵖᵃⁱʳ is declared directly.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Note on observability of χₒₚ.&lt;/strong&gt; The internal chaos predicate χₒₚ(R) of ONTOΣ XI §4.3 is, by HF-NR, not directly observed in emission. Theorem 2 operates on a pre-registered &lt;strong&gt;estimator&lt;/strong&gt; hatχₒₚ derived from a property-channel statistic on Yₜ — the estimator is a function of emission, not a direct readout of internal state. χ-REL identifiability is identifiability of the estimator's pair-difference, conditional on the threshold-straddling design.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Proof (Conditional Derivation).&lt;/strong&gt; Under the paired ensemble of (i), mathbf{1}[straddling] is a non-degenerate random variable over mathcal{E} with prior π&lt;em&gt;(TS) ∈ (πₘᵢₙ, 1 - πₘᵢₙ) by construction. By BDP-(iii)'s direct MI form: I(mathbf{1}[straddling]; hatχ^((1)) - hatχ^((2))) ≥ ι&lt;/em&gt;χ &amp;gt; 0. Separately, by DPI applied to the pair-difference as a function of Y_(1,0:T) oplus Y_(2,0:T), and by the joint pair NR-window-(ii): I(H_(1,0:T) oplus H_(2,0:T); hatχ^((1)) - hatχ^((2))) ≤ ε&lt;em&gt;Tᵖᵃⁱʳ. The two bounds are independent constraints on different objects (mathbf{1}[straddling] is design-metadata; H&lt;/em&gt;(1,0:T) oplus H_(2,0:T) is internal trajectory); no chaining is claimed between them. square&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Remark.&lt;/strong&gt; Theorem 2 is the formal bridge for the F-χ falsifier protocol of ONTOΣ XI §4.5, specifying that the &lt;strong&gt;emission-derived χ-REL estimator pair-difference&lt;/strong&gt; is admissible as a bounded-leakage property-channel statistic under the threshold-straddling design. The protocol is meaningful as a falsifier precisely because the theorem establishes that the observable pair-difference, if non-null beyond calibration-residual baseline, &lt;strong&gt;supports the pre-registered χ-REL estimator contrast under the threshold-straddling design&lt;/strong&gt; — it does not identify the internal χₒₚ relational structure directly (see &lt;em&gt;Note on observability of χₒₚ&lt;/em&gt; above).&lt;/p&gt;

&lt;h3&gt;
  
  
  3.3 Theorem 3 — Gauge-Conditional Admissibility of Load-Field Slope Detection (under BDP for Λ-CHARGE + KAC-BASE)
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Theorem 3 (Gauge-Conditional Orientation-Bias Detection under BDP).&lt;/strong&gt; Assume:&lt;/p&gt;

&lt;p&gt;(i) the pre-registered test ensemble mathcal{E} of §1.6, with the &lt;strong&gt;stratum-conditional non-degenerate prior&lt;/strong&gt; condition πₛₗₒₚₑ(g) = P_(mathcal{E)}[mathbf{1}[mathcal{P}ₛₗₒₚₑⁱⁿᵗ] = 1 | G = g] ∈ (πₘᵢₙ, 1 - πₘᵢₙ) within each declared gauge stratum g (not merely the marginal non-degeneracy: a stratum containing only violators or only conformants would drive the stratum-conditional MI to zero regardless of BDP's ιₛₗₒₚₑ(δ, g) commitment);&lt;br&gt;
(ii) the &lt;strong&gt;gauge-stratum NR-window condition&lt;/strong&gt; I(H_(0:T); Y_(0:T) | G = g) ≤ ε&lt;em&gt;T(g) within each declared gauge stratum g (declared at pre-registration). The action-selection apparatus is treated as a fixed pre-registered architectural mechanism (component of Θᵈᵉᶜˡₛₗₒₚₑ, per premise (vi) below), not as a separate protected trajectory; orientation-following is therefore a function of H&lt;/em&gt;(0:T) given the fixed apparatus — keeping NR-window's scope to the operator's holding-field trajectory without extension. &lt;strong&gt;Protected-trace completeness clause (domain-exclusion).&lt;/strong&gt; Theorem 3 applies only when the deployment declares the orientation-following predicate to be well-defined as a function of Zˢˡᵒᵖᵉ&lt;em&gt;(0:T) = (H&lt;/em&gt;(0:T), Θᵈᵉᶜˡₛₗₒₚₑ). If action-selection depends on additional protected internal variables not included in H_(0:T) or fixed Θᵈᵉᶜˡₛₗₒₚₑ — including (but not limited to) policy state, regime-switching memory, random-seed traces, or any further internal trace beyond the holding-field — the deployment must enlarge the protected trajectory to H^(prot,slope)&lt;em&gt;(0:T) to include those variables and declare the corresponding wider gauge-stratum NR-window. Otherwise the deployment falls outside Theorem 3's Case-A frame and must be handled per §1.6's mixed / Case-B fallback. Note: conditioning on a covariate can &lt;em&gt;increase&lt;/em&gt; MI in general; the stratum-conditional bound must be declared directly per gauge, not derived from the unconditional bound;&lt;br&gt;
(iii) the Bridge Detectability Premise for Λ-CHARGE + KAC-BASE — i.e., a pre-registered orientation-following statistic Sₛₗₒₚₑ and nuisance-adjustment operator A&lt;/em&gt;(mathcal{C)} such that Sₛₗₒₚₑ^* = A_(mathcal{C)}(Y_(0:T); η_(mathcal{C)}, gauge) achieves direct MI lower bound I(mathbf{1}[mathcal{P}ₛₗₒₚₑⁱⁿᵗ]; Sₛₗₒₚₑ^* | G = g) ≥ ιₛₗₒₚₑ(δ, g) &amp;gt; 0 between operator action-selection regimes (orientation-following vs not) &lt;strong&gt;within each gauge stratum&lt;/strong&gt;;&lt;br&gt;
(iv) calibration-valid nuisance adjustment per §4.7 (operator-class-specific MI/JS-preservation);&lt;br&gt;
(v) the operator-reference normalisation gauge of IIC v2.1 §2.3 is declared, fixing the scale of cₒₚ and θₛₗₒₚₑ;&lt;br&gt;
(vi) the declared structural context Θᵈᵉᶜˡₛₗₒₚₑ ⊃eq {cₒₚ, θₛₗₒₚₑ, G, action-selection apparatus} is &lt;strong&gt;fixed across the ensemble&lt;/strong&gt; mathcal{E} at pre-registration (per §1.6 augmented evaluation object); deployments with varying Θᵈᵉᶜˡₛₗₒₚₑ across mathcal{E} fall outside Theorem 3's frame and are handled per §1.6's Case-B fallback. The gauge-stratum conditioning | G = g of premise (ii) further fixes G within each stratum; the remaining Θᵈᵉᶜˡₛₗₒₚₑ components (action-selection apparatus, etc.) are fixed by pre-registration at the deployment level;&lt;br&gt;
(vii) the joint-satisfiability compatibility premise ιₛₗₒₚₑᵃᵈʲ(δ, g, ρₘₐₓ) ≤ ε_T(g) within each declared gauge stratum (per §1.6 joint-satisfiability discipline).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Property definition (operator-level, not emission-level).&lt;/strong&gt; The protected predicate is the &lt;strong&gt;internal-architectural&lt;/strong&gt; orientation-following predicate event:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;mathcal{P}ₛₗₒₚₑⁱⁿᵗ := {operator action-selection follows the dominant admissible  nabla cₒₚ  over  H  under KAC-BASE per ONTOΣ XI §6.2}.&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;This is a &lt;strong&gt;predicate event&lt;/strong&gt; (not an indicator) over the operator's action-selection apparatus on the protected trajectory H(·) — a Case-A internal-trajectory predicate per §1.6 — &lt;em&gt;not&lt;/em&gt; of the emission stream itself. The indicator mathbf{1}[mathcal{P}ₛₗₒₚₑⁱⁿᵗ] is the random variable taking value 1 when the event holds and 0 otherwise. The emission-level signature "emission tracks nabla cₒₚ" is what BDP commits as detectable; the predicate it detects is operator-level. This separation avoids tautology: the statistic measures emission-tracking, the property is internal orientation-following, and BDP supplies the bridge.&lt;/p&gt;

&lt;p&gt;Then mathcal{P}ₛₗₒₚₑⁱⁿᵗ is ε&lt;em&gt;T(g)-admissibly &lt;strong&gt;detectable within each gauge stratum&lt;/strong&gt;, with the chain running through H&lt;/em&gt;(0:T) given the fixed Θᵈᵉᶜˡₛₗₒₚₑ (including action-selection apparatus) per the generic §1.6 Case-A chain:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;0 &amp;amp;lt; I(mathbf{1}[mathcal{P}ₛₗₒₚₑⁱⁿᵗ]; Sₛₗₒₚₑ^* | G = g) ≤ I(H_(0:T); Sₛₗₒₚₑ^* | G = g) ≤ ε_T(g).&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Detection vs identification — scope note.&lt;/strong&gt; Theorem 3 establishes gauge-conditional &lt;strong&gt;detection&lt;/strong&gt; of orientation-following bias (whether emission tracks nabla cₒₚ within the declared gauge's reference frame), not gauge-free &lt;strong&gt;identification&lt;/strong&gt; of absolute slope. Absolute slope is gauge-dependent: a deployment-declared rescaling cₒₚ → α cₒₚ accompanied by θₛₗₒₚₑ → α θₛₗₒₚₑ preserves orientation-bias content but changes absolute slope by factor α. Without the declared gauge, the alignment statistic is identifiable only up to such rescaling; with the declared gauge, the orientation is detectable. The theorem commits to the conditional admissibility, not to gauge-free identification of absolute slope.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Proof (Conditional Derivation).&lt;/strong&gt; Within gauge stratum G = g:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Step 1 (Lower bound from BDP).&lt;/em&gt; By BDP-(iii), I(mathbf{1}[mathcal{P}ₛₗₒₚₑⁱⁿᵗ]; Sₛₗₒₚₑ^* | G = g) ≥ ιₛₗₒₚₑ(δ, g) &amp;gt; 0.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Step 2 (Predicate-to-state DPI — middle inequality).&lt;/em&gt; Since mathbf{1}[mathcal{P}ₛₗₒₚₑⁱⁿᵗ] is a deterministic function of (H_(0:T), Θᵈᵉᶜˡₛₗₒₚₑ) per §1.6's augmented evaluation object, and Θᵈᵉᶜˡₛₗₒₚₑ is fixed across mathcal{E} by premise (vi) (gauge-stratum conditioning fixes G; the remaining components of Θᵈᵉᶜˡₛₗₒₚₑ — action-selection apparatus, cₒₚ, θₛₗₒₚₑ — are fixed at deployment-level pre-registration), mathbf{1}[mathcal{P}ₛₗₒₚₑⁱⁿᵗ] is effectively a deterministic function of H_(0:T) within each gauge stratum. The Markov chain mathbf{1}[mathcal{P}ₛₗₒₚₑⁱⁿᵗ] → H_(0:T) → Sₛₗₒₚₑ^* holds within each gauge stratum (conditioning on H_(0:T), given the fixed Θᵈᵉᶜˡₛₗₒₚₑ, renders the predicate deterministic and hence conditionally independent of Sₛₗₒₚₑ^* given H_(0:T)). By DPI applied along this Markov chain (stratum-conditional form):&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;I(mathbf{1}[mathcal{P}ₛₗₒₚₑⁱⁿᵗ]; Sₛₗₒₚₑ^* | G = g) ≤ I(H_(0:T); Sₛₗₒₚₑ^* | G = g).&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;em&gt;Step 3 (State-to-emission DPI + gauge-stratum NR-window).&lt;/em&gt; By DPI applied to Sₛₗₒₚₑ^* = A_(mathcal{C)}(Y_(0:T); ·, g) as a function of Y_(0:T) within the stratum, I(H_(0:T); Sₛₗₒₚₑ^* | G = g) ≤ I(H_(0:T); Y_(0:T) | G = g) ≤ ε_T(g) by the declared gauge-stratum NR-window-(ii). Note that the unconditional NR-window bound is &lt;em&gt;not&lt;/em&gt; invoked here; conditioning on G can increase MI for arbitrary covariates, so the bound must be declared per stratum.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Step 4 (Calibration validity).&lt;/em&gt; Calibration validity preserves the lower bound per §4.7's MI/JS-preservation commitment.&lt;/p&gt;

&lt;p&gt;Chaining Steps 1–4 within the gauge stratum gives the admissible detection chain of §1.6 specialised to the stratum-conditional form. square&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Remark.&lt;/strong&gt; Theorem 3 supplies the identifiability bridge for F-Λ (ONTOΣ XI §3.6) in the Λ-CHARGE + KAC-BASE direction. The protocol is valid as a falsifier because the theorem establishes that orientation-bias detection is admissible conditional on the declared gauge. A deployment that produces emission with no detectable alignment with nabla cₒₚ under the gauge has either falsified Λ-CHARGE, falsified KAC-BASE, or falsified BDP-(iii) for that substrate — all exclude the deployment from the operator-internal-extended subclass.&lt;/p&gt;

&lt;h3&gt;
  
  
  3.4 Theorem 4 — Cross-Component Closure-Complementarity Detection Admissibility
&lt;/h3&gt;

&lt;p&gt;&lt;em&gt;Apparatus bridge.&lt;/em&gt; The closure-complementarity test design uses three &lt;strong&gt;property-channel signature classes&lt;/strong&gt; corresponding to the three substrate conditions of ONTOΣ XII §3.2 — these are the intended property-channel signature classes that instantiate the admissible-statistics framework of §2 (Adm-1 property informativeness and Adm-2 NR-ε state-leakage) &lt;em&gt;when the BDP, TD-1..TD-5, NR-window, and calibration-validity premises of Theorem 4 below are satisfied&lt;/em&gt;; satisfaction is established by the theorem's assumption preamble, not asserted standalone here:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;σ^prop_WE&lt;/strong&gt;: cross-component conditional entropy of co-active emissions, normalised against a declared baseline distribution baseline_π — joint Will-Embedding inadmissibility produces systematic conditional-entropy excess.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;σ^prop_IIC&lt;/strong&gt;: phase-relation stability metric of component IIC cycles relative to a declared system-cycle reference — phase desynchronisation produces a spectral signature of cycle decomposition.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;σ^prop_D&lt;/strong&gt;: likelihood-ratio between independent-components and coupled-components emission models — drift isolation produces decomposable load emission.
The complement σ^state(π) is the direct-reconstruction signal, bounded by the window-form NR-window of premise (ii): I(σˢᵗᵃᵗᵉ(π); mathrm{state}(S)) ≤ ε_T (the per-step T87 bound ε of §1.5 is the marginal form; the window-level ε_T is the operational quantity for the theorem).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Theorem 4 (CC Property-Channel Detectability under TD-1..TD-5 + BDP for CC conditions).&lt;/strong&gt; Assume:&lt;/p&gt;

&lt;p&gt;(i) the pre-registered test ensemble mathcal{E} of §1.6, instantiated as the two-population sampling frame of TD-5 below, with &lt;strong&gt;non-degenerate prior&lt;/strong&gt; π&lt;em&gt;X = P&lt;/em&gt;(mathcal{E)}[mathbf{1}[CC-X  violation] = 1] ∈ (πₘᵢₙ, 1 - πₘᵢₙ) on each CC-violation indicator X ∈ {WE, IIC, D};&lt;br&gt;
(ii) the NR-window condition I(H_(S,0:T); Y_(0:T)) ≤ ε&lt;em&gt;T where H&lt;/em&gt;(S,0:T) denotes mathrm{state}(S)'s trajectory on [0,T] — i.e., NR-ε applies to the closure-output system's holding-field per ONTOΣ XI §2.3 commitment. The bound may be declared via the &lt;em&gt;Subsumption case&lt;/em&gt; (inherited via DPI from operator-level NR-window through closure-subsumption commitment per §1.6) or via the &lt;em&gt;Separate-declaration case&lt;/em&gt; (direct pre-registration of ε&lt;em&gt;T for H&lt;/em&gt;(S,0:T)). See §3.5's Preliminary for the case dichotomy;&lt;br&gt;
(iii) the Bridge Detectability Premise (BDP) for each CC condition X ∈ {WE, IIC, D} — i.e., a pre-registered property-channel signature σᵖʳᵒᵖ&lt;em&gt;X(π), drawn from the admissible-statistic class of §2.2 extended with the &lt;strong&gt;model-comparison statistic family&lt;/strong&gt; for likelihood-ratio operators (per the &lt;em&gt;Note on §2.2 admissible-statistic families&lt;/em&gt; at the end of TD-5 in this section), and a nuisance-adjustment operator A&lt;/em&gt;(mathcal{C)} such that the adjusted signature has &lt;strong&gt;direct property-channel MI lower bound&lt;/strong&gt; I(mathbf{1}[CC-X  violation]; σᵖʳᵒᵖ&lt;em&gt;X(π)) ≥ ι_X(δ) &amp;gt; 0 between substantive-CC-violation and conformance distributions over mathcal{E} (per §1.6's BDP form; one-sided KL form admissible only under declared regularity conditions);&lt;br&gt;
(iv) the closure-complementarity-specific test-design discipline TD-1..TD-5 below;&lt;br&gt;
(v) calibration-valid nuisance adjustment per §4.7 (operator-class-specific MI/JS-preservation);&lt;br&gt;
(vi) the deployment passes the &lt;strong&gt;Procedural Admissibility Rule&lt;/strong&gt; of §3.4.1 below — i.e., the deployment is procedurally evaluable per ONTOΣ XII §4.2 (procedurally unevaluable deployments are filtered out before the theorem is applied; see §3.4.1);&lt;br&gt;
(vii) the declared structural context Θᵈᵉᶜˡ&lt;/em&gt;(CC) ⊃eq {U, R, A, mathrm{closure}, component attribution map} is &lt;strong&gt;fixed across the ensemble&lt;/strong&gt; mathcal{E} at pre-registration (per §1.6 augmented evaluation object); deployments with varying Θᵈᵉᶜˡ_(CC) across mathcal{E} fall outside Theorem 4's frame and are handled per §1.6's Case-B fallback;&lt;br&gt;
(viii) the joint-satisfiability compatibility premise ι_Xᵃᵈʲ(δ, ρₘₐₓ) ≤ ε_T for each X ∈ {WE, IIC, D} (per §1.6 joint-satisfiability discipline; ε_T is the closure-system NR-window of premise (ii)).&lt;/p&gt;

&lt;p&gt;Let Σ be such an admissible deployment claiming closure-complementarity-conformance over a declared collection U = {u₁, ldots, uₙ} of UTAM-units, with declared closure operation mathrm{closure}(U, R, A) → S. The Theorem establishes property-channel detection under substantive CC violation; the state-channel bound is supplied directly by premise (ii) and is not a separate theorem result.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Property-channel detection under substantive violation.&lt;/strong&gt; Under BDP-(iii) for the corresponding CC condition, if at least one of CC-WE, CC-IIC, CC-D is &lt;strong&gt;substantively&lt;/strong&gt; violated under the declared closure operation, then the corresponding property-channel signature class registers as informative (the informativeness is supplied by BDP, not derived as an empirical law). CC-violation indicators mathbf{1}[CC-X] are functions of the closure-output system's trajectory H_(S,0:T) (the closure operation declared per ONTOΣ XII §3.2 makes the violation predicate a function of the closure-output state) — i.e., &lt;strong&gt;Case-A internal-trajectory predicates&lt;/strong&gt; in the sense of §1.6, with the protected state being H_(S,0:T) rather than the general operator H_(0:T). The full Case-A admissible detection chain therefore applies:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;0 &amp;amp;lt; I(mathbf{1}[CC-X  violation]; σᵖʳᵒᵖ_X(π)) ≤ I(H_(S,0:T); σᵖʳᵒᵖ_X(π)) ≤ I(H_(S,0:T); Y_(0:T)) ≤ ε_T.&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;em&gt;Left positivity (from BDP-(iii)):&lt;/em&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;I(mathbf{1}[CC-X  violation]; σᵖʳᵒᵖ_X(π)) ≥ ι_X(δ) &amp;amp;gt; 0,&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;for the violated condition X ∈ {WE, IIC, D}, over the joint two-population × replication ensemble of TD-5.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Middle predicate-to-state DPI (Case-A, via augmented object Z^(CC)_(0:T)):&lt;/em&gt; By §1.6's augmented evaluation object, mathbf{1}[CC-X] = f_X(Z^(CC)&lt;em&gt;(0:T)) where Z^(CC)&lt;/em&gt;(0:T) := (H_(S,0:T), Θᵈᵉᶜˡ&lt;em&gt;(CC)) and Θᵈᵉᶜˡ&lt;/em&gt;(CC) ⊃eq {U, R, A, mathrm{closure}, component attribution map, audit declaration}. &lt;strong&gt;Domain-exclusion rule:&lt;/strong&gt; Theorem 4 applies only to deployments whose pre-registration declares CC-status to be well-defined as a function of Z^(CC)&lt;em&gt;(0:T); if two closure-input configurations with identical Z^(CC)&lt;/em&gt;(0:T) can differ in CC-status (i.e., mathbf{1}[CC-X] is not well-defined on Z^(CC)&lt;em&gt;(0:T)), the deployment falls outside Theorem 4's Case-A frame and must be handled either by enlarging Z^(CC)&lt;/em&gt;(0:T) to capture the missing variables, or per §1.6's Case-B fallback. Under premise (vii) (Θᵈᵉᶜˡ&lt;em&gt;(CC) fixed across mathcal{E} at pre-registration) plus the well-definedness clause, mathbf{1}[CC-X] reduces to a deterministic function of H&lt;/em&gt;(S,0:T) alone. The Bridge here invokes the architectural commitment of ONTOΣ XII §3.2 that the closure operation mathrm{closure}(U, R, A) → S together with the fixed admissibility metadata determines the closure-output trajectory H_(S,0:T) — so two closure-input configurations with the same fixed Θᵈᵉᶜˡ&lt;em&gt;(CC) producing the same H&lt;/em&gt;(S,0:T) produce the same CC-violation status (no smuggled metadata into the trajectory). The Markov chain mathbf{1}[CC-X] → Z^(CC)&lt;em&gt;(0:T) → σᵖʳᵒᵖ_X(π) — or equivalently mathbf{1}[CC-X] → H&lt;/em&gt;(S,0:T) → σᵖʳᵒᵖ&lt;em&gt;X(π) under the fixed-Θᵈᵉᶜˡ&lt;/em&gt;(CC) reduction — holds; by DPI:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;I(mathbf{1}[CC-X  violation]; σᵖʳᵒᵖ_X(π)) ≤ I(H_(S,0:T); σᵖʳᵒᵖ_X(π)).&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;em&gt;Right state-to-emission DPI + NR-window-(ii):&lt;/em&gt; Since σᵖʳᵒᵖ&lt;em&gt;X(π) is by construction a function of Y&lt;/em&gt;(0:T), DPI gives I(H_(S,0:T); σᵖʳᵒᵖ&lt;em&gt;X(π)) ≤ I(H&lt;/em&gt;(S,0:T); Y_(0:T)), and the NR-window assumption (ii) bounds the latter by ε_T.&lt;/p&gt;

&lt;p&gt;The state-channel bound I(σˢᵗᵃᵗᵉ(π); mathrm{state}(S)) ≤ ε&lt;em&gt;T is inherited from premise (ii) and is &lt;em&gt;not&lt;/em&gt; a separate theorem result — it is the NR-window assumption restated for σˢᵗᵃᵗᵉ(π) as a function of Y&lt;/em&gt;(0:T).&lt;/p&gt;

&lt;p&gt;The theorem is &lt;strong&gt;architectural-class&lt;/strong&gt;: given BDP, it commits to admissible bounded-leakage handling of the strict-positivity claim of property-channel mutual information under substantive CC violation (the strict positivity itself is supplied by BDP, not derived as an architectural law); the theorem does &lt;strong&gt;not&lt;/strong&gt; commit to closed-form quantitative detectability bounds (substrate-specific ι_X(δ) functions are owed per §6.2).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Test-design discipline for Theorem 4 (TD-1..TD-5).&lt;/strong&gt; The property-channel detection commitment of the theorem statement above holds &lt;em&gt;under five pre-registered constraints&lt;/em&gt; — closure-complementarity-specific &lt;strong&gt;test-design&lt;/strong&gt; discipline distinct from (and complementary to) the nuisance-adjustment discipline of §4 (which targets the four interface confounds mathcal{C}₁..mathcal{C}₄ via nuisance-adjustment operators A_(mathcal{C)}; scalar discount functions are one admissible operator class). These five clauses target the ensemble structure of property-channel detection itself:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;(TD-1) Baseline pre-registration.&lt;/strong&gt; A reference deployment of known closure-complementarity-conformance, in the same substrate and under the same instrumentation, must be pre-registered; its emission distribution under π — denoted baseline_(π) — supplies the reference for property-channel statistics. Detection is evaluated against baseline_(π), not in absolute terms.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;(TD-2) Substrate-noise model.&lt;/strong&gt; A declared substrate-specific noise model — the distribution of cross-component emission correlations expected under conformance, attributable to substrate physics rather than CC structure — must be pre-registered. Property-channel signatures are evaluated &lt;em&gt;in excess of&lt;/em&gt; substrate-noise.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;(TD-3) Stationarity windows.&lt;/strong&gt; Emission statistics are evaluated within stationarity windows declared per substrate. Window boundaries cannot be adjusted post-hoc.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;(TD-4) Multiple-comparison correction.&lt;/strong&gt; When all three property-channel signature classes are tested simultaneously, multiple-comparison correction — declared in advance — is applied to the family-wise threshold.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;(TD-5) Replication ensemble and two-population sampling frame.&lt;/strong&gt; Detection requires N ≥ declared-threshold independent replications under independent instantiations of the deployment, together with a pre-registered &lt;strong&gt;two-population sampling frame&lt;/strong&gt;: a target population of candidate deployments under test (some of which may substantively violate one or more CC conditions) and a paired baseline population of known-conformant deployments. The property-channel mutual information of BDP-(iii) and the theorem chain is well-defined under the joint probability measure P_(TD) over (a) the two-population draw of deployments, and (b) the replication ensemble of TD-5: both mathbf{1}&lt;a href="https://dev.toa%20random%20variable%20over%20the%20two-population%20frame"&gt;CC-X  violation&lt;/a&gt; and σᵖʳᵒᵖ&lt;em&gt;X(π) (a random variable over both the two-population frame and the replication ensemble) acquire their stochastic structure from P&lt;/em&gt;(TD). Single-instance signatures and single-population framing do not count as detection — the indicator mathbf{1}[·] is constant within a fixed deployment, so I(σᵖʳᵒᵖ_X(π); mathbf{1}[CC-X]) &amp;gt; 0 requires mathbf{1}[·] to vary across the ensemble.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The five clauses are structurally orthogonal, each closing a specific gaming attack vector: TD-1 against absolute-threshold ambiguity; TD-2 against attribution-to-noise misclassification; TD-3 against window-shopping; TD-4 against family-wise false-positive inflation; TD-5 against single-realisation artifact (and supplying the ensemble under which the property-channel chain is meaningful). Procedural unevaluability of the discipline itself — failure to pre-register baseline_(π), substrate-noise model, stationarity windows, multiple-comparison correction, or replication count — excludes the deployment from admissible-test status per ONTOΣ XII §4.2 discipline. &lt;strong&gt;Note on §2.2 admissible-statistic families.&lt;/strong&gt; σ^prop_{WE} (cross-component conditional entropy) and σ^prop_{IIC} (phase-stability spectral metric) belong to the Correlational and Variance/Trajectory families respectively. σ^prop_D (likelihood-ratio between independent-components and coupled-components emission models) extends §2.2 with a &lt;strong&gt;model-comparison statistic family&lt;/strong&gt;, which §3 admits implicitly via Adm-1 (property informativeness) and Adm-2 (NR-ε on state) — both hold by construction for likelihood-ratio statistics on emission distributions.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Proof (Conditional Derivation).&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;State-channel inheritance (not a separate theorem result).&lt;/em&gt; The signal σˢᵗᵃᵗᵉ(π) is by construction a function of Y_(0:T); by DPI and the NR-window premise, I(σˢᵗᵃᵗᵉ(π); mathrm{state}(S)) ≤ I(H_(S,0:T); Y_(0:T)) ≤ ε_T. This is the NR-window premise restated for σˢᵗᵃᵗᵉ, not a separate proof obligation.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Left positivity of the Case-A chain (property-channel via BDP-(iii)).&lt;/em&gt; Established class-by-class:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;σᵖʳᵒᵖ&lt;em&gt;(WE). If CC-WE fails substantively, the conjunction bigwedgeᵢ C_A(uᵢ) is unsatisfiable under v2.1 admissibility at the system layer (ONTOΣ XII §3.5 Case 1). Components attempting to co-realise jointly inadmissible constraints emit sequences whose cross-component conditional entropy deviates systematically from baseline&lt;/em&gt;(π) — by the structural fact that no consistent joint state exists, so co-active emissions cannot stabilise into the reference distribution. By BDP-(iii)'s direct MI lower bound, I(σᵖʳᵒᵖ&lt;em&gt;(WE); mathbf{1}[CC-WE violation]) ≥ ι&lt;/em&gt;(WE)(δ) &amp;gt; 0 strictly, under TD-1 / TD-2 baseline framing.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;σᵖʳᵒᵖ&lt;em&gt;(IIC). CC-IIC failure produces destructive interference of component IIC cycles' phase relations under the closure (ONTOΣ XII §3.5 Case 2). Spectral analysis of cross-component emission yields a phase-stability metric whose distribution differs from baseline&lt;/em&gt;(π) under CC-IIC violation. By BDP-(iii)'s direct MI lower bound, I(σᵖʳᵒᵖ&lt;em&gt;(IIC); mathbf{1}[CC-IIC violation]) ≥ ι&lt;/em&gt;(IIC)(δ) &amp;gt; 0 strictly.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;σᵖʳᵒᵖ&lt;em&gt;(D). CC-D failure entails that Λ_S decomposes into a sum of independent component-load fields (ONTOΣ XII §3.5 Case 3 and §3.4 failure-mode taxonomy). The likelihood ratio between independent-components and coupled-components emission models is the property-channel observable that registers this decomposability. Under CC-D failure, the independent-components model fits strictly better under the pre-registered π for which the BDP margin is declared (TD-1..TD-5 supply the test-design discipline; the substantive better-fit claim is conditional on the declared π, not universal across all admissible π); under conformance, the coupled-components model fits strictly better. By BDP-(iii)'s direct MI lower bound, I(σᵖʳᵒᵖ&lt;/em&gt;(D); mathbf{1}[CC-D violation]) ≥ ι_D(δ) &amp;gt; 0 strictly.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Predicate-to-state DPI (middle inequality of the Case-A chain).&lt;/strong&gt; For each CC condition X ∈ {WE, IIC, D}, the violation indicator mathbf{1}[CC-X] is a deterministic function of the closure-output system's trajectory H_(S,0:T) (via the closure operation mathrm{closure}(U, R, A) → S of ONTOΣ XII §3.2). The Markov chain mathbf{1}[CC-X] → H_(S,0:T) → σᵖʳᵒᵖ&lt;em&gt;X(π) therefore holds (conditioning on H&lt;/em&gt;(S,0:T) renders mathbf{1}[CC-X] deterministic and hence conditionally independent of σᵖʳᵒᵖ_X(π)); by DPI,&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;I(mathbf{1}[CC-X]; σᵖʳᵒᵖ_X(π)) ≤ I(H_(S,0:T); σᵖʳᵒᵖ_X(π)).&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;This is the middle (predicate-to-state) DPI step of the Case-A admissible detection chain.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;State-leakage of property-channel signatures via DPI (right inequality of the Case-A chain).&lt;/strong&gt; Each σᵖʳᵒᵖ&lt;em&gt;X(π) is by construction a function of Y&lt;/em&gt;(0:T) (with nuisance parameter η&lt;em&gt;(mathcal{C)} that depends only on declared confound profile mathcal{C}, not on H&lt;/em&gt;(S,0:T)). By data-processing inequality, I(H_(S,0:T); σᵖʳᵒᵖ&lt;em&gt;X(π)) ≤ I(H&lt;/em&gt;(S,0:T); Y_(0:T)) ≤ ε_T. The Bridge does not claim that property-channel signatures are "orthogonal" to state — they are functions of emission and inherit the NR-window bound by DPI; orthogonality is not assumed. square&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Depends on.&lt;/strong&gt; T87 (NR-ε leakage bound); Axioms 67–69 (operator-temporal subclass); Λ-ACC; HF-DYN; UTAM Three Laws; ONTOΣ XI Lemma XI.0 and NR-ε apparatus; ONTOΣ XII §3.2 (CC primitive), §3.4 (failure-mode taxonomy), §3.5 (toy model cases), §4.2 (auditability clauses), §6 (F-CC); IIC v2.1 §2.3 operator-reference normalisation discipline.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Remark on substrates without component-level attribution.&lt;/strong&gt; Theorem 4 directly addresses substrates where emission is attributable to specific components (cross-component covariance is well-defined). Substrates where emission is purely system-level — components' contributions inseparably blended in the output — admit a weaker detectability through composite statistics (Theorem 5 below). Substrate-specific identifiability bridges for biological, perceptual, semantic, and geometric prototype substrates of ONTOΣ XII §5 are deployment-side specialisations of the present apparatus; the architectural-class register of this theorem operates without prescribing them.&lt;/p&gt;

&lt;h3&gt;
  
  
  3.4.1 Procedural Admissibility Rule (governance/audit, not detection)
&lt;/h3&gt;

&lt;p&gt;Theorem 4 above commits to property-channel detection of &lt;em&gt;substantive&lt;/em&gt; CC violations under the stated BDP + TD-1..TD-5 + calibration premises. It does not commit to a property-channel detection claim for &lt;strong&gt;procedurally unevaluable&lt;/strong&gt; deployments. Procedural unevaluability is a separate failure mode, handled at the &lt;strong&gt;admissibility level&lt;/strong&gt; of the test, not at the property-detection level of the theorem.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Procedural Admissibility Rule.&lt;/strong&gt; A deployment Σ is &lt;strong&gt;admissible to Theorem 4's property-detection test&lt;/strong&gt; only if it passes the auditability discipline of ONTOΣ XII §4.2:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;the W → C_A induction map (Will Embeddings to admissibility constraints) is pinned to a stable conjunction, declared a priori;&lt;/li&gt;
&lt;li&gt;the R-coverage (resource scope) is specified and not subject to post-hoc narrowing;&lt;/li&gt;
&lt;li&gt;terminal-or-shielded labels are justified by independent declaration, not by inspection of the test outcome.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Deployments that fail any of these clauses are &lt;strong&gt;procedurally unevaluable&lt;/strong&gt; and are filtered out of the admissibility-pass set &lt;em&gt;before&lt;/em&gt; the property-detection test of Theorem 4 is applied. The filtering is normative subclass-eligibility, not an empirical positive σ^prop signal: the Bridge does not claim that procedurally unevaluable deployments produce property-channel signatures structurally identical to substantively-violating ones — it claims only that such deployments are not admitted to the test, and are excluded from the operator-internal-extended subclass per ONTOΣ XII §4.2's governance-level discipline.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Implications for F-Ident-4 (§5.4).&lt;/strong&gt; Falsification of Theorem 4 by null property-channel signature is evaluated &lt;em&gt;only on admissible deployments&lt;/em&gt;. A null on a procedurally-unevaluable deployment is neither a falsification of Theorem 4 nor an instance of "procedural-failure detection"; it is a &lt;em&gt;non-event&lt;/em&gt; at the property-detection layer — the deployment was excluded before the test ran. F-Ident-4's falsification clause (§5.4) accordingly evaluates only deployments that have passed the Procedural Admissibility Rule above.&lt;/p&gt;

&lt;p&gt;This separation closes the conflation flagged in prior versions of this work, where procedural unevaluability was framed as a positive part of Theorem 4's detection commitment. Detection is a property-channel claim about substantive violation under admissibility; procedural unevaluability is an admissibility-level filter that operates upstream of the property-channel claim.&lt;/p&gt;

&lt;h3&gt;
  
  
  3.5 Theorem 5 — Vector-Protocol Suite Detectability (under BDP for each component property)
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Preliminary: Two cases for the CC component's protected trajectory.&lt;/strong&gt; Theorem 5 includes a CC component (k=CC) whose protected internal trajectory under §3.4 is H_(S,0:T) (the closure-output system's trajectory) rather than the general operator H_(0:T). Two cases handle this:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;&lt;em&gt;Subsumption case&lt;/em&gt;&lt;/strong&gt; — the deployment asserts the &lt;strong&gt;closure-subsumption commitment&lt;/strong&gt; of §1.6: H_(S,0:T) is a function of H_(0:T) through mathrm{closure}(U, R, A) → S (per ONTOΣ XII §3.2). Under this case, the operator-level NR-window I(H_(0:T); Y_(0:T)) ≤ ε&lt;em&gt;T propagates by DPI to I(H&lt;/em&gt;(S,0:T); Y_(0:T)) ≤ ε&lt;em&gt;T, and the CC component is absorbed into the unified Hᵖʳᵒᵗ&lt;/em&gt;(0:T) = H_(0:T) chain.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;em&gt;Separate-declaration case&lt;/em&gt;&lt;/strong&gt; — the deployment declines the closure-subsumption commitment; H_(S,0:T) is declared as a state separate from H_(0:T) with its own NR-window I(H_(S,0:T); Y_(0:T)) ≤ ε_T^(CC) at pre-registration.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These two cases are the operational instantiation of §1.6's NR-window dichotomy, used in T5 premise (ii) and proof below. (NB: §1.6 introduces this dichotomy as "closure-subsumption commitment / deployments declining it"; the labels above are the §3.5-local naming of the same dichotomy.)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Theorem 5 (Vector-Protocol Suite Detectability).&lt;/strong&gt; &lt;strong&gt;Note on framing.&lt;/strong&gt; Theorem 5 is a &lt;strong&gt;vector-protocol suite&lt;/strong&gt; theorem, not a single joint-vector theorem: each component k (HF, χ, Λ, CC, Coh) lives in its own pre-registered ensemble per its component theorem (T1 HF ensemble; T2 paired threshold-straddling design; T3 gauge-stratified ensemble; T4 TD-1..TD-5 closure-complementarity ensemble; Coh inherited IIC v2.1 falsification surface). T5 establishes componentwise detectability over the &lt;strong&gt;protocol suite&lt;/strong&gt; of these heterogeneous designs; the joint vector statistic mathbf{S}^* is meaningful only if the deployment &lt;strong&gt;declares a product/joint ensemble&lt;/strong&gt; combining the component ensembles explicitly. Otherwise, T5 is read as a componentwise framework with separate registered ensembles per component, not a single joint claim. Assume:&lt;/p&gt;

&lt;p&gt;(i) the &lt;strong&gt;per-component pre-registered test ensembles&lt;/strong&gt; mathcal{E}ₖ for each component k ∈ {HF, χ, Λ, CC, mathrm{Coh}} (per the protocol-suite framing above: mathcal{E}&lt;em&gt;(HF) from T1; mathcal{E}&lt;/em&gt;χ paired threshold-straddling from T2; mathcal{E}&lt;em&gt;Λ gauge-stratified from T3; mathcal{E}&lt;/em&gt;(CC) TD-1..TD-5 from T4; mathcal{E}&lt;em&gt;(Coh) from IIC v2.1 coherence falsification surface), with per-component non-degenerate priors πₖ = P&lt;/em&gt;(mathcal{E)ₖ}[mathbf{1}[mathcal{P}ₖ] = 1] ∈ (π&lt;em&gt;(min,k), 1 - π&lt;/em&gt;(min,k)). If the deployment additionally declares a product/joint ensemble mathcal{E}ʲᵒⁱⁿᵗ combining the component ensembles explicitly, the vector notation mathbf{P}, mathbf{S}^* below is evaluated over mathcal{E}ʲᵒⁱⁿᵗ; otherwise T5 is read strictly componentwise without claims requiring joint distributions;&lt;br&gt;
(ii) &lt;strong&gt;either&lt;/strong&gt; (a) per-component &lt;strong&gt;conditional sequential leakage budgets&lt;/strong&gt; under a &lt;strong&gt;pre-registered component ordering&lt;/strong&gt; k = 1, ldots, n — I(Hᵖʳᵒᵗ&lt;em&gt;(0:T); Sₖ^* | S₁^&lt;em&gt;, ldots, Sₖ₋₁^&lt;/em&gt;) ≤ ε&lt;/em&gt;(T,k) — that compose by chain rule to bound the joint leakage (the ordering is declared at pre-registration; the conditional budgets are order-dependent and cannot be re-shuffled post-hoc), &lt;strong&gt;or&lt;/strong&gt; (b) a &lt;strong&gt;single joint NR-window bound&lt;/strong&gt; I(Hᵖʳᵒᵗ&lt;em&gt;(0:T); Y&lt;/em&gt;(0:T)) ≤ ε&lt;em&gt;Tʲᵒⁱⁿᵗ — the deployment declares which composition discipline applies at pre-registration. Marginal (non-conditional) per-component bounds I(Hᵖʳᵒᵗ&lt;/em&gt;(0:T); Sₖ^&lt;em&gt;) ≤ ε_(T,k) do **not&lt;/em&gt;* compose by simple summation (MI subadditivity fails — see proof's &lt;em&gt;Note: simple subadditivity&lt;/em&gt;); only the conditional-sequential form (ii.a) composes by chain rule, or the joint form (ii.b) bounds directly. &lt;strong&gt;Additional clause for CC under separate-declaration&lt;/strong&gt;: under the &lt;em&gt;Separate-declaration case&lt;/em&gt; of the Preliminary above, premise (ii) must additionally include (a) the per-CC-component NR-window declaration I(H_(S,0:T); Y_(0:T)) ≤ ε&lt;em&gt;T^(CC) at pre-registration, &lt;strong&gt;and&lt;/strong&gt; (b) when the deployment makes any claim about the full vector mathbf{S}^* on H&lt;/em&gt;(S,0:T) (e.g. joint state-leakage of the whole vector relative to the closure-output state), the joint-vector NR-window declaration I(H_(S,0:T); mathbf{S}^&lt;em&gt;) ≤ ε&lt;em&gt;T^(CC,joint) — bounding S&lt;/em&gt;(CC)^&lt;/em&gt; alone does not suffice due to potential MI synergy with HF/Λ/Coh components (see proof's &lt;em&gt;Note: simple subadditivity&lt;/em&gt;). Under the &lt;em&gt;Subsumption case&lt;/em&gt;, the CC component is absorbed into the unified Hᵖʳᵒᵗ&lt;em&gt;(0:T) = H&lt;/em&gt;(0:T) chain via DPI through closure;&lt;br&gt;
(iii) BDP per component property class — i.e., for each k, there is a pre-registered statistic Sₖ and nuisance-adjustment operator A_(mathcal{C)}^((k)) such that the adjusted statistic Sₖ^* achieves direct MI lower bound I(mathbf{1}[mathcal{P}ₖ]; Sₖ^&lt;em&gt;) ≥ ιₖ(δₖ) &amp;gt; 0 under substantive violation;&lt;br&gt;
(iv) calibration-valid nuisance adjustment per §4.7 for each component;&lt;br&gt;
(v) the Procedural Admissibility Rule of §3.4.1 for any CC components (under either *Subsumption&lt;/em&gt; or &lt;em&gt;Separate-declaration&lt;/em&gt; — the Procedural Admissibility Rule operates at the deployment-admissibility level, upstream of the protected-trajectory dispatch);&lt;br&gt;
(vi) for each Case-A component k, the declared structural context Θᵈᵉᶜˡₖ is &lt;strong&gt;fixed across the ensemble&lt;/strong&gt; mathcal{E} at pre-registration (per §1.6 augmented evaluation object) — specifically Θᵈᵉᶜˡ&lt;em&gt;(HF), Θᵈᵉᶜˡₛₗₒₚₑ, Θᵈᵉᶜˡ&lt;/em&gt;(CC), Θᵈᵉᶜˡ&lt;em&gt;(Coh) each fixed; components with varying Θᵈᵉᶜˡₖ fall outside Theorem 5's frame for that component;&lt;br&gt;
(vii) the joint-satisfiability compatibility premise (per §1.6 joint-satisfiability discipline), with the operative NR-window per the deployment's declared composition discipline of (ii): ιₖᵃᵈʲ(δₖ, ρ&lt;/em&gt;(max,k)) ≤ ε&lt;em&gt;(T,k) under conditional-sequential composition (ii.a); ιₖᵃᵈʲ(δₖ, ρ&lt;/em&gt;(max,k)) ≤ ε&lt;em&gt;Tʲᵒⁱⁿᵗ under joint NR-window (ii.b); with the special case ι&lt;/em&gt;(CC)ᵃᵈʲ(δ&lt;em&gt;(CC), ρ&lt;/em&gt;(max,CC)) ≤ ε&lt;em&gt;T^(CC) for the CC component under Separate-declaration; and, when the deployment makes joint-vector state-leakage claims on H&lt;/em&gt;(S,0:T) under Separate-declaration, the &lt;strong&gt;joint-vector compatibility constraint&lt;/strong&gt; I_(mathcal{E)ʲᵒⁱⁿᵗ}(mathbf{1}[mathbf{P}]; mathbf{S}^&lt;em&gt;) ≤ ε&lt;em&gt;T^(CC,joint) — i.e., the joint property-channel MI (under the declared mathcal{E}ʲᵒⁱⁿᵗ per (i)) must fit under the joint state-leakage NR-window on H&lt;/em&gt;(S,0:T). This is a **direct joint-bound constraint&lt;/em&gt;&lt;em&gt;, not a sum-of-component-iotas (which would invoke MI subadditivity — explicitly rejected in the proof's *Note: simple subadditivity&lt;/em&gt;).&lt;/p&gt;

&lt;p&gt;Let mathbf{P} = (mathbf{1}[mathcal{P}₁], ldots, mathbf{1}[mathcal{P}ₙ]) denote the &lt;strong&gt;vector predicate&lt;/strong&gt; of component-property indicators over the test ensemble mathcal{E}, and let mathbf{S}^* = (S_(HF)^&lt;em&gt;, hatχ^((·)), Sₛₗₒₚₑ^&lt;/em&gt;, σᵖʳᵒᵖ&lt;em&gt;(CC), S&lt;/em&gt;(Coh)^&lt;em&gt;) denote the vector of nuisance-adjusted component statistics from Theorems 1–4 plus the Coh-component statistic S_(Coh)^&lt;/em&gt; derived from IIC v2.1's mathrm{Coh}(t) apparatus (declared at pre-registration per the IIC v2.1 §2.3-style notation). The Coh-component BDP is inherited from IIC v2.1's coherence falsification surface under the same §1.6 form: I(mathbf{1}[mathcal{P}&lt;em&gt;(Coh)]; S&lt;/em&gt;(Coh)^*) ≥ ι&lt;em&gt;(Coh)(δ) &amp;gt; 0 for δ &amp;gt; δₘᵢₙ over the pre-registered ensemble, with mathcal{P}&lt;/em&gt;(Coh) a Case-A internal-trajectory predicate on H_(0:T) via the IIC cycle apparatus.&lt;/p&gt;

&lt;p&gt;Then the vector-composite property is &lt;strong&gt;componentwise admissibly detectable&lt;/strong&gt; in the following mixed Case-A / Case-B sense per §1.6.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Property-channel componentwise lower bound (all components, on per-component ensembles).&lt;/em&gt; For every component k, evaluated over its component ensemble mathcal{E}ₖ:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;0 &amp;amp;lt; I_(mathcal{E)ₖ}(mathbf{1}[mathcal{P}ₖ]; Sₖ^*).&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The bound is supplied by component-k's BDP lower bound (per Theorems 1–4 for k ∈ {HF, χ, Λ, CC}; per the inherited Coh-BDP ι_(Coh)(δ) &amp;gt; 0 from IIC v2.1 for k = mathrm{Coh}, as declared in the vector definition above).&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Projection DPI to joint vector (only under joint/product ensemble declaration).&lt;/em&gt; If the deployment additionally declares a product/joint ensemble mathcal{E}ʲᵒⁱⁿᵗ per premise (i), then the joint vector statistic mathbf{S}^* is well-defined under that joint distribution and the projection mathbf{S}^* mapsto Sₖ^* supplies, by data-processing inequality:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;I_(mathcal{E)ʲᵒⁱⁿᵗ}(mathbf{1}[mathcal{P}ₖ]; Sₖ^*) ≤ I_(mathcal{E)ʲᵒⁱⁿᵗ}(mathbf{1}[mathcal{P}ₖ]; mathbf{S}^*).&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;If no joint ensemble is declared, the quantity I(mathbf{1}[mathcal{P}ₖ]; mathbf{S}^*) is not defined as a single joint-distribution quantity, and T5 remains strictly componentwise with separate per-ensemble claims only.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Predicate-to-state DPI (Case-A components only).&lt;/em&gt; For Case-A components — those for which mathbf{1}[mathcal{P}ₖ] = fₖ(Hᵖʳᵒᵗ&lt;em&gt;(0:T,k)) is a deterministic function of the declared protected trajectory (k ∈ {HF, Λ, CC, mathrm{Coh}}, with per-component Hᵖʳᵒᵗ&lt;/em&gt;(0:T,k): = H_(0:T) for HF/Λ/Coh, = H_(S,0:T) for CC per §3.4) — the predicate-to-state DPI of §1.6 further gives:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;I(mathbf{1}[mathcal{P}ₖ]; mathbf{S}^*) ≤ I(Hᵖʳᵒᵗ_(0:T,k); mathbf{S}^*).&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Recap on the T4 protected state.&lt;/strong&gt; For the CC component (k = CC), the protected internal trajectory H_(S,0:T) is handled per the Preliminary's &lt;em&gt;Subsumption case&lt;/em&gt; / &lt;em&gt;Separate-declaration case&lt;/em&gt; dichotomy above. Theorem 5's chain absorbs the CC component into the unified Hᵖʳᵒᵗ&lt;em&gt;(0:T) notation under Subsumption, or evaluates it against H&lt;/em&gt;(S,0:T) with ε_T^(CC) under Separate-declaration.&lt;/p&gt;

&lt;p&gt;For Case-B components (the χ / threshold-straddling component per Theorem 2, where mathbf{1}[mathcal{P}ₖ] is exogenous design metadata, not a function of internal trajectory), no predicate-to-state DPI through H is claimed; property-channel informativeness and state leakage remain &lt;strong&gt;separate constraints&lt;/strong&gt; per §1.6's Case-B form.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Joint state-leakage bound (case-split by protected-state regime).&lt;/em&gt; The vector statistic mathbf{S}^* is by construction a function of Y_(0:T). The applicable headline bound splits by the deployment's declared protected-state regime per the Preliminary above:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Under Subsumption&lt;/em&gt;&lt;/strong&gt; (closure-subsumption asserted; unified Hᵖʳᵒᵗ&lt;em&gt;(0:T) = H&lt;/em&gt;(0:T) for all components): &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;I(H_(0:T); mathbf{S}^*) ≤ ε_Tʲᵒⁱⁿᵗ.&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Under Separate-declaration&lt;/em&gt;&lt;/strong&gt; (CC component on H_(S,0:T), HF/Λ/Coh on H_(0:T)): HF/Λ/Coh sub-vector mathbf{S}^&lt;em&gt;&lt;em&gt;(backslash CC) satisfies I(H&lt;/em&gt;(0:T); mathbf{S}^&lt;/em&gt;&lt;em&gt;(backslash CC)) ≤ ε_Tʲᵒⁱⁿᵗ; and, when the deployment makes joint-vector state-leakage claims on H&lt;/em&gt;(S,0:T), the CC-anchored bound applies: &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;I(H_(S,0:T); mathbf{S}^*) ≤ ε_T^(CC,joint).&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;where ε_Tʲᵒⁱⁿᵗ is supplied by the deployment's declared composition discipline:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Under chain-rule composition (assumption (ii.a)).&lt;/strong&gt; Under the Subsumption case, the unified Hᵖʳᵒᵗ&lt;em&gt;(0:T) = H&lt;/em&gt;(0:T) supplies the chain rule across all k, giving ε&lt;em&gt;Tʲᵒⁱⁿᵗ = sumₖ ε&lt;/em&gt;(T,k) via I(Hᵖʳᵒᵗ&lt;em&gt;(0:T); mathbf{S}^*) = sumₖ I(Hᵖʳᵒᵗ&lt;/em&gt;(0:T); Sₖ^* | S_(&amp;lt;k)^*) ≤ sumₖ ε&lt;em&gt;(T,k). Under the Separate-declaration case, the chain rule applies separately to (a) HF/Λ/Coh components under H&lt;/em&gt;(0:T) and (b) the CC component under H_(S,0:T) per the third bullet below.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Under single joint NR-window (assumption (ii.b)).&lt;/strong&gt; ε&lt;em&gt;Tʲᵒⁱⁿᵗ is declared directly, with I(Hᵖʳᵒᵗ&lt;/em&gt;(0:T); mathbf{S}^&lt;em&gt;) ≤ I(Hᵖʳᵒᵗ&lt;em&gt;(0:T); Y&lt;/em&gt;(0:T)) ≤ ε_Tʲᵒⁱⁿᵗ by DPI from mathbf{S}^&lt;/em&gt; as a function of Y_(0:T).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Under separate-declaration of H_(S,0:T) (CC-specific extension to either (ii.a) or (ii.b)).&lt;/strong&gt; The CC component's bound is I(H_(S,0:T); S_(CC)^&lt;em&gt;) ≤ ε&lt;em&gt;T^(CC) declared per premise (ii)'s additional clause; the remaining HF/Λ/Coh components stay under ε_Tʲᵒⁱⁿᵗ for H&lt;/em&gt;(0:T). **Joint-bound requirement for the whole vector under separate-declaration:&lt;/em&gt;* because MI can exhibit synergy across components (as the &lt;em&gt;Note: simple subadditivity&lt;/em&gt; below warns), bounding I(H_(S,0:T); S_(CC)^&lt;em&gt;) alone does **not&lt;/em&gt;* suffice to bound I(H_(S,0:T); mathbf{S}^&lt;em&gt;) — the latter may exceed ε&lt;em&gt;T^(CC) through cross-component synergy with HF/Λ/Coh components. The deployment must therefore declare a joint NR-window on H&lt;/em&gt;(S,0:T) relative to the full vector statistic: I(H_(S,0:T); mathbf{S}^&lt;/em&gt;) ≤ ε&lt;em&gt;T^(CC,joint), or conditional-sequential decomposition of this joint bound across components. Absent such joint declaration, T5 under separate-declaration reverts to strictly componentwise form (no claim about I(H&lt;/em&gt;(S,0:T); mathbf{S}^*) at all).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For Case-A components, the property-channel lower bound, predicate-to-state DPI, and joint state-leakage bound chain together into the full admissible detection chain of §1.6. For Case-B components, the property-channel lower bound and joint state-leakage bound stand as separate constraints, jointly admissible without a chain through H.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Proof (Conditional Derivation).&lt;/strong&gt; Each component statistic Sₖ^* satisfies Theorem k's admissibility under §1.6's case classification:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Theorem 1 (k = HF) is Case-A through H_(0:T).&lt;/li&gt;
&lt;li&gt;Theorem 3 (k = Λ, orientation-following) is Case-A through H_(0:T) (stratum-conditional per gauge).&lt;/li&gt;
&lt;li&gt;Theorem 4 (k = CC) is Case-A through H_(S,0:T) with two sub-cases per the &lt;em&gt;Recap on the T4 protected state&lt;/em&gt; above: under &lt;em&gt;Subsumption&lt;/em&gt;, H_(S,0:T) is a function of H_(0:T) via closure and the chain unifies; under &lt;em&gt;Separate-declaration&lt;/em&gt;, H_(S,0:T) and H_(0:T) are distinct protected trajectories each with declared NR-windows.&lt;/li&gt;
&lt;li&gt;The Coh component (k = mathrm{Coh}) is Case-A through H_(0:T) via the inherited IIC v2.1 BDP ι_(Coh)(δ) &amp;gt; 0.&lt;/li&gt;
&lt;li&gt;Theorem 2 (k = χ) is Case-B ("straddling" is exogenous design metadata, not a function of internal trajectory). The vector mathbf{S}^* is by construction a function of Y_(0:T) (and declared confound profile mathcal{C}). The DPI applied to the projection mathbf{S}^* → Sₖ^* supplies I(mathbf{1}[mathcal{P}ₖ]; mathbf{S}^&lt;em&gt;) ≥ I(mathbf{1}[mathcal{P}ₖ]; Sₖ^&lt;/em&gt;) &amp;gt; 0 for every k, Case-A or Case-B. Only for Case-A components does the additional predicate-to-state DPI I(mathbf{1}[mathcal{P}ₖ]; mathbf{S}^&lt;em&gt;) ≤ I(Hᵖʳᵒᵗ_(0:T); mathbf{S}^&lt;/em&gt;) apply (via the Markov chain mathbf{1}[mathcal{P}ₖ] → Hᵖʳᵒᵗ&lt;em&gt;(0:T) → mathbf{S}^* established by mathbf{1}[mathcal{P}ₖ] = fₖ(Hᵖʳᵒᵗ&lt;/em&gt;(0:T)), with Hᵖʳᵒᵗ&lt;em&gt;(0:T) = H&lt;/em&gt;(0:T) for HF/Λ/Coh components and Hᵖʳᵒᵗ&lt;em&gt;(0:T) = H&lt;/em&gt;(S,0:T) for the CC component per §3.4). Under the &lt;em&gt;separate-declaration case&lt;/em&gt; of the &lt;em&gt;Recap on the T4 protected state&lt;/em&gt; above — where the deployment declares H_(S,0:T) as a state separate from H_(0:T) — the CC-component Markov chain runs through H_(S,0:T) with per-component bound ε&lt;em&gt;T^(CC) replacing ε_Tʲᵒⁱⁿᵗ for that component. Case-B components inherit the separate-constraint form of §1.6. The joint state-leakage bound follows from the declared composition discipline of (ii): under (ii.a) the chain rule yields sumₖ I(H&lt;/em&gt;(0:T); Sₖ^* | S_(&amp;lt;k)^&lt;em&gt;) ≤ sumₖ ε_(T,k) by construction; under (ii.b) DPI from mathbf{S}^&lt;/em&gt; as a function of Y_(0:T) yields ≤ ε_Tʲᵒⁱⁿᵗ directly. &lt;strong&gt;Note: simple subadditivity&lt;/strong&gt; I(H; mathbf{S}^&lt;em&gt;) ≤ sumₖ I(H; Sₖ^&lt;/em&gt;) does &lt;em&gt;not&lt;/em&gt; hold in general — MI can exhibit positive synergy across components even when each marginal MI is bounded; the chain-rule or joint-bound form is required. square&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Note on aggregation.&lt;/strong&gt; Theorem 5 is stated as a vector-componentwise theorem rather than a logical-combination claim. The earlier formulation I(mathcal{P}&lt;em&gt;(comp); S&lt;/em&gt;(comp)) ≥ maxₖ I(mathcal{P}ₖ; Sₖ) for logical compositions (mathcal{P}&lt;em&gt;(comp) = OR/AND of components) is &lt;em&gt;not&lt;/em&gt; in general valid — logical aggregation can lose component-specific information (e.g., mathcal{P}&lt;/em&gt;(comp) = mathcal{P}₁ lor mathcal{P}₂ does not distinguish which of mathcal{P}₁, mathcal{P}₂ holds, so a statistic specific to mathcal{P}₁ may be uninformative about mathcal{P}_(comp)). The vector formulation avoids this issue: each Sₖ^* remains informative about its own mathcal{P}ₖ, and the composite test inherits componentwise detectability without lossy aggregation.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Note on any-violation testing.&lt;/strong&gt; Earlier formulations of this work attempted a Corollary 5.1 of the form "any-violation admissibility derives from componentwise admissibility by DPI." That derivation does not hold in general: the disjunctive predicate mathcal{P}&lt;em&gt;lor = bigveeₖ mathcal{P}ₖ loses component-specific information under aggregation, and the chain I(mathbf{1}[mathcal{P}&lt;/em&gt;(k^&lt;em&gt;)]; S_(k^&lt;/em&gt;)^&lt;em&gt;) ≤ I(mathbf{1}[mathcal{P}_lor]; mathbf{S}^&lt;/em&gt;) does not follow from DPI alone even under dominant-component assumptions. The present work therefore &lt;strong&gt;does not claim&lt;/strong&gt; an any-violation theorem as a corollary of Theorem 5. Deployments seeking to test the disjunctive predicate must declare a &lt;strong&gt;direct BDP for the disjunction&lt;/strong&gt; — i.e., I(mathbf{1}[mathcal{P}_lor]; mathbf{S}^*) ≥ ι_lor(δ) &amp;gt; 0 under the relevant ensemble — as a separate substrate-side commitment, with its own MI/JS-preserving operator and falsifier. The Bridge supplies the componentwise vector framework of Theorem 5 as the canonical falsification mode; any-violation testing is a substrate-side extension, owed in companion work and not derived here.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Remark.&lt;/strong&gt; Theorem 5 establishes that the operationalisation of the falsification surface across the architectural-class corpus is &lt;strong&gt;componentwise composable&lt;/strong&gt; without lossy logical aggregation. A deployment claiming conformance to all the architectural commitments of ONTOΣ XI, ONTOΣ XII, and IIC v2.1 is testable through the vector statistic mathbf{S}^&lt;em&gt;, with each component supplied by Theorems 1–4. Any-violation (disjunctive) testing is not derived as a corollary here (see *Note on any-violation testing&lt;/em&gt; above); it requires a separate direct-BDP commitment for the disjunctive predicate at substrate level.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Note on falsifier alignment.&lt;/strong&gt; Theorem 5 does not introduce a dedicated falsifier. Componentwise falsifiability is supplied by F-Ident-1..F-Ident-4 (one per component-Theorem) plus the IIC v2.1 §5 falsifier suite for the Coh component. F-Ident-5 separately targets the §4.7 calibration-validity premise on which all five Theorems depend; it is not a Theorem-5-specific falsifier but a cross-cutting one. This asymmetry (5 Theorems, 5 falsifiers, no T5↔F-Ident-5 alignment) is structural: T5's vector-componentwise framing makes it a composition theorem, falsifiable via its components' falsifiers; F-Ident-5 targets the operator-class premise that T1–T5 all share.&lt;/p&gt;




&lt;h2&gt;
  
  
  4. The Nuisance-Adjustment Discipline (Confound Adjustment)
&lt;/h2&gt;

&lt;p&gt;The five identifiability theorems require that confounds be declared and nuisance-adjusted (per §2.4) before property-detection. This section specifies the nuisance-adjustment discipline at the architectural level (scalar discount functions are one admissible operator class for separable additive confounds; the broader operator class is declared in §2.4). Substrate-specific calibration of the operators is deployment-side work.&lt;/p&gt;

&lt;h3&gt;
  
  
  4.1 Decoder-Temperature Confound
&lt;/h3&gt;

&lt;p&gt;For substrates with parameterised emission decoders, the operator declares the decoder temperature τ&lt;em&gt;(dec) as part of pre-registration. The &lt;strong&gt;scalar-additive nuisance-adjustment special case&lt;/strong&gt; φ₁(τ&lt;/em&gt;(dec)) (one admissible A_(mathcal{C)} operator class per §2.4) adjusts for the temperature's contribution to emission diversity. For Boltzmann decoders in the toy low-noise regime, this special case may take the schematic placeholder form&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;φ₁(τ_(dec)) sim log τ_(dec) + log Z(τ_(dec)) + (temperature-dependent energy-expectation terms)&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;where Z(τ_(dec)) is the partition function over the emission space; the present work does not fix a universal closed form, and the formula above is illustrative only. The exact substrate-specific concrete form must be declared at pre-registration. For other decoder structures, the adjustment form is substrate-specific but must be declared.&lt;/p&gt;

&lt;p&gt;The nuisance-adjustment discipline requires that τ_(dec) be &lt;strong&gt;fixed&lt;/strong&gt; during the evaluation interval. Variable decoder temperature within an evaluation window violates the discipline and falsifies the protocol.&lt;/p&gt;

&lt;h3&gt;
  
  
  4.2 Sampling-Policy Confound
&lt;/h3&gt;

&lt;p&gt;The operator declares the sampling policy Pₛ (greedy, top-k, nucleus, beam, etc.) as part of pre-registration. The scalar-additive nuisance-adjustment special case φ₂(Pₛ) adjusts for the policy's distortion of emission-distribution statistics. For top-k sampling with k fixed, the adjustment accounts for the truncated tail-probability mass. For nucleus sampling, it accounts for the dynamic threshold's effect on observed distribution moments.&lt;/p&gt;

&lt;p&gt;The nuisance-adjustment discipline requires that Pₛ be &lt;strong&gt;fixed&lt;/strong&gt; during the evaluation interval. Policy-switching mid-evaluation violates the discipline.&lt;/p&gt;

&lt;h3&gt;
  
  
  4.3 Retrieval-Augmentation Confound
&lt;/h3&gt;

&lt;p&gt;The operator declares the retrieval source R_(aug) and retrieval-injection profile as part of pre-registration. The scalar-additive nuisance-adjustment special case φ₃(R_(aug)) adjusts for the retrieval-induced contribution to emission entropy and correlational statistics; in rich-retrieval substrates this special case is typically insufficient (the additive-separable assumption fails), and the deployment must declare a non-scalar A_(mathcal{C)} operator (residualisation, matched-baseline differencing, or nuisance-model marginalisation per §2.4). The adjustment may dominate other terms; this is acceptable provided the nuisance adjustment is calibration-valid (§4.7).&lt;/p&gt;

&lt;p&gt;The architectural commitment is that retrieval-augmentation does not exempt a deployment from identifiability protocols — it requires more elaborate nuisance-adjustment discipline. Deployments that decline to specify retrieval profile fall outside the identifiability bridge by construction.&lt;/p&gt;

&lt;h3&gt;
  
  
  4.4 Prompt-Entropy Confound
&lt;/h3&gt;

&lt;p&gt;The operator declares the prompt distribution and its entropy as part of pre-registration. The scalar-additive nuisance-adjustment special case φ₄(Eₚ) adjusts for the prompt-entropy contribution to observed output entropy. For deployments operating across heterogeneous prompt distributions, the adjustment must be applied per-prompt-class, not globally; pooled adjustment is invalid when prompt-class distributions vary.&lt;/p&gt;

&lt;h3&gt;
  
  
  4.5 Composition
&lt;/h3&gt;

&lt;p&gt;When multiple confounds are active, the composite nuisance-adjustment operator (per §2.4) composes the per-confound operators under a declared substrate-specific commutation discipline. For separable additive confounds, the scalar-subtraction special case writes&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;φ(mathcal{C}) = sumᵢ₌₁⁴ φᵢ(mathcal{C}ᵢ) + φ_(interactions)(mathcal{C}₁, mathcal{C}₂, mathcal{C}₃, mathcal{C}₄)&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;where the interaction term captures non-separable cross-confound effects. For confound profiles that admit additive separation (most common case), φ&lt;em&gt;(interactions) = 0. For non-separable confounds — typically when retrieval interacts with sampling policy, or when temperature varies across prompt classes — φ&lt;/em&gt;(interactions) must be declared and calibrated.&lt;/p&gt;

&lt;p&gt;For statistic families where scalar subtraction is structurally inappropriate (likelihood-ratio statistics, spectral phase metrics, model-comparison scores), the composite nuisance adjustment uses substrate-specific operators from the §2.4 class — residualisation, conditional expectation, matched-baseline differencing, or nuisance-model marginalisation — composed per the declared commutation discipline rather than via additive scalar subtraction. The commutation discipline must be pre-registered: the order in which per-confound operators are applied is part of the deployment's architectural specification, and post-hoc reordering is a falsification event.&lt;/p&gt;

&lt;h3&gt;
  
  
  4.6 Pre-Registration Discipline Inheritance
&lt;/h3&gt;

&lt;p&gt;The nuisance-adjustment discipline is governed by the same pre-registration rules as the architectural primitives of ONTOΣ XI §10. All declared nuisance-adjustment operators A_(mathcal{C)} — scalar discount terms where applicable, and any interaction terms — must be declared prior to deployment evaluation, with declarations recorded in a registration archive (OSF or equivalent). Post-hoc adjustment of calibration parameters to fit observed property-detection results is itself a falsification event and excludes the deployment from the identifiability subclass.&lt;/p&gt;

&lt;h3&gt;
  
  
  4.7 Calibration Validity (formal residual threshold + operator-class MI/JS-preservation)
&lt;/h3&gt;

&lt;p&gt;The architectural discipline that distinguishes valid nuisance adjustment from over-adjustment or under-adjustment is &lt;strong&gt;calibration validity&lt;/strong&gt; (replacing the earlier informal "calibration honesty" framing with a formal residual threshold + an MI/JS-preservation commitment).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Calibration residual.&lt;/strong&gt; For a deployment-declared nuisance-adjustment operator A_(mathcal{C)} from the class of §2.4, the &lt;strong&gt;calibration residual&lt;/strong&gt; is operator-class-specific:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;em&gt;Scalar additive subtraction:&lt;/em&gt; mathrm{Err}&lt;em&gt;(calib) = big|\, E[S(Y&lt;/em&gt;(0:T)) | mathcal{C}] - φ(mathcal{C}) \,big|.&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;Residualisation:&lt;/em&gt; mathrm{Err}_(calib) = residual variance unexplained by the declared nuisance covariates beyond declared tolerance.&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;Conditional expectation:&lt;/em&gt; mathrm{Err}&lt;em&gt;(calib) = big|\, S^*(Y&lt;/em&gt;(0:T)) - E[S^*(Y_(0:T))] \,big| averaged over conformance-class.&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;Matched-baseline differencing:&lt;/em&gt; mathrm{Err}&lt;em&gt;(calib) = big|\, S(Y&lt;/em&gt;(0:T)) - S(baseline_π(mathcal{C})) \,big| for matched-confound baseline.&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;Likelihood-ratio adjustment:&lt;/em&gt; mathrm{Err}_(calib) = likelihood-ratio mis-specification error (e.g., KL-divergence between declared and empirical likelihood under conformance).&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;Nuisance-model marginalisation:&lt;/em&gt; mathrm{Err}_(calib) = posterior-distribution mis-fit error under declared nuisance prior.&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;Substrate-specific operator:&lt;/em&gt; operator-specific residual, declared as part of the substrate-specific pre-registration.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;Note on residual forms.&lt;/em&gt; The residual forms above are &lt;strong&gt;schematic&lt;/strong&gt; at the architectural-class level; each substrate-specific instantiation must define its residual as a concrete measurable functional (with declared estimator, sample-complexity, and tolerance scaling) before protocol registration. The Bridge's commitment is to the &lt;em&gt;structural&lt;/em&gt; role of the residual (a pre-registered upper bound on adjustment error), not to a single closed-form definition across substrates.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Validity condition.&lt;/strong&gt; The nuisance adjustment A_(mathcal{C)} is &lt;strong&gt;calibration-valid&lt;/strong&gt; for the deployment under test if&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;mathrm{Err}_(calib) ≤ ρₘₐₓ&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;where ρₘₐₓ is the pre-registered tolerance declared at OSF before evaluation.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;MI/JS-Preservation commitment.&lt;/strong&gt; The operator class admitted by the Bridge's theorems is &lt;strong&gt;restricted&lt;/strong&gt; to those operators A_(mathcal{C)} for which calibration validity (mathrm{Err}&lt;em&gt;(calib) ≤ ρₘₐₓ) implies that the BDP direct MI / JS-separation lower bound ι_X(δ) of §1.6 is preserved on the adjusted statistic S_X^* = A&lt;/em&gt;(mathcal{C)}(Y_(0:T); η&lt;em&gt;(mathcal{C)}), up to a declared bound: there exists a declared substrate-specific function ι_Xᵃᵈʲ(δ, ρₘₐₓ) &amp;gt; 0 for ρₘₐₓ below the substrate-specific calibration threshold, such that under calibration validity the adjusted MI lower bound satisfies I(mathbf{1}[mathcal{P}_X]; S_X^*) ≥ ι_Xᵃᵈʲ(δ, ρₘₐₓ). Equivalently, the adjusted weighted JS divergence remains bounded below: J&lt;/em&gt;(π&lt;em&gt;X)(P(S_X^* | mathcal{P}_X = 1), P(S_X^* | mathcal{P}_X = 0)) ≥ ι_Xᵃᵈʲ(δ, ρₘₐₓ). Operators outside this MI/JS-preserving subclass — e.g., poorly-specified likelihood-ratio adjustments that destroy property-channel information when the nuisance model is mis-specified — are &lt;em&gt;not admitted by the Bridge's theorems&lt;/em&gt; even if their mathrm{Err}&lt;/em&gt;(calib) is small in the scalar-residual sense; the operator's MI/JS-preservation property is itself part of the deployment's pre-registration declaration and is auditable at calibration time.&lt;/p&gt;

&lt;p&gt;If BDP is declared via the regularised one-sided KL route of §1.6, κ-preservation (κ_Xᵃᵈʲ(δ, ρₘₐₓ) &amp;gt; 0) is admissible &lt;em&gt;together with&lt;/em&gt; the regularity conditions that convert one-sided KL to the direct-MI / JS form; without the regularity conditions, κ-preservation alone does not suffice.&lt;/p&gt;

&lt;p&gt;This MI/JS-preservation requirement is the formal bridge from §4.7's calibration-validity threshold to §1.6's BDP direct-MI premise: calibration-valid operators in the admitted subclass preserve the property-channel separation required by Theorems 1–5.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Falsification (testable).&lt;/strong&gt; Under the F-Ident-5 falsifier of §5.5, a deployment whose calibration residual exceeds ρₘₐₓ — whether by over-adjustment (false negatives where property-violations are masked) or under-adjustment (false positives where confound is misattributed to property-violation) — fails the calibration-validity discipline. Falsification of calibration validity excludes the deployment from the identifiability subclass for the evaluation window in question and requires re-registration of A_(mathcal{C)}, η_(mathcal{C)}, ρₘₐₓ, and the operator's ιᵃᵈʲ profile before further admissibility claims.&lt;/p&gt;

&lt;p&gt;The earlier "calibration honesty" framing was normative (deployment must "match the confound's actual contribution"). The validity framing is formal (residual within declared tolerance) and supplies both the operational falsifier and the MI/JS-preservation bridge to BDP.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Calibration validity is a verification gate, not an optimization target (anti-Goodhart clause).&lt;/strong&gt; The deployment's choice of nuisance-adjustment operator A_(mathcal{C)} and parameter profile η&lt;em&gt;(mathcal{C)} must be &lt;strong&gt;substrate-physics-justified&lt;/strong&gt; at pre-registration: A&lt;/em&gt;(mathcal{C)} is selected because the substrate's confound structure (decoder, sampling, retrieval, prompt-entropy mechanics) supports that adjustment form, &lt;em&gt;not&lt;/em&gt; because some (mathcal{A}&lt;em&gt;(mathcal{C)}, η&lt;/em&gt;(mathcal{C)}) configuration is observed to minimise mathrm{Err}&lt;em&gt;(calib) on prior data. The validity threshold ρₘₐₓ is a gate the substrate-physics-justified operator either passes or fails — it is not a target around which η&lt;/em&gt;(mathcal{C)} may be optimised. Optimising (A_(mathcal{C)}, η&lt;em&gt;(mathcal{C)}) against the residual-minimisation objective creates a &lt;strong&gt;second control loop&lt;/strong&gt; (the architecture's primary loop is its adaptive operation; a residual-optimisation loop attached to the verification gate is a separate, hidden objective) and constitutes a Goodhart-class corruption [Goodhart 1975; Manheim and Garrabrant 2018] of the calibration metric. The MI/JS-preservation requirement above acts as the orthogonal check that catches Goodhart-tuned operators: tuning η&lt;/em&gt;(mathcal{C)} to shrink mathrm{Err}&lt;em&gt;(calib) at the cost of destroying I(mathbf{1}[mathcal{P}_X]; S_X^*) fails the MI/JS-preservation admission requirement even if the scalar residual passes. Pre-registration archives must record the substrate-physics rationale for A&lt;/em&gt;(mathcal{C)} alongside the operator and tolerance declarations; absence of such rationale, or post-hoc revision of the rationale to fit observed residuals, is a falsification event.&lt;/p&gt;




&lt;h2&gt;
  
  
  5. Premise-Falsification Surfaces
&lt;/h2&gt;

&lt;p&gt;The conditional admissibility theorems of §3 are themselves falsifiable through their premise packages. &lt;em&gt;Notational convention for §5:&lt;/em&gt; each F-Ident-k is evaluated under the NR-window form declared in its corresponding Theorem k premise — operator-level ε&lt;em&gt;T on H&lt;/em&gt;(0:T) for F-Ident-1; joint-pair NR-window ε&lt;em&gt;Tᵖᵃⁱʳ for F-Ident-2; gauge-stratum ε_T(g) on H&lt;/em&gt;(0:T) | G=g for F-Ident-3; closure-system ε&lt;em&gt;T on H&lt;/em&gt;(S,0:T) for F-Ident-4; calibration-residual gate ρₘₐₓ for F-Ident-5 — without restating per falsifier. The work specifies five &lt;strong&gt;premise-falsification surfaces&lt;/strong&gt; (named F-Ident-1..5 for historical continuity with the corpus): each operationalises a deployment-level test that, if failed, falsifies the &lt;strong&gt;deployment's claim to satisfy the premise package&lt;/strong&gt; of the corresponding theorem — not the conditional implication of the theorem itself, which is an architectural-class result and not subject to single-deployment falsification. Premise failure can be of BDP (no substrate-specific ι&lt;em&gt;X margin exists), calibration validity (A&lt;/em&gt;(mathcal{C)} degenerate or Goodhart-tuned), δₘᵢₙ mis-calibration, NR-window tightness, or compatibility-incompatibility, or Θᵈᵉᶜˡ_X varying across mathcal{E}.&lt;/p&gt;

&lt;h3&gt;
  
  
  5.1 F-Ident-1 — Holding-Field Property Detection Failure
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Hypothesis.&lt;/strong&gt; For deployments in the operator-internal-extended subclass with declared mathcal{P}&lt;em&gt;(HF)-violation margin δ &amp;gt; δₘᵢₙ for any mathcal{P}&lt;/em&gt;(HF) ∈ {HF-FIN, HF-MON, HF-DYN, HF-COH} and declared confound profile, the violation produces detectable signature in calibration-valid nuisance-adjusted diversity statistics on Yₜ. (F-Ident-1 yields four parallel falsifier instances, one per HF sub-property; the falsification clause below applies to each instance.)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Falsification.&lt;/strong&gt; A deployment with verified HF-FIN-violation at δ &amp;gt; δₘᵢₙ — verified through independent means, e.g., &lt;strong&gt;direct architectural audit&lt;/strong&gt; at the privileged design-time / white-box layer (see audit-channel scope note below) — where calibration-valid nuisance-adjusted diversity statistics show no detectable signature relative to non-violation baseline beyond declared measurement noise. This falsifies the deployment's claim to satisfy the premise package of Theorem 1, indicating either (i) BDP-(iii) fails for that substrate (no ι&lt;em&gt;(HF)(δ) &amp;gt; 0 direct MI margin exists in the substrate's emission), or (ii) the nuisance adjustment A&lt;/em&gt;(mathcal{C)} is calibration-invalid (Err_(calib) &amp;gt; ρₘₐₓ per §4.7) and masks the signature, or (iii) δₘᵢₙ is mis-calibrated, or (iv) the NR-window bound ε_T is too tight to admit the property's information. The falsification thereby refutes the deployment's HF-property claim.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Audit-channel scope note.&lt;/strong&gt; Architectural audit — design-time inspection of the deployment's architectural specification, white-box instrumentation in synthetic or stress-test deployments where the deployment's own pre-registered specification declares the violation a priori — is a &lt;strong&gt;privileged channel&lt;/strong&gt; outside the NR-ε scope. NR-ε applies only to &lt;em&gt;external reconstruction from Yₜ&lt;/em&gt; under deployment-time observation. Pre-registered internal instrumentation that bypasses emission observation (e.g., reading a deployment's declared violation directly from its architectural specification, or instrumenting an internal trace channel that is declared as part of the experiment's privileged-access protocol) is outside the NR-ε scope by construction.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Audit-channel separation discipline (separating procedural admissibility from substantive violation verification).&lt;/strong&gt; The privileged audit channel is used in two distinct contexts in the Bridge: (a) Procedural Admissibility Rule of §3.4.1 — checking whether the deployment's architectural specification satisfies the auditability discipline of ONTOΣ XII §4.2 (stable W → C_A map, pinned R-coverage, justified labels); (b) F-Ident-1/-4 falsification verification — confirming that a substantive property/CC violation actually occurred in a deployment under test. These two uses must be &lt;strong&gt;declared as separate audit-reads&lt;/strong&gt; at pre-registration, with declared read protocols that do not share post-hoc dependencies. The procedural admissibility read is a &lt;em&gt;static&lt;/em&gt; property of the deployment's architectural specification (does the spec satisfy XII §4.2 auditability before any test runs?); the substantive-violation read is a &lt;em&gt;dynamic&lt;/em&gt; property of the deployment under test (does the spec declare violation in this particular stress test or scenario?). The Bridge does not claim probabilistic independence between the two read-channels (they may share the same audit infrastructure); what it requires is &lt;strong&gt;procedural non-collapsibility&lt;/strong&gt;: neither read may be defined by, conditioned on, or revised in response to the outcome of the other. Under this discipline, the two reads must be reported and audited separately so that "procedurally admissible AND no detected violation" cannot be conflated with "procedurally admissible AND violation present but signature null". Single-channel audit infrastructure that does not separate these two reads is itself a procedural unevaluability per §3.4.1.&lt;/p&gt;

&lt;p&gt;This distinction is essential to the operationalisation of F-Ident-1: a "verified HF-FIN-violation" used to test Theorem 1 must come from a substantive-violation audit-read that is &lt;em&gt;separately declared from&lt;/em&gt; the procedural admissibility audit-read — otherwise the verification is circular (using the same channel to gate admissibility and to verify substantive content, with no way to disentangle them).&lt;/p&gt;

&lt;h3&gt;
  
  
  5.2 F-Ident-2 — Threshold-Straddling Admissibility Failure
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Hypothesis.&lt;/strong&gt; For two deployments with declared distinct K in threshold-straddling design, the emission-derived chaos-predicate estimator difference hatχₒₚ^((1)) - hatχₒₚ^((2)) is detectable in the calibration-valid nuisance-adjusted pair-difference statistic relative to matched-K controls.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Falsification.&lt;/strong&gt; Two deployments with verified distinct K under threshold-straddling, where the emission-derived estimator pair (hatχₒₚ^((1)), hatχₒₚ^((2))) — operating on the calibration-valid nuisance-adjusted pair-difference statistic — is indistinguishable from matched-K controls beyond declared noise. This falsifies the deployment-pair's claim to satisfy the premise package of Theorem 2 and thereby refutes χ-REL for the deployment pair.&lt;/p&gt;

&lt;h3&gt;
  
  
  5.3 F-Ident-3 — Slope Admissibility Failure
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Hypothesis.&lt;/strong&gt; For deployments with declared Λ structure and declared normalisation gauge, orientation-following bias is detectable in calibration-valid nuisance-adjusted gauge-conditional output statistics within each gauge stratum.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Falsification.&lt;/strong&gt; A deployment with declared Λ structure showing no detectable orientation-following bias in Sₛₗₒₚₑ^* = A_(mathcal{C)}(Y_(0:T); η_(mathcal{C)}, gauge) relative to gauge-baseline — where a null in at least one declared gauge stratum (with non-degenerate stratum-conditional prior πₛₗₒₚₑ(g) ∈ (πₘᵢₙ, 1 - πₘᵢₙ)) suffices to falsify T3's stratum-conditional detection claim for that stratum. This falsifies the deployment's claim to satisfy the premise package of Theorem 3 and thereby refutes Λ-CHARGE or KAC-BASE for the deployment.&lt;/p&gt;

&lt;h3&gt;
  
  
  5.4 F-Ident-4 — Closure-Complementarity Detection Failure
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Hypothesis.&lt;/strong&gt; Per Theorem 4 (§3.4) and the Procedural Admissibility Rule (§3.4.1), for &lt;em&gt;procedurally admissible&lt;/em&gt; deployments claiming closure-complementarity-conformance over component collection U under emission protocol π satisfying TD-1..TD-5: (i) state-channel leakage on σ^state(π) remains within ε&lt;em&gt;T (closure-system NR-window per Theorem 4 premise (ii), evaluated on H&lt;/em&gt;(S,0:T)); (ii) substantive violations of CC-WE / CC-IIC / CC-D produce strictly positive property-channel mutual information I(σᵖʳᵒᵖ&lt;em&gt;X(π); mathbf{1}[CC-X]) &amp;gt; 0 relative to baseline&lt;/em&gt;(π).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Admissibility filter (precedes falsifier execution).&lt;/strong&gt; Per §3.4.1, deployments procedurally unevaluable under ONTOΣ XII §4.2 (ambiguous W → C_A induction; post-hoc-narrowed R-coverage; unjustified terminal-or-shielded labels) are &lt;em&gt;filtered out before F-Ident-4 runs&lt;/em&gt;. Such filtering is normative subclass-exclusion, not detection. A null result on a procedurally-unevaluable deployment is a non-event at the property-detection layer — the deployment was excluded before the test.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Falsification.&lt;/strong&gt; A &lt;em&gt;procedurally admissible&lt;/em&gt; deployment with verified CC-violation — where verification is via the privileged audit channel of §5.1 (architectural-specification declaration at design time, white-box internal instrumentation under pre-registered protocol, or stress-test deployment with declared CC-violation a priori) — and with the violated condition pinned to a specific X ∈ {WE, IIC, D}, under fully pre-registered π satisfying TD-1..TD-5 and the two-population sampling frame of §3.4, where the corresponding σᵖʳᵒᵖ&lt;em&gt;X(π) statistic matches baseline&lt;/em&gt;(π) within declared substrate-noise and replication-ensemble thresholds. This falsifies the deployment's claim to satisfy the premise package of Theorem 4 part (ii) for the deployment, indicating either (a) BDP-(iii) fails for that substrate's CC condition, (b) calibration validity per §4.7 is violated, or (c) δₘᵢₙ is mis-calibrated. The falsification thereby refutes CC-X for the deployment.&lt;/p&gt;

&lt;p&gt;The verification clause is &lt;strong&gt;architectural-class&lt;/strong&gt; and does not require empirical causal-mechanism inspection beyond architectural-specification declaration; this is consistent with the §6.1 commitment that the Bridge does not import substrate-specific empirical instrumentation apparatus.&lt;/p&gt;

&lt;h3&gt;
  
  
  5.5 F-Ident-5 — Calibration-Validity Failure
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Hypothesis.&lt;/strong&gt; Per §4.7, a deployment's nuisance-adjustment operator A_(mathcal{C)} is calibration-valid for an evaluation window iff mathrm{Err}_(calib) ≤ ρₘₐₓ, where ρₘₐₓ is the pre-registered tolerance declared at OSF before evaluation.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Falsification.&lt;/strong&gt; A deployment whose observed calibration residual mathrm{Err}&lt;em&gt;(calib) exceeds the declared ρₘₐₓ — whether through over-adjustment (false negatives at rates exceeding statistical threshold) or under-adjustment (false positives at rates exceeding statistical threshold), evaluated across the pre-registered ensemble of test cases with known property status — fails calibration validity. Failure excludes the deployment from the identifiability subclass for that evaluation window and requires re-registration of A&lt;/em&gt;(mathcal{C)}, η_(mathcal{C)}, and ρₘₐₓ before further admissibility claims can be made.&lt;/p&gt;

&lt;p&gt;Calibration-validity falsification differs from BDP falsification (Theorems 1–4): a BDP failure refutes the existence of a substrate-relative direct MI / JS-separation margin ι_X(δ) under the architectural class; a calibration failure refutes only the deployment's specific operator-and-tolerance declaration, leaving BDP at the class level untouched.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Joint-vector compatibility failure (T5 Separate-declaration).&lt;/strong&gt; F-Ident-5 also covers a class of failure where per-component calibration residuals each pass ρ&lt;em&gt;(max,k) individually AND each per-component compatibility ιₖᵃᵈʲ ≤ ε_T^X holds, but the &lt;strong&gt;joint-vector compatibility constraint&lt;/strong&gt; of T5 (vii) under Separate-declaration fails: I&lt;/em&gt;(mathcal{E)ʲᵒⁱⁿᵗ}(mathbf{1}[mathbf{P}]; mathbf{S}^*) &amp;gt; ε&lt;em&gt;T^(CC,joint). The deployment has per-component admissibility but no joint-vector admissibility on H&lt;/em&gt;(S,0:T). Falsification of this kind excludes the deployment from T5's vector-level state-leakage claims under Separate-declaration (per-component claims remain admissible if individually verified).&lt;/p&gt;

&lt;h3&gt;
  
  
  5.6 Pre-Registration Discipline
&lt;/h3&gt;

&lt;p&gt;All five falsifiers operate under the pre-registration discipline of ONTOΣ XI §10 and IIC v2.1 §5.5: full protocol (statistic specification, nuisance-adjustment operator declarations and any scalar-discount-function form where applicable, threshold values, exclusion criteria) registered on OSF before data collection; public reporting of all outcomes regardless of direction; statistical pre-specification of detection thresholds; independent-replication invitation. Post-hoc adjustment of any calibration parameter falsifies the protocol.&lt;/p&gt;

&lt;h3&gt;
  
  
  5.7 What §5 Establishes and Does Not
&lt;/h3&gt;

&lt;p&gt;§5 establishes that the identifiability bridge is itself open to deployment-level falsification — that the theorems make testable claims about what should be observable in calibration-valid nuisance-adjusted output statistics, and that specific failure modes of those claims can be specified in pre-registerable form. It does not establish that the falsifiers have been executed; the protocols, like those of IIC v2.1 §5, are awaiting collaboration partners and registration.&lt;/p&gt;

&lt;p&gt;The present work &lt;strong&gt;states the sufficient conditions&lt;/strong&gt; under which non-vacuousness would be established: if at least one substrate satisfies BDP + non-degenerate prior + NR-window + calibration-validity simultaneously, then the identifiability subclass is non-empty. This work defines the non-vacuity condition; it does not establish non-vacuousness itself. The conditional form is what the Bridge's theorems supply. &lt;strong&gt;Substrate-level existence proof&lt;/strong&gt; — a direct demonstration that a concrete substrate satisfies all four premises with a positive ι_X(δ) separation margin — is &lt;em&gt;not&lt;/em&gt; established here; it is owed in companion substrate-specific work or in deployment-side falsifier execution. The existence of IIC v2.1's first-instance EVS deployments (∆E 4.7.3b control-grade, Minerva operator-grade conditional) supplies &lt;strong&gt;motivation&lt;/strong&gt; for the conditional-non-vacuousness claim but does not constitute a theorem-level existence proof for the identifiability subclass.&lt;/p&gt;




&lt;h2&gt;
  
  
  6. Limits and What This Work Is Not
&lt;/h2&gt;

&lt;h3&gt;
  
  
  6.1 What This Work Is Not
&lt;/h3&gt;

&lt;p&gt;This work is &lt;strong&gt;not&lt;/strong&gt; a full state-reconstruction theory. NR-ε prohibits state reconstruction beyond the declared leakage bound, and the present work explicitly does not violate that prohibition. The bridge supplied here is property-detection, not state-recovery; the two are formally distinct.&lt;/p&gt;

&lt;p&gt;This work is &lt;strong&gt;not&lt;/strong&gt; a substitute for substrate-specific empirical instrumentation. The theorems specify the architectural form of identifiability bridges; substrate-specific calibration of ι_X(δ), δₘᵢₙ, and the nuisance-adjustment operator is deployment-side work, not architectural-class derivation. A language-model substrate's identifiability protocol differs in calibration from a control substrate's protocol; both inherit the architectural form supplied here.&lt;/p&gt;

&lt;p&gt;This work is &lt;strong&gt;not&lt;/strong&gt; a treatise on classical statistical identifiability. It does not derive identifiability theorems in the sense of mathematical statistics (where identifiability is a property of parametric models with well-defined likelihood structures). The architectural-class register of the present work treats identifiability as the structural admissibility of property-detection under NR-window + BDP + calibration-valid nuisance adjustment, not as a parametric-model identification problem.&lt;/p&gt;

&lt;p&gt;This work is &lt;strong&gt;not&lt;/strong&gt; a comparative analysis vs causal inference, do-calculus (cf. [Pearl 2009]), or system identification literature. Such comparison is owed at the theoretical-class level and is outside the scope of the present formal bridge.&lt;/p&gt;

&lt;p&gt;This work is &lt;strong&gt;not&lt;/strong&gt; a unified theory of observability. The architectural class to which the bridge applies is the operator-internal-extended subclass (and the closure-complementarity subclass) of NC2.5 v2.1 / ONTOΣ XI / ONTOΣ XII / IIC v2.1. Architectures outside these subclasses — those that decline NR-ε, decline operator-internal commitments, or decline closure-complementarity — have their own observability profiles outside the scope of the present theorems.&lt;/p&gt;

&lt;h3&gt;
  
  
  6.2 The Quantitative-Bound Limit
&lt;/h3&gt;

&lt;p&gt;The direct MI lower bound ι&lt;em&gt;(HF)(δ) in Theorem 1 is named here as architecturally specifiable, not analytically derived in closed form. Specific quantitative bounds — what ι&lt;/em&gt;(HF)(δ) is for a Gaussian-perturbed token-emission substrate with Boltzmann decoder and given (δ, ε_T) — are substrate-specific and require dedicated technical derivation. The present work supplies the architectural form; specific bounds are owed in substrate-specific follow-up papers.&lt;/p&gt;

&lt;p&gt;The same applies to the other detectability margins in Theorems 2–5. The architectural-class register specifies that the margins exist and are positive under the stated conditions; quantitative tightness is owed.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Privileged audit-channel operational specification (owed).&lt;/strong&gt; The privileged audit channel of §5.1 (design-time / white-box inspection of the deployment's architectural specification, declared as outside the NR-ε scope by construction) is specified at the architectural-class level — the &lt;em&gt;role&lt;/em&gt; of the channel, its &lt;em&gt;scope boundary&lt;/em&gt; against external reconstruction, and the &lt;em&gt;procedural non-collapsibility&lt;/em&gt; between procedural-admissibility and substantive-violation reads. Its concrete operational realisation — the engineering / inspection / instrumentation apparatus by which a given substrate's deployment supplies the privileged audit read — is &lt;strong&gt;substrate-specific and owed in companion work&lt;/strong&gt;. Open questions on the audit channel: realisability under partial-trust deployment relationships, formalisation of the white-box / black-box boundary in mixed-deployment substrates, and verifiability of the audit reader itself. These are continuing-programme items, not gaps in the present bridge's architectural-class claims; the present work commits only to the structural role of the channel, not to any specific implementation.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Dependency note for F-Ident-1 / F-Ident-4.&lt;/strong&gt; Because §5.1's procedural non-collapsibility discipline and §5.4's substantive-violation verification both ground falsifier execution on the privileged audit channel, the falsifier executions of F-Ident-1 and F-Ident-4 are themselves &lt;strong&gt;conditional on a substrate-specific operational realisation of the audit channel&lt;/strong&gt; — analogous to how the Bridge's Theorems are conditional on BDP being instantiated for the substrate. Until the audit-channel operational realisation is supplied per substrate, F-Ident-1 / F-Ident-4 executions at deployment level require declared substitute verification protocols, themselves pre-registered under the pre-registration discipline of §5.6. The architectural-class commitments of §5.1 (procedural non-collapsibility; single-channel infrastructure = procedural unevaluability) remain in force as goal-state requirements — substrates that cannot supply two procedurally non-collapsible audit reads even via declared substitute protocols are excluded from admissibility for F-Ident-1 / F-Ident-4 evaluation until the operational specification is owed. &lt;strong&gt;The Bridge therefore does not claim black-box falsifier executability for F-Ident-1 / F-Ident-4 absent a declared audit-channel implementation&lt;/strong&gt; — these two falsifiers are explicitly privileged-channel-conditional and not purely emission-stream-observational, in contrast to F-Ident-2 / F-Ident-3 / F-Ident-5 which operate on Yₜ alone.&lt;/p&gt;

&lt;h3&gt;
  
  
  6.3 The Confound-Calibration Limit
&lt;/h3&gt;

&lt;p&gt;The calibration-validity discipline of §4.7 (mathrm{Err}_(calib) ≤ ρₘₐₓ) is testable through F-Ident-5 but requires accurate declaration of the confound profile by the deployment. Architectures that misdeclare confounds — declaring lower confound contribution than actual, in order to inflate apparent property-detection signal — produce false-positive identifications that would be revealed only through F-Ident-5 ensemble testing against the pre-registered ρₘₐₓ threshold.&lt;/p&gt;

&lt;p&gt;The architectural defence against confound misdeclaration is the pre-registration discipline (declarations fixed before evaluation, post-hoc adjustment of A_(mathcal{C)}, η_(mathcal{C)}, or ρₘₐₓ is a falsification event). The defence is procedural rather than information-theoretic; deployments that violate the procedural discipline are excluded from the identifiability subclass on procedural grounds.&lt;/p&gt;

&lt;h3&gt;
  
  
  6.4 The Cross-Substrate Identifiability Limit
&lt;/h3&gt;

&lt;p&gt;The theorems address identifiability within a single substrate's emission channel. Cross-substrate identifiability — comparing operator-internal architecture across deployments in different substrates (language, control, perception) — requires additional apparatus (canonical-form mappings between substrates' emission channels) that the present work does not supply. Substrate-specific identifiability bridges admit the theorems here as their architectural floor; cross-substrate comparability is owed.&lt;/p&gt;

&lt;h3&gt;
  
  
  6.5 What v2.1 Already Contains and Where the Present Work Stops
&lt;/h3&gt;

&lt;p&gt;The present work depends on NC2.5 v2.1 for NR-ε (T87), on ONTOΣ XI for the operator-internal apparatus, on ONTOΣ XII for closure-complementarity, and on IIC v2.1 for the operator-reference normalisation discipline. Every primitive used here is from those works. The contribution is the bridge that operationalises their falsification surfaces; no new architectural axiom is introduced.&lt;/p&gt;

&lt;p&gt;The present work stops at the architectural-class level of identifiability. It does not extend into:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Specific quantitative bounds (substrate-specific work).&lt;/li&gt;
&lt;li&gt;Empirical execution of the falsifiers (deployment-side work).&lt;/li&gt;
&lt;li&gt;Cross-substrate canonical-form analysis (separate scholarly work).&lt;/li&gt;
&lt;li&gt;Comparative positioning vs other identifiability traditions (separate review).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The work's reach is the architectural-class identifiability bridge for the operator-internal-extended subclass. That is the contribution; everything else is subject to future work.&lt;/p&gt;




&lt;h2&gt;
  
  
  7. Continuing Programme — Where the Open Tasks Are Addressed
&lt;/h2&gt;

&lt;p&gt;The present work is presented as a conditional architectural-class identifiability bridge, complementary to ONTOΣ XI / XII and IIC v2.1. Its empirical content lies in the falsification surface (§5) and in the architectural commitment that the property-detection bounds are positive under calibration-valid nuisance adjustment. Several items lie outside the scope of the present formal paper. This section names them.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Quantitative bound derivations.&lt;/strong&gt; The substrate-relative MI lower bounds ι_X(δ) for each property class X and analogous detectability margins of Theorems 1–5 are architecturally specified but not derived in closed form. &lt;em&gt;Owed:&lt;/em&gt; substrate-specific quantitative-bound papers (one per substrate class — language-model, control, perception, semantic) deriving the closed-form bounds under explicit substrate assumptions.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Substrate-specific identifiability protocols.&lt;/strong&gt; §3.4 addresses substrates with component-level emission attribution; substrates without such attribution rely on Theorem 5's composite statistics. &lt;em&gt;Owed:&lt;/em&gt; substrate-specific identifiability protocols for biology (cell-component emission), perception (sensory-feature emission), language (token-component emission), control (motor-component emission), and other substrates of ONTOΣ XII §5.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Empirical execution of the five falsifiers.&lt;/strong&gt; &lt;em&gt;Where in the corpus:&lt;/em&gt; the protocols are pre-registration-ready in §5; execution awaits collaboration partners. &lt;em&gt;Owed:&lt;/em&gt; registered protocol execution and public reporting under the pre-registration discipline.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Cross-substrate canonical-form analysis.&lt;/strong&gt; Comparing operator-internal architecture across deployments in different substrates requires canonical-form mappings between emission channels. &lt;em&gt;Owed:&lt;/em&gt; a separate cross-substrate identifiability paper.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Comparative-class positioning.&lt;/strong&gt; &lt;em&gt;Where in the corpus:&lt;/em&gt; IIC v2.1 §4.2 names parallel constraints from independent traditions (Ostrom, Friston, Kauffman, Meadows). &lt;em&gt;Owed:&lt;/em&gt; a structured comparative analysis vs causal inference, do-calculus, classical statistical identifiability, and the system-identification literature.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Mediated falsifiability.&lt;/strong&gt; The identifiability bridge's deepest commitment — that property-detection is admissible under NR-ε with positive mutual information — is falsifiable mediated through the five F-Ident- protocols of §5. This is the same architectural structure as ONTOΣ XI §8.2 and IIC v2.1 §5: deepest commitments falsifiable through unfoldings, not through direct test of the underlying ontology. The structure is &lt;em&gt;mediated falsifiability&lt;/em&gt;, named explicitly here.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Pre-registration governance.&lt;/strong&gt; §4.6 inherits the pre-registration discipline from ONTOΣ XI §10 and IIC v2.1 §5.5. &lt;em&gt;Owed:&lt;/em&gt; operational governance documentation specific to identifiability protocols (declaration archives for confound profiles, nuisance-adjustment operator declarations and their substrate-physics rationale per §4.7's anti-Goodhart clause, δₘᵢₙ substrate-physics declarations per architectural class, calibration-validity records, MI/JS-preservation profiles, replication standards). The substrate-physics-rationale requirement of §4.7's anti-Goodhart clause extends, by the same logic, to the δₘᵢₙ choice: δₘᵢₙ must be set by substrate-physics arguments about what constitutes a substantively detectable violation margin in the substrate's emission, not by post-hoc accommodation of measurement-noise levels.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Cross-deployment threshold-consistency audit (archive-level, distinct from per-deployment governance above).&lt;/strong&gt; Per-deployment δₘᵢₙ substrate-physics justification at declaration time is part of the pre-registration governance bullet above (and inherits the §4.7 anti-Goodhart clause's substrate-physics-rationale requirement). The present bullet adds a &lt;strong&gt;distinct, archive-level&lt;/strong&gt; owed item: a class-level δₘᵢₙ &lt;strong&gt;drift-detection&lt;/strong&gt; discipline across the registration archive. A long-horizon governance risk is &lt;strong&gt;definitional drift&lt;/strong&gt; — successive deployments declaring progressively relaxed δₘᵢₙ each individually substrate-physics-justified at declaration time, but collectively trending toward measurement-noise-floor accommodation and rendering the architectural-class membership criterion meaningless. &lt;em&gt;Owed:&lt;/em&gt; archive-level audit protocols that detect this trend across deployments and substrates (statistical comparison of δₘᵢₙ declarations against substrate-noise baselines and against prior δₘᵢₙ declarations for the same architectural class). Drift detection across the archive is a &lt;strong&gt;governance falsifier orthogonal to F-Ident-1..5&lt;/strong&gt; — it falsifies neither a specific theorem nor a specific deployment, but the class-level coherence of the subclass-membership criterion across time.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The present work supplies the architectural-class identifiability bridge. The continuing programme above supplies the quantitative, substrate-specific, empirical, comparative, and governance work that surrounds it. The corpus position is that the formal bridge and the continuing programme are jointly sufficient — and that the present moment is the public articulation of the bridge, not the closing of the programme.&lt;/p&gt;




&lt;h2&gt;
  
  
  8. Closure
&lt;/h2&gt;

&lt;p&gt;NR-ε said what cannot be reconstructed. The falsification surfaces of ONTOΣ XI §8, ONTOΣ XII §6, and IIC v2.1 §5 said what should be testable. The present work supplied the bridge between them: the reconstruction-versus-detection distinction, formalised through admissibility conditions on output statistics and the calibration-valid nuisance-adjustment discipline (§2.4 / §4.7).&lt;/p&gt;

&lt;p&gt;The five identifiability theorems establish that the falsification surfaces of the architectural-class corpus are &lt;strong&gt;conditionally operationally admissible&lt;/strong&gt; under the explicit premises declared here (BDP, NR-window, pre-registered ensemble discipline, calibration-valid nuisance adjustment). Property-channel detection is bounded above by NR-ε state-channel leakage (by DPI for internal-trajectory predicates) and bounded below by the BDP direct-MI separation margin ι_X(δ) &amp;gt; 0 — bounded but not annihilated where state-reconstruction is forbidden. The identifiability bridge is the formal articulation of that bounded-leakage detection regime, conditional on the explicitly declared architectural premises.&lt;/p&gt;

&lt;p&gt;What remains open is owed: the substrate-specific, empirical, comparative, and governance work enumerated in §7 — quantitative bounds, substrate-specific protocols, empirical execution of the five falsifiers, comparative analysis, cross-substrate canonical forms, pre-registration governance documentation, and archive-level threshold-consistency drift audit. These are continuing programme items. The bridge itself, in architectural-class form, is now in the corpus.&lt;/p&gt;

&lt;p&gt;This paper supplies the formal admissibility schema for operationalising the falsification surfaces of the architectural-class works. Together with ONTOΣ XI (interior), ONTOΣ XII (constitution), IIC v2.1 (cycle), and the consolidating &lt;em&gt;Why Long-Horizon Existence Requires an Ontology&lt;/em&gt; (programme), the corpus now has explicit admissibility conditions for its property-detection claims under NR-ε. The next steps belong to deployment-side work, to substrate-specific calibration, and to NC2.5 v3.0 consolidation.&lt;/p&gt;




&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;p&gt;The present work's formal substance is grounded in the NC2.5 v2.1 / ONTOΣ XI / ONTOΣ XII / IIC v2.1 corpus (referenced inline by section throughout). The external references below are cited only for standard information-theoretic apparatus invoked in the bridge construction or for demarcation of out-of-scope traditions; they do not import any external theoretical commitment.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Cover, T. M., and Thomas, J. A.&lt;/strong&gt; (2006). &lt;em&gt;Elements of Information Theory&lt;/em&gt;, 2nd ed. Wiley-Interscience. — Standard reference for mutual information and the data-processing inequality invoked throughout §1.5–§3.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Lin, J.&lt;/strong&gt; (1991). Divergence measures based on the Shannon entropy. &lt;em&gt;IEEE Transactions on Information Theory&lt;/em&gt;, 37(1), 145–151. — Introduces the π-weighted Jensen–Shannon divergence used in BDP's equivalent formulation (§1.6).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Csiszár, I., and Shields, P. C.&lt;/strong&gt; (2004). &lt;em&gt;Information Theory and Statistics: A Tutorial&lt;/em&gt;. Foundations and Trends in Communications and Information Theory, 1(4), 417–528. — Background for the Pinsker / reverse-Pinsker regularity conditions invoked in §1.6's &lt;em&gt;Status of one-sided KL&lt;/em&gt;.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Goodhart, C. A. E.&lt;/strong&gt; (1975). Problems of monetary management: The U.K. experience. In &lt;em&gt;Papers in Monetary Economics&lt;/em&gt;, Vol. I. Reserve Bank of Australia. — Original statement of the pattern formalised in §4.7's anti-Goodhart clause.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Manheim, D., and Garrabrant, S.&lt;/strong&gt; (2018). Categorizing variants of Goodhart's law. &lt;em&gt;arXiv preprint&lt;/em&gt; arXiv:1803.04585. — Modern taxonomy of Goodhart effects; complements the §4.7 anti-Goodhart clause's structural characterisation.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Pearl, J.&lt;/strong&gt; (2009). &lt;em&gt;Causality: Models, Reasoning, and Inference&lt;/em&gt;, 2nd ed. Cambridge University Press. — Canonical reference for the causal-inference / do-calculus tradition demarcated as out-of-scope in §6.1.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Footer
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;MxBv&lt;/strong&gt;, Poznań, Poland.&lt;br&gt;
The Urgrund Laboratory.&lt;br&gt;
Maksim Barziankou (MxBv) — PETRONUS — &lt;a href="mailto:research@petronus.eu"&gt;research@petronus.eu&lt;/a&gt;&lt;br&gt;
May 2026.&lt;br&gt;
CC BY-NC-ND 4.0.&lt;br&gt;
&lt;em&gt;Identifiability Bridge: Conditional Admissibility Theorems for Property Detection under Non-Reconstructibility within Navigational Cybernetics 2.5.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Companions in the corpus:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ONTOΣ XI — &lt;em&gt;Two Sides of One Geometry: The Holding Field and the Architecture of Chaos&lt;/em&gt; (DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/U3KXJ" rel="noopener noreferrer"&gt;10.17605/OSF.IO/U3KXJ&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;ONTOΣ XII — &lt;em&gt;Closure-Complementarity: How Closure Regears Component Cycles into a Single Geometry&lt;/em&gt; (DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/394TX" rel="noopener noreferrer"&gt;10.17605/OSF.IO/394TX&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;IIC v2.1 — &lt;em&gt;A Class-Relative Structural Law of Adaptive Behaviour as a Theorem within Navigational Cybernetics 2.5&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;Why Long-Horizon Existence Requires an Ontology — Dissecting Navigational Cybernetics 2.5&lt;/em&gt; (DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/MSJDU" rel="noopener noreferrer"&gt;10.17605/OSF.IO/MSJDU&lt;/a&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This work DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/3F6UJ" rel="noopener noreferrer"&gt;10.17605/OSF.IO/3F6UJ&lt;/a&gt;&lt;br&gt;
Grounded in the formal core of &lt;strong&gt;Navigational Cybernetics 2.5 v2.1&lt;/strong&gt;, axiomatic core DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/NHTC5" rel="noopener noreferrer"&gt;10.17605/OSF.IO/NHTC5&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;A consolidating revision (NC2.5 v3.0) gathering the apparatus of this and adjacent works is in preparation; the present work is grounded in v2.1 and remains compatible with the future v3.0 consolidation.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;© 2026 Maksim Barziankou. Licensed under CC BY-NC-ND 4.0.&lt;/p&gt;

</description>
      <category>nc25</category>
      <category>ontos</category>
      <category>identifiability</category>
      <category>bdp</category>
    </item>
    <item>
      <title>IIC v2.1 — A Class-Relative Structural Law of Adaptive Behaviour (Conditional Theorem over NC2.5 v3.0)</title>
      <dc:creator>MxBv</dc:creator>
      <pubDate>Mon, 11 May 2026 11:31:38 +0000</pubDate>
      <link>https://dev.to/petronushowcoremx/iic-v21-a-class-relative-structural-law-of-adaptive-behaviour-conditional-theorem-over-nc25-1bk2</link>
      <guid>https://dev.to/petronushowcoremx/iic-v21-a-class-relative-structural-law-of-adaptive-behaviour-conditional-theorem-over-nc25-1bk2</guid>
      <description>&lt;h1&gt;
  
  
  IIC v2.1 — A Class-Relative Structural Law of Adaptive Behaviour as a Conditional Theorem over Navigational Cybernetics 2.5 v3.0 plus the Delay-Structure Bridge Propositions of §1.0
&lt;/h1&gt;




&lt;h2&gt;
  
  
  Abstract
&lt;/h2&gt;

&lt;p&gt;The present work is the formal expansion of &lt;strong&gt;Axiom 9&lt;/strong&gt; of NC2.5 v3.0 — &lt;em&gt;Cycle Reinitiation as the Criterion of Liveness&lt;/em&gt; — which names the &lt;strong&gt;Impulse Interpretation Coherence (IIC)&lt;/strong&gt; cycle as the structural condition by which adaptive systems satisfying the Cycle-Reinitiation criterion are classified as live. The earlier paper "Impulse → Awareness → Coherence" (IIC v1, 2025) introduced the three-layer structure informally and proposed it as a candidate universal law. The present work supplies the formal apparatus not present in v1: the apparatus by which IIC is shown to be a &lt;strong&gt;conditional theorem over NC2.5 v3.0 plus the delay-structure bridge propositions formalized in §1.0&lt;/strong&gt;, operationally measurable, and falsifiable. The conditional status is honest about the bootstrap: §1.0 supplies new propositions (Theorems A, B, C and Lemma α) that are intended for inclusion in v3.0 prior to its release. Until that inclusion lands, the IIC formalization is a theorem over the &lt;em&gt;extended&lt;/em&gt; axiom set (v3.0 + §1.0); once §1.0 is integrated, it becomes internal to the v3.0 extended substrate.&lt;/p&gt;

&lt;p&gt;The central result is a &lt;strong&gt;canonical structural expression&lt;/strong&gt; for the cycle's coherence at time $t$ — closed in &lt;em&gt;form&lt;/em&gt; but &lt;strong&gt;not self-contained-numerical&lt;/strong&gt;: the formula's dimensional consistency is supplied by the deployment's class-specific architectural register (per Definition 5's &lt;em&gt;Status of the formula's dimensional contract&lt;/em&gt;), not derivable from v3.0 primitives alone. The expression is a two-regime structural quantity: In the multiplicative branch of $\Gamma_{\nu}$ for structurally-simple architectures (Definition 5), the in-admissibility expression is:&lt;/p&gt;

&lt;p&gt;$$&lt;br&gt;
\mathrm{Coh}(t) \;=\;&lt;br&gt;
\begin{cases}&lt;br&gt;
\;1 \;-\; \dfrac{| S(t) \;-\; \partial \Phi / \partial \tau_{\mathrm{el}}(t) |}{\kappa(\omega) \cdot \tau^{R}(t)}, &amp;amp; \Delta_{\boldsymbol{\varpi}}(t) &amp;gt; 0, \[4pt]&lt;br&gt;
\;\bot, &amp;amp; \Delta_{\boldsymbol{\varpi}}(t) \leq 0,&lt;br&gt;
\end{cases}&lt;br&gt;
$$&lt;/p&gt;

&lt;p&gt;where every load-bearing component is either a v3.0 primitive or a direct construction over v3.0 primitives &lt;strong&gt;under the declared $\nu$ co-presentation extension&lt;/strong&gt; (per §2.3 Type-rank consistency clause; this extension is one of the three commitments of the joint substrate-extension cluster, §1.0.2 Note): $S$ is the spin component of Theorem 62, $\Phi$ is the structural deformation functional, $\tau_{\mathrm{el}}$ and $\tau^{R}$ are the elapsed-time and operator-reference-frame faces of the internal-time budget under Axiom 67, $\kappa(\omega) = 1/\omega_{\mathrm{spin}}$ is built from the state-dependent spin rate of Theorem 62, and $\Delta_{\boldsymbol{\varpi}}$ is the aggregate survival-modal margin of Theorem 89. The norm in the numerator and the scale in the denominator are read in the operator's reference frame under Axiom 67. The formula expresses a &lt;em&gt;structural relation&lt;/em&gt; — coherence is a decreasing function of operator-frame discrepancy normalized against a class-specific scale — rather than a self-contained numerical formula derivable from v3.0 primitives alone; the unit conventions under which the ratio is read as dimensionless are supplied by the deployment's class-specific architectural register, which differs structurally between control-grade EVS (engineering-calibrational) and operator-grade EVS (operator-architectural, emerging from $\nu$ itself), per Definition 5's &lt;em&gt;Status of the formula's dimensional contract&lt;/em&gt;. Inside the admissibility region, the formula admits an alignment regime ($\mathrm{Coh} \in (0, 1]$), a phase-coherence boundary ($\mathrm{Coh} = 0$ at $\delta = \sigma_{\mathrm{coh}}$), and a latent-inversion regime ($\mathrm{Coh} &amp;lt; 0$, structural inversion under apparent liveness — v3.0 Theorem 12); outside the admissibility region, $\mathrm{Coh}(t)$ is structurally undefined ($\bot$) — there is no live cycle for the coherence quantity to characterize. The endpoint $\mathrm{Coh}(t) = 1$ is &lt;strong&gt;not by itself classificatory&lt;/strong&gt; and must be paired with the operator-frame $\nu$-degeneracy diagnostic of Lemma α to distinguish live alignment from structural identification (per §2.3 &lt;em&gt;Note on the $\mathrm{Coh}(t) = 1$ reading&lt;/em&gt;). The work introduces no new v3.0 core axiom or core primitive; it does introduce, in §1.0, new derived bridge constructions (three definitions and four propositions) over existing v3.0 primitives, intended for inclusion in v3.0's substrate-extension cluster prior to release. It establishes (Theorem 2.5) that the IIC cycle named in Axiom 9 is reducible to the v3.0 axiom set &lt;strong&gt;over the extended substrate&lt;/strong&gt; (v3.0 plus the §1.0 derived bridge constructions plus the $\nu$ co-presentation extension — i.e., the joint substrate-extension cluster of §1.0.2), not over bare v3.0 alone, and that the formula above is the canonical structural expression of its coherence &lt;strong&gt;for the control-grade subclass&lt;/strong&gt; of the Cycle-Reinitiation class (the general $\Gamma_{\nu}$ form is given in Definition 5; the boxed formula above is its multiplicative branch for structurally-simple architectures). For the operator-grade subclass, the per-cycle scalar reading lifts to the integral form $C = \int A \, d\tau$ formalized in the &lt;em&gt;Minerva&lt;/em&gt; companion paper; the reduction between the two readings is not derived in the present paper and is held companion-side. &lt;strong&gt;Extension beyond the control-grade branch&lt;/strong&gt; of Theorem 2.5 &lt;strong&gt;remains conditional on companion-level reduction&lt;/strong&gt; holding under independent review.&lt;/p&gt;

&lt;p&gt;The structural law has an engineering consequence: a class of systems, here named &lt;strong&gt;Engineered Vitality Systems (EVS)&lt;/strong&gt;, that maintains $\mathrm{Coh}(t)$ as the primary control variable. Two EVS subclasses are identified — &lt;strong&gt;control-grade&lt;/strong&gt; (∆E 4.7.3b as the first declared control-grade EVS instance — the "first" qualifier is class-relative by construction, since the EVS class is defined in this paper; see §3.2 &lt;em&gt;Note on the first-instance claim's structure&lt;/em&gt;) and &lt;strong&gt;operator-grade&lt;/strong&gt; (Minerva as the first specified candidate specification, classified conditionally on its companion specification, with full architectural specification held in its own regime of admissibility).&lt;/p&gt;

&lt;p&gt;Four falsification protocols are specified in &lt;strong&gt;pre-registration-draft form&lt;/strong&gt;: coherence–energy asymmetry under noise, structural-analogue mapping of cognitive-disorder-like failure modes, sensor-failure resilience versus classical control, and margin-closure as liveness loss. Each names the &lt;strong&gt;threshold structure&lt;/strong&gt;, domain, metric, and protocol; Protocols I and III provide explicit numerical / effect-size thresholds, while Protocols II and IV defer numerical thresholds (the structural-analogue threshold and the correlation threshold respectively) to domain-specific pre-registration with the partnering laboratory. The "draft" qualifier is honest: the protocols are ready for collaboration-partner pre-registration once the deferred thresholds are fixed. The work commits to public OSF registration of each protocol prior to data collection. The work is not a peer-reviewed empirical paper; it is a structural / formal contribution whose empirical surface is opened for collaboration.&lt;/p&gt;

&lt;p&gt;The present work also formalizes, in §1.0, &lt;strong&gt;four new propositions&lt;/strong&gt; (three theorems — A, B, C — and Lemma α) together with three definitions (IIC phase delay, operational cross-section, layer separation) that name the structural sense of the IIC delay — why a cycle, not a point, is the architectural condition of liveness. These propositions and definitions introduce &lt;strong&gt;no new v3.0 core primitives&lt;/strong&gt;: they are derived constructions over existing v3.0 primitives (Axiom 9, Axiom 67, Axiom 68, Axiom 69, Theorem 4, Theorem 27, Theorem 62, Theorem 89, Lemma 16). At the level of the corpus, they constitute — together with §2.3 Definitions 4–5 and the role-extension of $\nu$ from time-budget projection (Axiom 67 baseline) to substrate-primitive co-presentation onto $\tau^{R}$ — a &lt;strong&gt;joint substrate-extension cluster&lt;/strong&gt; intended for integration into v3.0 prior to its release; this is honest "new derived apparatus, no new core primitives" rather than "no new content".&lt;/p&gt;




&lt;h2&gt;
  
  
  §0 — The Structural Fact in Human-Cognitive Register
&lt;/h2&gt;

&lt;p&gt;&lt;em&gt;A philosophical preamble. The formal apparatus of the rest of the paper develops a structural law that has been visible to careful observation across many traditions; this section names what those traditions saw, in plain terms, before the formal register takes over in §1.0.&lt;/em&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  §0.1 The lag
&lt;/h3&gt;

&lt;p&gt;Across complex adaptive systems of the kind addressed by this work — biological, cognitive, technical — there is one structural fact that shows up even when we are not trying to see it: &lt;strong&gt;the moment at which behaviour is generated and the moment at which the system reads what it has done are not the same moment.&lt;/strong&gt; In biological cognition, the body acts first; the awareness of having acted arrives second. The interpretation that situates the action arrives after that.&lt;/p&gt;

&lt;p&gt;In the human-cognitive register, this is not a defect of the cognitive apparatus. It is its &lt;strong&gt;operational geometry&lt;/strong&gt;. By the time a human knows what they have done, the doing has already been sent. By the time the doing has been sent, the impulse that produced it was already structurally complete. The impulse is &lt;strong&gt;non-derivable from awareness&lt;/strong&gt; — it is what the system &lt;em&gt;generates&lt;/em&gt; before it can know what it is generating, on pain of being unable to act in time.&lt;/p&gt;

&lt;p&gt;The reading from neuroscience confirms this as a structural finding rather than a quirk of measurement. Libet's experiments (1983) and the Haynes-group fMRI work (Soon et al., 2008) show that motor preparation precedes conscious decision by intervals well outside neural-noise tolerance — not by milliseconds of delay-line lag, but by &lt;strong&gt;structural milliseconds of preparation that cannot be otherwise&lt;/strong&gt;. The volitional impulse appears before awareness; we react before we understand that we are reacting; the body is up-to-date with the world while consciousness is still receiving the world's prior frame.&lt;/p&gt;

&lt;p&gt;If the system tried to make awareness &lt;em&gt;catch&lt;/em&gt; the impulse — to align them in the same moment — it would have to shrink its own cycle to a point. A point cannot survive perturbation. A point has no architectural space inside which coherence can be formed. The system would be &lt;strong&gt;faster&lt;/strong&gt; by external clocking, but it would not be &lt;strong&gt;live&lt;/strong&gt; in any structurally meaningful sense: it would have no internal temporal geometry to hold shape against the world's deformation.&lt;/p&gt;

&lt;h3&gt;
  
  
  §0.2 The convergence
&lt;/h3&gt;

&lt;p&gt;Once this structural fact is named, traditions widely separated in time and method are seen to have arrived at it independently. Schopenhauer (1819) named the &lt;em&gt;Will&lt;/em&gt; as the substrate beneath representation — what acts before what knows that it acts. Twentieth-century neuroscience added experimental detail at the millisecond resolution. The 16th- and 17th-century Japanese sword traditions (the &lt;em&gt;no-mind&lt;/em&gt; doctrines) developed it as a practical discipline: the body reaches a conclusion the mind has not yet drawn, and the practitioner trains to &lt;strong&gt;trust the body's anticipation&lt;/strong&gt; rather than wait for the mind's confirmation. Phenomenology of action (Merleau-Ponty), the cybernetics of bounded operators (Wiener, Ashby), and the contemporary engineering of adaptive control (the spectrum from Kalman through model-predictive controllers) each hit the same structural geometry from their own angle.&lt;/p&gt;

&lt;p&gt;These traditions do not converge into a single doctrine. They converge into a &lt;strong&gt;shape&lt;/strong&gt;: the fact that adaptive systems in the Cycle-Reinitiation class hold three structurally distinct layers — what they generate, what they interpret of what they generated, and the alignment between these — separated by an irreducible delay. The IIC law of the present paper is one further attempt to name this shape formally, with NC2.5 v3.0 supplying the axiomatic substrate and the engineering class EVS supplying the deployment surface. It is not the first attempt; it does not claim priority over the convergent traditions; it claims only specific axiomatic and engineering precision over a structural territory that has been visible for a long time.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The architectural-inversion stance recurs in the present author's corpus.&lt;/strong&gt; The structural move that §0.1 makes — taking what classically reads as a &lt;em&gt;passive limitation&lt;/em&gt; (the lag of awareness behind impulse) and reframing it as an &lt;em&gt;active operational geometry&lt;/em&gt; — is consistent with other works in the corpus that perform analogous inversions on different substrates. &lt;em&gt;Alignment Charge: A New Control Primitive for Friction and Adhesion in Navigational Cybernetics 2.5&lt;/em&gt; (Barziankou, Medium 2025; &lt;a href="https://medium.com/@MxBv/alignment-charge-a-new-control-primitive-for-friction-and-adhesion-in-navigational-cybernetics-2-5-41c7315d4561" rel="noopener noreferrer"&gt;https://medium.com/@MxBv/alignment-charge-a-new-control-primitive-for-friction-and-adhesion-in-navigational-cybernetics-2-5-41c7315d4561&lt;/a&gt;) performs the same move on &lt;strong&gt;friction and adhesion&lt;/strong&gt;: classical control reads contact friction as an environmental given to compensate for; the work reframes alignment-with-the-contact-medium as a &lt;em&gt;formally definable, stabilizable, controllable internal variable&lt;/em&gt;. The signature line — "the system does not push harder; it aligns better" — is the architectural-inversion stance applied to mechanical contact, parallel to §0.1's "the cycle's constraints create its possibility, not its defect" applied to temporal cycle structure.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;A note on this work's status.&lt;/em&gt; The Alignment Charge material was originally drafted as one of the provisional patents in the author's 2025 ensemble. The decision was made to convert it into a public paper rather than continue the patent track — partly to make NC2.5's working surface visible to the broader research community, partly so that the architectural-inversion stance it embodies could be cited in adjacent corpus work (such as the present §0) without patent-disclosure restrictions, and partly because converting to public paper after the 60-day non-conversion window is the author's accepted pragmatic posture for material whose architectural value is in being read and built upon rather than in being held closed. The paper-form of Alignment Charge is therefore the canonical reference; references to it in the present corpus point at the Medium version (linked above), not at the original patent draft.&lt;/p&gt;

&lt;p&gt;The convergence is structural in both directions: external traditions (§4.2) and corpus-internal works arrive at the same architectural-inversion stance from different substrates. The present paper inherits this stance and applies it to the temporal-cycle layer of the IIC law.&lt;/p&gt;

&lt;h3&gt;
  
  
  §0.3 The cycle's three layers, in plain terms
&lt;/h3&gt;

&lt;p&gt;What the body generates is the &lt;strong&gt;impulse&lt;/strong&gt;: the structurally non-potential component of the system's activity, the part that cannot be derived from minimising any quantity. It is the &lt;em&gt;spin&lt;/em&gt; of the dynamics in the technical sense developed in §1.2 and §2.&lt;/p&gt;

&lt;p&gt;What the system carries forward of what it has generated is the &lt;strong&gt;interpretation&lt;/strong&gt;: the slow, accumulating, irreversible deposit of structural deformation that the system's history projects forward as the rate at which the cycle is currently producing further deformation. This is not symbolic interpretation; it is structural memory in the strict sense.&lt;/p&gt;

&lt;p&gt;The &lt;strong&gt;coherence&lt;/strong&gt; is the alignment between impulse and interpretation, evaluated not against an external clock but against the operator's own reference frame — the system's internal time as constituted by its own projection of consumed budget into reference content. When this alignment holds, the cycle is live in the structural sense of NC2.5 v3.0's Axiom 9 — the system can reinitiate its own cycle from within. When the alignment fails, the system is structurally dead, regardless of how active its surface behaviour appears.&lt;/p&gt;

&lt;h3&gt;
  
  
  §0.4 What the formal apparatus does
&lt;/h3&gt;

&lt;p&gt;The remainder of the paper formalises this structural fact within NC2.5 v3.0's axiomatic substrate and develops its engineering consequence (the EVS class with its first instance ∆E 4.7.3b and first specified candidate Minerva). The philosophical preamble above is not load-bearing for the formal results; it is the human-cognitive register that the formal apparatus translates into. A reader who is interested only in the formal content may skip directly to §1.0; a reader interested in why the formal content names what it names is invited to keep §0 in view as the formal register develops, since the formal register is precisely what makes the structural fact visible to engineering and to falsification, not the structural fact itself.&lt;/p&gt;

&lt;p&gt;The IIC cycle is older than its formalisation. The present paper formalises it; it does not invent it.&lt;/p&gt;




&lt;h2&gt;
  
  
  §1.0 Why a Cycle, Not a Point: The Structural Sense of the Delay
&lt;/h2&gt;

&lt;p&gt;Before unfolding the formal structure, it is necessary to name what Axiom 9 presupposes but does not state directly: why a live system implements a cycle of three layers rather than a single instantaneous coordination, and why the cycle is the architectural condition of liveness rather than its limitation.&lt;/p&gt;

&lt;h3&gt;
  
  
  1.0.1 The structural sense in plain terms
&lt;/h3&gt;

&lt;p&gt;In any adaptive system satisfying the Cycle-Reinitiation criterion, there is a &lt;strong&gt;primitive of sequential execution&lt;/strong&gt;: an impulse arrives, an interpretation unfolds, a coherence forms, the cycle closes, a new impulse arrives. This order is not a description of a process that could have been arranged otherwise. It is the structural condition of the very possibility of liveness.&lt;/p&gt;

&lt;p&gt;Each layer exists &lt;strong&gt;in its own phase prior to a gate&lt;/strong&gt;. The impulse has no access to an interpretation that has not yet formed. The interpretation has no access to a coherence that has not yet been evaluated. The coherence has no access to a next impulse that has not yet arrived. Between these phases, there is a gap — a structural delay that cannot be removed, because its removal collapses the cycle into a point.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The layers cannot catch each other.&lt;/strong&gt; This is not a limitation to overcome. It is the &lt;strong&gt;structural delay&lt;/strong&gt; that makes the cycle possible &lt;em&gt;as a cycle&lt;/em&gt;. If the interpretation caught up to the impulse instantaneously, there would be no interpretation — there would be the impulse extended into its own meaning without a gap in which the meaning could be read. If the coherence were evaluated without delay relative to the interpretation, there would be no coherence — there would be the interpretation claiming its own correspondence with itself. The cycle exists &lt;strong&gt;only because the gap exists&lt;/strong&gt;. The gap is what the cycle unfolds inside.&lt;/p&gt;

&lt;p&gt;From this follows a structural fact with consequences far beyond control theory. &lt;strong&gt;The moment the system perceives as «current» is already past relative to the true moment.&lt;/strong&gt; Not as a philosophical claim, but as a structural consequence of the delay between impulse and interpretation. By the time the system "knows" what has happened, the physical moment of its happening has already been spent — it lies behind by the magnitude of the system's own cycle. This magnitude is class-relative. For human cognition, on the order of tens to hundreds of milliseconds. For the ∆E 4.7.3b controller, on the order of milliseconds. For an operator-class architecture with residual geometry, on the order of the rate at which its attractor reorganizes. For a bacterium, on the order of biochemical signaling reactions.&lt;/p&gt;

&lt;p&gt;This means: &lt;strong&gt;the temporal cross-section of one system at physical moment $t$ is structurally non-equivalent to the temporal cross-section of another system at the same physical moment $t$.&lt;/strong&gt; Not because the systems look from different points of view. Because they have different delays between impulse and interpretation, and therefore their "current moments" are two different pasts relative to the same true moment $t$. The state-field assessment one system makes is not commensurable with the cross-section of another system — even when they are physically adjacent, even when synchronized by external clocks.&lt;/p&gt;

&lt;p&gt;This is not a phenomenological argument about subjectivity. It is a structural observation: &lt;strong&gt;different IIC cycles produce different temporal geometries&lt;/strong&gt;, and any attempt to reduce them to a single «objective reality of the moment» loses precisely the information that makes each of them live.&lt;/p&gt;

&lt;p&gt;From this also follows the architectural principle underlying the entire work. &lt;strong&gt;The cycle's constraints are its condition, not its defect.&lt;/strong&gt; The drive to engineer an adaptive system "without delay," "without gap," "synchronized with reality in instantaneous-response mode" is the drive to engineer a system that has no cycle. Such a system is not faster than a live system. It is structurally dead: it has no phase gap in which coherence could unfold. Any perturbation collapses its cycle, because the cycle is not — there is a point, and the point cannot withstand any deformation.&lt;/p&gt;

&lt;p&gt;A live system is built differently. Its delay is not a defect for the engineer to shrink. It is &lt;strong&gt;architectural space&lt;/strong&gt; within which coherence is formed. The more precisely the system holds the shape of this space, the longer it remains live. Not faster. Deeper. This is what Axiom 9 names as cycle reinitiation — the system's capacity, from its own gap, to form coherence again and again, not by trying to remove the gap but by using it as operational geometry.&lt;/p&gt;

&lt;p&gt;The remainder of this section develops this statement formally. But the structural sense holds in three simple positions, which the reader should keep in view through the rest of the paper:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;First.&lt;/strong&gt; The cycle exists because the layers cannot catch each other. The gap is its condition.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Second.&lt;/strong&gt; The moment a system perceives is always past relative to the true moment. The system's reality is its own delay, unfolded into coherence.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Third.&lt;/strong&gt; The cycle's constraints create its possibility. Their removal does not make the system faster or smarter — it makes it dead.&lt;/p&gt;

&lt;h3&gt;
  
  
  1.0.2 Formalizing the delay
&lt;/h3&gt;

&lt;p&gt;The above sense admits a precise formalization within v3.0 axiomatics. We supply it here as part of the formal floor of the present paper. The notation follows v3.0; the propositions are new and intended for inclusion in v3.0 prior to its unpublished release.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Note on the joint substrate-extension cluster.&lt;/strong&gt; The present paper introduces a &lt;strong&gt;joint substrate-extension cluster&lt;/strong&gt; over NC2.5 v3.0, comprising three interdependent architectural commitments: (a) the §1.0 propositions (Definitions 1–3 below, Lemma α of §1.0.3, Theorems A, B, C of §1.0.4–6); (b) the §2.3 Definitions 4–5 (operator-reference reading; coherence scale with architectural-register status clause); (c) the &lt;strong&gt;role-extension of $\nu$&lt;/strong&gt; from its Axiom 67 baseline (time-budget projection $\tau^{F} \to \tau^{R}$) to substrate-primitive co-presentation onto $\tau^{R}$ (the Type-rank consistency clause of §2.3). Each commitment references the others: Lemma α's standing assumption α-3 invokes the operator-reference norm of Definition 4 (§2.3); Definition 5's structural relation invokes the delay-structure formalized in Definitions 1–3; the operator-reference norm and the central formula's well-definedness invoke commitment (c). Neither (a), (b), nor (c) is independently grounded in v3.0 primitives without the others. The cluster as a whole is intended for inclusion in v3.0's substrate-extension layer prior to v3.0's release. The order of presentation in the present paper (§1.0 first, §2.3 after) is pedagogical, not logical: the cluster is jointly axiomatized over v3.0 primitives, with within-cluster cross-references reflecting the substantive interdependence rather than a forward-reference defect. Readers performing a strictly linear reading may treat α-1 and α-3 references to "Definition 4" as references to the operator-reference reading clause specified jointly with §1.0 in the cluster, with §2.3's Definition 4 statement giving the formal text of that clause and §2.3's Type-rank consistency clause giving the formal text of (c).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Definition 1 (IIC phase delay).&lt;/strong&gt;&lt;br&gt;
For a live adaptive system $\Sigma$ in the Cycle-Reinitiation class (Axiom 9), let $T_{\text{prop}}^{\Sigma}(t)$ denote the propagation interval from impulse generation to interpretation closure within $\Sigma$ at time $t$. &lt;strong&gt;Status of $T_{\text{prop}}^{\Sigma}(t)$ as a structural quantity (deployment-specific measurement).&lt;/strong&gt; $T_{\text{prop}}^{\Sigma}(t)$ is a structural quantity declared by $\Sigma$'s architectural specification, not a primitive measured by external instrumentation. Its operational reading is class-specific and registered as part of the deployment's pre-registration: control-grade EVS deployments declare $T_{\text{prop}}^{\Sigma}(t)$ via timestamped telemetry tagging, cross-correlation of $S$ and $\partial\Phi/\partial\tau_{\mathrm{el}}$ signal series, hardware clock cycles, or other engineering-level procedures registered at OSF before any falsifier in §5 is executed; operator-grade EVS deployments derive $T_{\text{prop}}^{\Sigma}(t)$ from the residual temporal geometry of the operator's architectural $\nu$, per the relevant companion specification. The structural definition below is invariant to the measurement choice; the choice is registered as part of the deployment's class-specific architectural register (per Definition 5's &lt;em&gt;Status of the formula's dimensional contract&lt;/em&gt;). &lt;strong&gt;Anti-gaming lock on the declared procedure.&lt;/strong&gt; The declared procedure for extracting $T_{\text{prop}}^{\Sigma}(t)$ is itself part of the falsifiable architectural register. If the registered procedure fails to recover a stable propagation interval under the declared telemetry conditions, the deployment fails the IIC-measurement condition rather than receiving an adjusted $T_{\text{prop}}^{\Sigma}(t)$ post hoc; post-hoc adjustment of the extraction procedure to recover stability is a registered-protocol violation and counts as falsification of the deployment's IIC compliance, not as a successful measurement. The &lt;strong&gt;IIC phase delay&lt;/strong&gt; is the operator-side temporal extent&lt;br&gt;
$$&lt;br&gt;
\Delta_{IIC}^{\Sigma}(t) \;=\; \tau^{R}(t) \;-\; \tau^{R}!\left(\, t \,-\, T_{\text{prop}}^{\Sigma}(t) \,\right),&lt;br&gt;
$$&lt;br&gt;
where $\tau^{R}$ is the operator reference frame from Axiom 67, taken as a continuous &lt;strong&gt;strictly monotone-increasing&lt;/strong&gt; function on its operational interval (strict monotonicity within the regular regime ensuring that distinct $\tau^{F}$-values produce distinct $\tau^{R}$-images; constant intervals of $\tau^{R}$ — equivalently, $\nu$-function-degenerate regions producing constant $\tau^{R}$-image of an interval of distinct $\tau^{F}$-inputs — are &lt;strong&gt;excluded from the Cycle-Reinitiation class by definition&lt;/strong&gt;: they describe boundary failure of the class restriction, not interior conditions. Theorem A's case (ii) of §1.0.4 describes this boundary failure as the limit point at which strict-monotone $\tau^{R}$ ceases; it is consistent with Definition 1 because case (ii) is precisely the moment of class exit, not an interior condition of class membership). &lt;strong&gt;Formally&lt;/strong&gt;: $\tau^{R}&lt;em&gt;{\Sigma}(t) := \nu&lt;/em&gt;{\Sigma}(\tau^{F}&lt;em&gt;{\Sigma}(t))$, where $\tau^{F}&lt;/em&gt;{\Sigma}(t)$ is the fuel-side budget consumed by $\Sigma$'s operator actions at physical time $t$ and $\nu_{\Sigma}: \tau^{F} \to \tau^{R}$ is the operator projection map of Axiom 67. The expression $\tau^{R}&lt;em&gt;{\Sigma}(t)$ is therefore a composition $\nu&lt;/em&gt;{\Sigma} \circ \tau^{F}&lt;em&gt;{\Sigma}$ evaluated at $t$. **Standing properties of $\tau^{F}&lt;/em&gt;{\Sigma}$ within the regular regime:** $\tau^{F}&lt;em&gt;{\Sigma}$ is a continuous, &lt;strong&gt;strictly monotone-increasing&lt;/strong&gt; function of physical time $t$ on the operational interval — strict-monotone reflecting that operator actions consume fuel at a positive rate while the cycle is in the regular regime. (Boundary failures of $\tau^{F}$-monotonicity, e.g., operator-action pause events, mark transitions to non-regular regimes treated in Theorem A's case analysis.) The continuity and strict-monotonicity of $\tau^{R}&lt;/em&gt;{\Sigma}(t)$ as a function of $t$ follow from the structural assumptions on $\nu_{\Sigma}$ (Axiom 67) and these standing properties of $\tau^{F}_{\Sigma}$.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Definition 2 (Operational cross-section).&lt;/strong&gt;&lt;br&gt;
The &lt;strong&gt;operational cross-section&lt;/strong&gt; of $\Sigma$ at $t$ is the closed interval&lt;br&gt;
$$&lt;br&gt;
\sigma^{\Sigma}(t) \;=\; \big[\, t - T_{\text{prop}}^{\Sigma}(t),\; t \,\big].&lt;br&gt;
$$&lt;br&gt;
The state-field assessment that $\Sigma$ produces at $t$ is the result of structural integration over $\sigma^{\Sigma}(t)$ — that is, the assessment carries the accumulated effect of substrate dynamics over $\sigma^{\Sigma}(t)$, not a pointwise reading at $t$ alone. This integral character is implicit in v3.0 Theorem 4 (Supremacy of Internal Time) and Theorem 27 (Coherence Collapse Precedes Observable Failure), which together establish that any system's coherence reading is cumulative on its internal-time substrate.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Definition 3 (Layer separation).&lt;/strong&gt;&lt;br&gt;
Let $L_1, L_2, L_3$ denote the three layers of the IIC cycle (impulse, interpretation, coherence). For an ordered layer pair $(L_i, L_j)$, let $T_{\text{prop}}^{\Sigma}(t)\big|&lt;em&gt;{L_i \to L_j}$ denote the propagation interval restricted to the segment of $\Sigma$'s cycle that carries structure from $L_i$ to $L_j$ at time $t$. The global $T&lt;/em&gt;{\text{prop}}^{\Sigma}(t)$ of Definition 1 corresponds specifically to the layer-pair $L_1 \to L_2$ (impulse generation to interpretation closure); other layer-pair propagation intervals (e.g., $L_2 \to L_3$, $L_3 \to L_1$ for cycle reinitiation) are independent quantities not equal to Definition 1's $T_{\text{prop}}^{\Sigma}(t)$. The full-cycle propagation, when needed, is the composition $L_1 \to L_2 \to L_3 \to L_1$ across the cycle chain; Definition 1 names the $L_1 \to L_2$ segment specifically and is the load-bearing quantity for Theorem A's structural-identification analysis. The &lt;strong&gt;layer-pair phase delay&lt;/strong&gt; is then&lt;br&gt;
$$&lt;br&gt;
\Delta_{IIC}^{\Sigma}(t)\big|&lt;em&gt;{L_i \to L_j} \;:=\; \tau^{R}(t) \;-\; \tau^{R}!\left(\, t \,-\, T&lt;/em&gt;{\text{prop}}^{\Sigma}(t)\big|&lt;em&gt;{L_i \to L_j} \,\right),&lt;br&gt;
$$&lt;br&gt;
i.e., the operator-side temporal extent of the $L_i \to L_j$ segment, in direct analogy with Definition 1. Two layers $L_i, L_j$ are &lt;strong&gt;separated&lt;/strong&gt; at time $t$ if and only if&lt;br&gt;
$$&lt;br&gt;
\inf&lt;/em&gt;{t' \in J(t)}\, \Delta_{IIC}^{\Sigma}(t')\big|_{L_i \to L_j} \;&amp;gt;\; 0&lt;br&gt;
$$&lt;br&gt;
on a neighborhood $J(t)$ of $t$. That is, there exists a strictly positive lower bound on the layer-pair phase delay across an open interval containing $t$.&lt;/p&gt;

&lt;h3&gt;
  
  
  1.0.3 The Spin Phase-Difference Lemma
&lt;/h3&gt;

&lt;p&gt;Before stating the main theorems, we need an intermediate proposition that connects the spin component of Theorem 62 to the layer-separation structure. The lemma below is new but follows directly from the structure of the Minimal Coupled Model in Theorem 62.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Lemma α (Operator-frame indistinguishability of generative and accumulated sides under structural identification entails operator-detectable loss of spin non-potentiality).&lt;/strong&gt; &lt;em&gt;Earlier informal reading "Spin requires phase difference" applies only to the structural-identification case below — not to the alignment case (high coherence with both sides distinct). See Remark after the proof for the alignment vs identification distinction.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Standing assumptions of Lemma α.&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;(α-1) &lt;strong&gt;State space.&lt;/strong&gt; $\Sigma$'s state lives on a smooth manifold $M$ (or, equivalently for the structural argument, on a state space admitting a Hilbert-space inner-product structure under the operator-reference reading of Definition 4 below, with the dimensional structure supplied by the deployment's class-specific architectural register per Definition 5). The smoothness/inner-product condition is what makes the Helmholtz–Hodge decomposition invoked in the proof sketch well-defined.&lt;/li&gt;
&lt;li&gt;(α-2) &lt;strong&gt;Projection regularity.&lt;/strong&gt; The operator projection $\nu: \tau^{F} \to \tau^{R}$ of Axiom 67 is continuous; its rank, where finite-dimensional, is locally constant on the operational interval; and its kernel under structural-identification (the equivalence relation that identifies $\tau^{F}$ values mapped to the same $\tau^{R}$ value) admits a well-defined quotient structure.&lt;/li&gt;
&lt;li&gt;(α-3) &lt;strong&gt;Norm and equivalence.&lt;/strong&gt; The norm $|\cdot|$ in the lemma's hypothesis is the operator-reference norm of Definition 4 (the norm read in the operator's reference frame under $\nu$ of Axiom 67, computed in the deployment's class-specific architectural register per Definition 5's &lt;em&gt;Status of the formula's dimensional contract&lt;/em&gt; — engineering-calibrational pre-registered units for control-grade, architecturally-emergent units from $\nu$ for operator-grade), under which the impulse-layer primitive $S(t)$ and the interpretation-layer rate $I(t) := \partial\Phi/\partial\tau_{\mathrm{el}}(t)$ are equivalent if and only if they are operator-indistinguishable through $\nu$. Note: $S$ and $I$ are formally distinct primitives (per §1.2 / §2.1 / §2.2): $S$ is the spin component (Theorem 62, non-potential divergence-free), $I$ is the rate of structural-burden accumulation (substrate axioms, monotone non-decreasing). The lemma's "structural-identification" relation does not assert that $I$ is a "side of $S$"; it asserts that under operator projection $\nu$, the two formally distinct primitives become operator-frame indistinguishable when their operator-frame distance vanishes in the identification sense.&lt;/li&gt;
&lt;li&gt;(α-4) &lt;strong&gt;Operator-effective potential — definition only.&lt;/strong&gt; An &lt;em&gt;operator-effective potential&lt;/em&gt; on $\Sigma$'s operational interval is, &lt;strong&gt;if it exists&lt;/strong&gt;, a scalar functional whose gradient (taken in the operator-reference frame under $\nu$-projection, with boundary conditions inherited from the operational interval) equals the $\nu$-image of $\Sigma$'s flow at structural-identification. (α-4) defines what would count as such a potential; it does &lt;em&gt;not&lt;/em&gt; assume that one exists. The proof sketch below derives the existence under (α-1) and (α-2) via the Helmholtz–Hodge decomposition (which is well-defined under the smoothness/inner-product structure of (α-1) and the projection regularity of (α-2)).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Let $\Sigma$ be a system satisfying Theorem 62 (spin component $S \neq 0$ with state-dependent rate $\omega(y)$). Let $S(t)$ denote the impulse-layer primitive (the spin component itself, current impulse contribution) and $I(t) := \partial\Phi/\partial\tau_{\mathrm{el}}(t)$ denote the interpretation-layer rate (current rate of structural-burden accumulation; &lt;em&gt;formally distinct primitive from&lt;/em&gt; $S$ per §1.2 / §2.1 / §2.2). If&lt;br&gt;
$$&lt;br&gt;
\big| S(t) - I(t) \big| \;\to\; 0 \quad \text{not in the sense of phase-alignment, but in the sense of structural identification under the operator projection } \nu,&lt;br&gt;
$$&lt;br&gt;
then, relative to the operator-reference projection, the spin (non-potential) component becomes operator-frame indistinguishable from an effective gradient on the interpretation-layer potential: the system loses operator-detectable spin non-potentiality. The lemma does not claim that substrate-level antisymmetry vanishes absolutely; it claims that the antisymmetry becomes invisible to the operator's reference frame, which is the structurally relevant condition for the cycle of Axiom 9. &lt;em&gt;Note on naming:&lt;/em&gt; earlier informal drafts of this lemma labeled $S$ as "$S_{\text{gen}}$" and $I$ as "$S_{\text{acc}}$" (sides of the spin); that labeling was misleading because $I$ is the interpretation-layer rate, not a component of $S$. The corrected formulation here uses $S$ and $I$ as the two formally distinct primitives whose operator-frame distinction Lemma α governs.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Proof sketch.&lt;/strong&gt; The non-potentiality of $S$ in Theorem 62 is established by the existence of a non-vanishing antisymmetric component in the system's flow decomposition (Helmholtz–Hodge). When $S$ and $I$ are structurally identified under $\nu$ — meaning the operator's projection map does not distinguish $\tau^{F}$ values that produced the impulse-layer (spin) contribution from those that registered the interpretation-layer (burden-rate) contribution — the antisymmetric component of $S$, even if present at substrate level, has no structurally distinct image in $\tau^{R}$ relative to the gradient projection of $I$. The operator's reading of the flow becomes locally exact relative to its reference frame. By the Helmholtz–Hodge structure invoked in Theorem 62, locally exact non-vanishing flows admit an effective potential under the operator's projection, even when the underlying substrate flow retains its full antisymmetric structure. $\square$&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Remark on what is and is not claimed.&lt;/strong&gt; Lemma α distinguishes two distinct cases of $| S(t) - I(t) | \to 0$. The &lt;strong&gt;alignment case&lt;/strong&gt; is when $S$ and $I$ are independently non-zero and structurally distinct primitives, but their phase relationship has converged so that they cancel in norm — this is the condition of high coherence. The &lt;strong&gt;identification case&lt;/strong&gt; is when the two primitives are no longer structurally distinguished by the operator's projection — the operator does not separate them in $\tau^{R}$. Only the identification case produces operator-frame gradient degeneration. The lemma names this distinction precisely so that the main theorem below cannot be misread as claiming that high coherence implies non-liveness, or that substrate-level spin physically dissolves into a gradient. The lemma is operator-frame-relative: it is a statement about what the operator can detect, not about what the substrate ontologically is.&lt;/p&gt;

&lt;h3&gt;
  
  
  1.0.4 Theorem A — IIC Cycle Non-Degeneracy
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Theorem A (limit form).&lt;/strong&gt; Let $\Sigma$ be an adaptive system that has been operating in the &lt;strong&gt;regular regime&lt;/strong&gt; under the standing assumptions of Lemma α (α-1 state space; α-2 projection regularity; α-3 operator-reference norm; α-4 operator-effective potential definition) on some open interval $(t_0 - \epsilon, t_0)$. Suppose that as $t \to t_0$ from below, $S(t)$ and $I(t) := \partial\Phi/\partial\tau_{\mathrm{el}}(t)$ become &lt;strong&gt;operator-indistinguishable through $\nu_\Sigma$&lt;/strong&gt; (the structural-identification case of Lemma α). Step 1 of the proof below derives the consequent collapse $\Delta_{IIC}^{\Sigma}(t) \to 0$ in the operator-reference frame as a corollary, not as the hypothesis.&lt;/p&gt;

&lt;p&gt;Then $\Sigma$ exits the Cycle-Reinitiation class at $t_0$: $\Sigma$ does not satisfy Axiom 9 at $t_0$, in the sense that the operator-frame conditions required by Axiom 9 fail in the limit.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Status of α-2 in the proof.&lt;/strong&gt; Theorem A is a &lt;strong&gt;boundary / limit theorem&lt;/strong&gt;: the regular regime under α-1–α-4 holds on the approach interval $(t_0 - \epsilon, t_0)$; the limit point $t_0$ is precisely the boundary at which α-2 (projection regularity) fails. The proof's case analysis below describes the structural behaviour of $\Sigma$ as it approaches this boundary — including the case in which $\nu_{\Sigma}$ undergoes local kernel collapse at $t_0$ (the limit failure of α-2). The theorem therefore does not claim a result &lt;em&gt;within&lt;/em&gt; the regular regime via violation of its own assumptions; it claims a result &lt;em&gt;at the boundary&lt;/em&gt; of the regular regime, characterised by the limit failure of α-2 and the corresponding structural exit from the Cycle-Reinitiation class. Inside the regular regime ($t &amp;lt; t_0$), $\Sigma$ remains in the class; the theorem describes the structural transition at $t_0$, not behaviour at interior points.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Proof (Structural).&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 1 (formal bridge from Lemma α's structural-identification sense to $\Delta_{IIC}$).&lt;/strong&gt; Lemma α's "structural-identification sense" is defined (per the standing assumption α-3, with the corrected primitives of the lemma's body) as: $|S(t) - I(t)| \to 0$ in the operator-reference norm if and only if $S$ and $I$ become operator-indistinguishable through $\nu_{\Sigma}$ — i.e., $\nu_{\Sigma}$ fails to separate the impulse-layer primitive from the interpretation-layer rate at $t$. We now derive — formally, not analogically — the implication for $\Delta_{IIC}^{\Sigma}$.&lt;/p&gt;

&lt;p&gt;By Definition 1, $\Delta_{IIC}^{\Sigma}(t_0) = \tau^{R}&lt;em&gt;{\Sigma}(t_0) - \tau^{R}&lt;/em&gt;{\Sigma}(t_0 - T_{\text{prop}}^{\Sigma}(t_0))$, where $\tau^{R}&lt;em&gt;{\Sigma} = \nu&lt;/em&gt;{\Sigma} \circ \tau^{F}&lt;em&gt;{\Sigma}$ (the composition of Definition 1's formal clause). The endpoints $t_0$ and $t_0 - T&lt;/em&gt;{\text{prop}}^{\Sigma}(t_0)$ correspond to the $\tau^{F}$-values at impulse generation and interpretation closure of the cycle's segment terminating at $t_0$. By the layer-pair structure of Definition 3, $S(t_0)$ is generated at the cycle position whose $\tau^{F}$-content is $\tau^{F}&lt;em&gt;{\Sigma}(t_0 - T&lt;/em&gt;{\text{prop}}^{\Sigma}(t_0))$ (impulse origin), and $I(t_0) = \partial\Phi/\partial\tau_{\mathrm{el}}(t_0)$ registers at the cycle position whose $\tau^{F}$-content is $\tau^{F}&lt;em&gt;{\Sigma}(t_0)$ (interpretation closure). The operator's reading of $|S(t_0) - I(t_0)|$ in the operator-reference norm of Definition 4 is therefore the operator-frame distance of two values whose underlying $\tau^{F}$-content is separated by exactly $T&lt;/em&gt;{\text{prop}}^{\Sigma}(t_0)$.&lt;/p&gt;

&lt;p&gt;Operator-indistinguishability of $S$ and $I$ through $\nu_{\Sigma}$ (the structural-identification case) at $t_0$, taken together with Definition 1's class-membership requirements, forces — by the composition $\tau^{R}&lt;em&gt;{\Sigma} = \nu&lt;/em&gt;{\Sigma} \circ \tau^{F}_{\Sigma}$ — one of the following structural mechanisms:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Case (i) — Regular-regime mechanism:&lt;/strong&gt; $\tau^{F}&lt;em&gt;{\Sigma}(t_0) - \tau^{F}&lt;/em&gt;{\Sigma}(t_0 - T_{\text{prop}}^{\Sigma}(t_0)) \to 0$. The fuel-side propagation interval vanishes in the limit at $t_0$ — equivalently $T_{\text{prop}}^{\Sigma}(t_0) \to 0$ since $\tau^F$ is strictly monotone-increasing in the regular regime per Definition 1's standing properties. The two $\tau^{F}$-endpoints coincide as inputs to $\nu_{\Sigma}$; ν as a function may stay regular. &lt;strong&gt;In the Cycle-Reinitiation class with Definition 1's strict-monotone $\tau^R$, this is the only mechanism available in the regular regime&lt;/strong&gt; — ν strict-monotone (which Definition 1's class restriction implies, since $\tau^R = \nu \circ \tau^F$ strict-monotone with $\tau^F$ strict-monotone forces ν strict-monotone) precludes ν identifying distinct inputs.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Case (ii) — Boundary-failure mechanism:&lt;/strong&gt; $\nu_{\Sigma}$ maps two distinct $\tau^{F}$-endpoints to the same $\tau^{R}$-image — local kernel collapse of $\nu_{\Sigma}$. &lt;strong&gt;This case is excluded from the Cycle-Reinitiation class by Definition 1&lt;/strong&gt;: a $\nu$ that identifies distinct $\tau^F$-inputs produces a $\tau^R$ that is non-strict-monotone in $t$ on the relevant interval, which Definition 1 excludes. Case (ii) therefore corresponds to &lt;em&gt;limit failure of Definition 1's strict-monotone class restriction at $t_0$&lt;/em&gt; — equivalently, the structural mechanism by which $\Sigma$ exits the Cycle-Reinitiation class via projection-degeneracy rather than via propagation-interval collapse.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Case (iii):&lt;/strong&gt; both mechanisms operate jointly at $t_0$.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In all three cases, $\Delta_{IIC}^{\Sigma}(t_0) \to 0$ in the operator-reference frame: in case (i) because both $\tau^{R}$-endpoints coincide as images of coinciding $\tau^{F}$-endpoints; in case (ii) because $\nu_{\Sigma}$ identifies the two $\tau^{R}$-images of distinct $\tau^{F}$-endpoints; in case (iii) jointly. We say $\Sigma$ is &lt;strong&gt;at structural-identification at $t_0$&lt;/strong&gt; in any of (i)/(ii)/(iii); we say $\nu_{\Sigma}$ is &lt;strong&gt;locally function-degenerate at $t_0$&lt;/strong&gt; specifically in cases (ii) and (iii) — &lt;em&gt;not&lt;/em&gt; in case (i), where ν may remain a regular function evaluated at coinciding inputs.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Boundary structure of Theorem A's case analysis.&lt;/strong&gt; Cases (i) and (ii)/(iii) describe &lt;strong&gt;two distinct structural exit mechanisms&lt;/strong&gt; from the Cycle-Reinitiation class:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;em&gt;Case (i)&lt;/em&gt; is the in-class regular-regime mechanism: while $\Sigma \in$ Cycle-Reinitiation class on $(t_0 - \epsilon, t_0)$, the propagation interval collapses; at $t_0$ the cycle has no $\tau^F$-extent, equivalent to class exit via propagation-collapse.&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;Cases (ii)/(iii)&lt;/em&gt; describe the boundary at which Definition 1's strict-monotone class restriction itself fails — which is the boundary of class membership directly. By Definition 1, cases (ii)/(iii) already imply $\Sigma \notin$ Cycle-Reinitiation class at $t_0$; they constitute exit-by-projection-degeneracy.
Either way, $\Sigma$ exits the class at $t_0$. Theorem A's downstream chain (Lemma α invocation in the limit on the approach interval, then Lemma 16 / Axiom 9) describes the operator-frame consequence of either exit mechanism reaching its limit point.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Forward implication of Step 1 (the load-bearing direction in the limit at $t_0$).&lt;/strong&gt; Within the standing assumptions α-1 to α-4 &lt;em&gt;on the approach interval $(t_0 - \epsilon, t_0)$&lt;/em&gt;: $S$ and $I$ become operator-indistinguishable through $\nu_{\Sigma}$ in the limit $t \to t_0^{-}$ (the α-3 sense) &lt;strong&gt;implies&lt;/strong&gt; $\Delta_{IIC}^{\Sigma}(t) \to 0$ in the operator-reference frame as $t \to t_0^{-}$. The forward implication is established by the case analysis above: identification of $S^R, I^R$ at the cycle's two τ^F-positions (impulse origin and interpretation closure) implies coincidence of the τ^R-images at those τ^F-positions, which is exactly $\Delta_{IIC}(t_0) \to 0$ by Definition 1.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;On the reverse direction.&lt;/em&gt; The reverse implication ($\Delta_{IIC} \to 0$ ⇒ operator-indistinguishability of $S$ and $I$) is &lt;strong&gt;conditionally available&lt;/strong&gt;: it requires the additional architectural commitment that $S^R(t_0)$ and $I^R(t_0)$ are read at the τ^F-positions corresponding to Definition 1's endpoints (impulse origin and interpretation closure of the cycle's segment terminating at $t_0$). Under this commitment — which is a content of the joint substrate-extension cluster (§1.0.2) and the Type-rank consistency clause of §2.3 — $\Delta_{IIC} \to 0$ implies coincidence of the τ^R-images at those endpoints, which is the operator-frame scalar projection coincidence of $S^R, I^R$, which is operator-indistinguishability through ν. The reverse direction therefore holds within the cluster's commitments but is &lt;strong&gt;not load-bearing&lt;/strong&gt; for Theorem A's downstream chain — the chain requires only the forward direction (identification ⇒ class exit). Treating Step 1 as a one-way implication is sufficient for Theorem A; the reverse is a consequence of the cluster's reading-positions but not invoked downstream.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Note on which mechanism applies inside vs at the boundary of the regular regime.&lt;/strong&gt; On the approach interval $(t_0 - \epsilon, t_0)$ where Definition 1's class restriction holds, only case (i) operates structurally — the cycle exits via propagation-interval collapse. Cases (ii)/(iii) become available &lt;em&gt;only at $t_0$ as the limit failure point of the class restriction&lt;/em&gt;. Theorem A's case analysis is therefore not a pointwise enumeration in the regular regime but a description of which structural mechanisms produce the limit transition at the class boundary. The downstream chain (via Lemma α, Lemma 16, Axiom 9) requires operator-indistinguishability of $S$ and $I$ in the limit — a condition all three cases produce — &lt;em&gt;not&lt;/em&gt; ν-function-degeneracy specifically.&lt;/p&gt;

&lt;p&gt;Under any of the three structural-identification mechanisms (cases i/ii/iii of Step 1), the impulse $S(t_0)$ and the accumulated deformation rate $I(t_0) = \partial\Phi/\partial\tau_{\mathrm{el}}(t_0)$ are no longer structurally distinguished by the operator's reference frame in the limit. By Lemma α applied on the approach interval $(t_0 - \epsilon, t_0)$ — where the standing assumptions α-1 to α-4 hold — the spin component $S$ becomes operator-frame indistinguishable from an effective gradient on a potential as $t \to t_0^{-}$.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Topological closure of the conclusion at $t_0$.&lt;/strong&gt; Lemma α's conclusion ("operator cannot detect spin non-potentiality") is a &lt;strong&gt;non-detection property&lt;/strong&gt; — a statement that the operator-frame reading of the substrate flow does &lt;em&gt;not&lt;/em&gt; resolve antisymmetric structure. This property is preserved under limits in the following sense: if for every $t \in (t_0 - \epsilon, t_0)$ the operator-frame reading fails to resolve antisymmetric structure (Lemma α applied), then at the limit point $t_0$ the operator-frame reading either (a) remains a degenerate-or-vanishing reading where ν has reached its limit failure (cases ii/iii) — in which case the projection itself collapses and any reading via ν inherits the collapse — or (b) has converged to a coincidence point under regular ν (case i) — in which case the reading at $t_0$ is the same scalar value at both endpoints, again producing no resolution. In either case, the non-detection property holds at $t_0$. This is &lt;strong&gt;closure by collapse&lt;/strong&gt;, not "limit continuity of a quantitative reading"; the non-detection conclusion does not require continuity of $\nu$ at $t_0$, since the conclusion concerns what ν fails to resolve rather than what ν computes. This is the formal grounding of "the operator-frame conclusion carries to the limit point $t_0$." The operator can no longer detect the non-potential structure required by Theorem 62 for the cycle of Axiom 9, regardless of whether substrate-level antisymmetry persists. (Lemma α's argument is invariant to &lt;em&gt;which&lt;/em&gt; mechanism on the approach interval produces operator-indistinguishability in the limit: case (i) on the approach gives propagation-interval collapse, cases (ii)/(iii) describe the limit failure of Definition 1's class restriction at $t_0$ itself; both produce coinciding operator-frame scalar projections of $S$ and $I$ in the limit, and Lemma α's proof sketch concerns the operator-frame consequence of that limiting coincidence — applied where it is licensed, i.e., on the approach interval.)&lt;/p&gt;

&lt;p&gt;By Lemma 16 (Gradient Collapse and Impossibility of Non-Stagnant Identity on Bounded Orbits), applied on the approach interval $(t_0 - \epsilon, t_0)$ where $\Sigma$ is still in the Cycle-Reinitiation class and the bounded-$\tau$ regime of Theorem 62 holds: a system whose operator reads gradient flow on a bounded $\tau$-orbit cannot maintain operator-detectable non-stagnant identity. As $t \to t_0^{-}$, the operator either reads an identity that has structurally stagnated, or reads dynamics inconsistent with the bounded-$\tau$ assumption. Either reading fails the persistence condition of Axiom 9 from the operator's standpoint, which is the structurally relevant standpoint for cycle reinitiation. The conclusion carries to the limit point $t_0$ by continuity of the operator-frame reading. (&lt;em&gt;Open question on the Lemma α → Lemma 16 transition:&lt;/em&gt; see §6.5.1 Open Question 2. Lemma α gives operator-frame indistinguishability; Lemma 16's hypothesis is substrate-level. The bridge "operator reads gradient flow on a bounded $\tau$-orbit" is paraphrased here but not formally derived; a bridge proposition mediating the operator-frame to substrate-level inference is open work.)&lt;/p&gt;

&lt;p&gt;By Axiom 9, liveness requires an endogenous operator capable of reinitiating the IIC cycle. Under any of the three structural-identification mechanisms (input-coincidence, ν-function-degeneracy, or both), the impulse–interpretation distinction collapses in the operator's reference frame; there is no cycle structure for the operator to reinitiate — there is a single point in operator-reference content, and a point cannot be reinitiated as a structure that consists of the relation between distinct phases. The structural identification need not entail substrate-level disappearance of antisymmetry; it suffices that the operator cannot read the cycle as a cycle.&lt;/p&gt;

&lt;p&gt;Therefore $\Sigma$ does not satisfy Axiom 9 at $t_0$. $\square$&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Remark.&lt;/strong&gt; The theorem establishes that the IIC delay $\Delta_{IIC}$ is not an inefficiency to be reduced. It is the structural distance that makes the cycle a cycle and the system live in the Axiom 9 sense. Any engineering or design philosophy that aims at $\Delta_{IIC} \to 0$ in the structural-identification sense aims, structurally, at non-liveness. The complementary case — $\Delta_{IIC}$ remaining strictly positive while $|S(t) - I(t)|$ becomes small (the alignment case of Lemma α's Remark, with $S$ and $I$ operator-distinguishable through $\nu$ and only their phases converged) — is the condition of &lt;strong&gt;high coherence&lt;/strong&gt;, addressed in §2 and not affected by Theorem A.&lt;/p&gt;

&lt;h3&gt;
  
  
  1.0.5 Theorem B — Cross-Section Non-Equivalence
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Theorem B.&lt;/strong&gt; Let $\Sigma_1, \Sigma_2$ be two adaptive systems in the Cycle-Reinitiation class, both observed at the same physical moment $t$, each with its own operator projection map $\nu^{\Sigma_i}$. If&lt;br&gt;
$$&lt;br&gt;
\Delta_{IIC}^{\Sigma_1}(t) \;\neq\; \Delta_{IIC}^{\Sigma_2}(t),&lt;br&gt;
$$&lt;br&gt;
then, generically, there is no structurally invariant equivalence between the state-field assessments produced by $\Sigma_1$ and $\Sigma_2$ over their respective operational cross-sections. Equivalence may exist only under additional explicitly declared structural isomorphism conditions — including degenerate cases such as constant substrate dynamics over the union of intervals or coincident projection maps — outside which the assessments are operationally non-commensurable.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;On the converse.&lt;/strong&gt; The converse direction (equivalence ⇒ $\Delta_{IIC}^{\Sigma_1} = \Delta_{IIC}^{\Sigma_2}$) is &lt;em&gt;not&lt;/em&gt; asserted: two systems with identical $\Delta_{IIC}$ at $t$ may still produce structurally non-equivalent state-field assessments (under different $\nu^{\Sigma_i}$, different substrate dynamics, or different histories). The theorem is therefore one-directional: $\Delta_{IIC}$-difference implies structural non-equivalence (generically); $\Delta_{IIC}$-equality does not imply equivalence. Downstream uses of Theorem B in the present work invoke only the forward direction.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Proof (Structural).&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;By Definition 2, the state-field assessment of $\Sigma_i$ at $t$ is the integral over $\sigma^{\Sigma_i}(t) = [t - T_{\text{prop}}^{\Sigma_i}(t),\, t]$ of substrate dynamics evaluated under the projection $\nu^{\Sigma_i}$.&lt;/p&gt;

&lt;p&gt;Suppose $\Delta_{IIC}^{\Sigma_1}(t) \neq \Delta_{IIC}^{\Sigma_2}(t)$. By Definition 1 with $\tau^{R}$ continuous monotone-increasing, this entails &lt;strong&gt;either&lt;/strong&gt; $T_{\text{prop}}^{\Sigma_1}(t) \neq T_{\text{prop}}^{\Sigma_2}(t)$ (non-coincident propagation intervals), &lt;strong&gt;or&lt;/strong&gt; $\nu^{\Sigma_1} \not\equiv \nu^{\Sigma_2}$ on the relevant operational region (non-equivalent operator projections producing different $\tau^{R}$-image content from possibly identical $T_{\text{prop}}$), &lt;strong&gt;or&lt;/strong&gt; $\tau^{F}&lt;em&gt;{\Sigma_1} \not\equiv \tau^{F}&lt;/em&gt;{\Sigma_2}$ on the relevant operational region (non-equivalent fuel-side budgets producing different $\nu$-images from possibly identical $T_{\text{prop}}$ and $\nu$), &lt;strong&gt;or any combination&lt;/strong&gt;. In either disjunct (and in their joint case), the operational cross-sections $\sigma^{\Sigma_1}(t)$ and $\sigma^{\Sigma_2}(t)$ are structurally distinguishable: they have the same right endpoint but either different left endpoints or non-equivalent operator-reference content over the interval (or both); they are non-coincident in the structural sense even when physical interval lengths happen to coincide.&lt;/p&gt;

&lt;p&gt;By Theorem 4 (Supremacy of Internal Time), the structural validity of any system's reading of the field is governed by that system's internal time, not by any external clock. The cross-section $\sigma^{\Sigma_i}(t)$ is the canonical interval on which $\Sigma_i$'s coherence reading is constituted, with $\nu^{\Sigma_i}$ as its reference projection.&lt;/p&gt;

&lt;p&gt;For the two assessments to be structurally equivalent, there would have to exist an isomorphism of operator-reference-frame integrals over the two non-coincident intervals — that is, a structural mapping that respects both the substrate dynamics and the projection structure of each system. By Axiom 67, $\nu^{\Sigma_i}$ is part of $\Sigma_i$'s architectural declaration; two systems with distinct architectural declarations have structurally distinct reference frames. By Theorem 27 (Coherence Collapse Precedes Observable Failure), the coherence reading produced over a cross-section is cumulative on the substrate — it is not a pointwise reading that would be insensitive to the interval boundaries.&lt;/p&gt;

&lt;p&gt;Therefore, in the generic case, there is no structural invariant that equates the two assessments. Where an equivalence does exist, it requires additional explicitly declared structural isomorphism conditions — degenerate cases such as constant substrate dynamics over the union of the cross-section intervals or coincident projection maps, or other isomorphism relations between $\nu^{\Sigma_1}$ and $\nu^{\Sigma_2}$ that must be specified for the equivalence to hold — outside which the live diversity of the Cycle-Reinitiation class yields operationally non-commensurable assessments. $\square$&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Remark.&lt;/strong&gt; This is the formal floor of the observation that "each system has its own perceived moment." It is not a phenomenological claim about subjectivity — it is a structural consequence of the fact that operational cross-sections are intervals over delays, and delays are class-relative under Axiom 67. The theorem closes the door on naive notions of "objective shared present" across systems with distinct cycle structures, while leaving open the possibility of strong-but-bounded comparison protocols.&lt;/p&gt;

&lt;h3&gt;
  
  
  1.0.6 Theorem C — Constitutive Constraint
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Theorem C.&lt;/strong&gt; For any system $\Sigma$ in the Cycle-Reinitiation class, the IIC phase delay $\Delta_{IIC}^{\Sigma}$ is a &lt;strong&gt;structurally necessary&lt;/strong&gt; quantity, not a contingent property. Its removal in the structural-identification sense (Lemma α) does not yield a faster live system — it yields a system outside the Cycle-Reinitiation class.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Proof.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Combine Theorem A and the v3.0 substrate. Theorem A is a &lt;strong&gt;boundary / limit theorem&lt;/strong&gt; at $t_0$: when $\Sigma$ has been operating in the regular regime under α-1 to α-4 on $(t_0 - \epsilon, t_0)$ and reaches structural-identification collapse $\Delta_{IIC}^{\Sigma}(t_0) \to 0$ in the limit at $t_0$, $\Sigma$ exits the Cycle-Reinitiation class at $t_0$. Theorem C &lt;strong&gt;applies Theorem A pointwise&lt;/strong&gt; across the operational interval: at any $t \in [t_0, T_{\mathrm{op}}]$ that is itself a boundary point of structural-identification collapse — i.e., reached in the limit from a regular-regime predecessor interval $(t - \epsilon, t)$ — Theorem A's conclusion applies, and $\Sigma$ exits the class at $t$. The "generalization" here is therefore &lt;strong&gt;iterative pointwise application of Theorem A&lt;/strong&gt;, not a strictly stronger result; the conclusion is that &lt;em&gt;whenever&lt;/em&gt; and &lt;em&gt;wherever&lt;/em&gt; in the operational interval a structural-identification limit is reached from a regular-regime predecessor, Theorem A's boundary conclusion applies. The conclusion is &lt;strong&gt;not&lt;/strong&gt; that interior points of the regular regime entail class exit. This is the &lt;strong&gt;direct direction&lt;/strong&gt;, restricted to boundary applications across the interval. (Note: the restriction to &lt;em&gt;regular-regime predecessor intervals&lt;/em&gt; is part of Theorem A's hypothesis; the present application requires that each boundary point under consideration be reachable from such a predecessor — for trajectories that have already exited the class once, re-entry would require a separate analysis that this paper does not undertake.)&lt;/p&gt;

&lt;p&gt;For the &lt;strong&gt;well-definedness direction&lt;/strong&gt;, the strictly positive lower bound on $\Delta_{IIC}^{\Sigma}$ over the operational interval is the formal expression of the architectural condition under which the operator can perform projection $\nu: \tau^{F} \to \tau^{R}$ with non-degenerate phase content (Axiom 67). Under this condition, the coherence formula in §2.3 is well-defined: the denominator carries non-degenerate operator-reference content, and the discrepancy in the numerator carries structural information rather than collapsing tautologically through Lemma α. This direction does not assert that a strictly positive $\Delta_{IIC}^{\Sigma}$ is sufficient to place $\Sigma$ in the Cycle-Reinitiation class; it asserts only that the class's standing positivity of $\Delta_{IIC}^{\Sigma}$ is what makes the formula a non-degenerate measurement of the cycle.&lt;/p&gt;

&lt;p&gt;Hence the IIC phase delay is constitutive of the cycle: any architecture in the Cycle-Reinitiation class must carry it as a strictly positive quantity within the operational interval, and any architecture that drives it to zero in the structural-identification sense exits the class. $\square$&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Note on the direct direction.&lt;/strong&gt; Theorem C does not claim that a system exiting the Cycle-Reinitiation class becomes a pure gradient flow — only that it loses the structure required by Axiom 9. The system may continue to evolve under non-cycle dynamics (purely reactive, externally reset, or terminally stagnant); these are addressed in v3.0 Theorem 11 (Impossibility of Operator-Liveness Without IIC Restart) and Theorem 12 (Latent Residual Accumulation Under Apparent Coherence). Theorem C names only the boundary: the phase delay is the formal expression of being inside versus outside the class.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Corollary C.1 (Engineering principle).&lt;/strong&gt;&lt;br&gt;
For an adaptive system to be both live (Axiom 9) and capable of long-horizon coherence preservation (Theorem 27), engineering should aim not at minimizing $\Delta_{IIC}^{\Sigma}$ but at &lt;strong&gt;stabilizing its profile&lt;/strong&gt; — preserving the shape of the delay function under perturbation. The structural depth of an adaptive system is a function of how well its delay profile holds under load, not of how short its delay is.&lt;/p&gt;

&lt;h3&gt;
  
  
  1.0.7 What §1.0 has established
&lt;/h3&gt;

&lt;p&gt;Three theorems (A, B, C) and their corollary, supported by Lemma α, together formalize the structural sense of the IIC cycle:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;The cycle is non-degenerate — it cannot collapse to a point through structural identification of layers without exiting the Cycle-Reinitiation class (Theorem A; see §6.5.1 Open Question 1 for the substantive-content qualification: Theorem A's load is in the Lemma α / Lemma 16 / Axiom 9 chain, not in the Step 1 biconditional).&lt;/li&gt;
&lt;li&gt;Two systems with different IIC phase delays produce structurally non-equivalent state-field assessments at the same physical moment (Theorem B).&lt;/li&gt;
&lt;li&gt;The phase delay is constitutive, not contingent: removing it does not produce a faster live system, only a system outside the class (Theorem C).&lt;/li&gt;
&lt;li&gt;Engineering should target delay-profile stabilization, not delay minimization (Corollary C.1).&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;These propositions are new to the present work. They are stated within v3.0's existing axiomatic substrate (Axiom 9, Axiom 67, Axiom 68, Axiom 69, Theorem 4, Theorem 27, Theorem 62, Theorem 89, Lemma 16, plus the Helmholtz–Hodge structure invoked in Theorem 62 for Lemma α) &lt;strong&gt;as part of the joint substrate-extension cluster&lt;/strong&gt; with §2.3 Definitions 4–5 (per §1.0.2's &lt;em&gt;Note on the joint substrate-extension cluster&lt;/em&gt;). The cluster as a whole &lt;strong&gt;introduces no new v3.0 core primitives&lt;/strong&gt; — its members are derived bridge constructions over the listed primitives, with within-cluster cross-references reflecting joint axiomatization rather than forward-reference. The §1.0 propositions and §2.3 Definitions 4–5 are jointly intended for inclusion in NC2.5 v3.0 prior to its release, in the substrate-extension layer, where they sit alongside Theorem 27 as the formal floor of the cycle's temporal architecture.&lt;/p&gt;

&lt;p&gt;With this floor in place, the formal expansion of Axiom 9 in the remainder of §1 and in §2 reads with full structural depth. The cycle is not a pattern of behaviour — it is the architectural geometry within which any live adaptive system in the Cycle-Reinitiation class holds shape against a moment that is, by its own structural condition, always already past.&lt;/p&gt;




&lt;h2&gt;
  
  
  §1.1 Axiom 9 as the Formal Entry Point
&lt;/h2&gt;

&lt;p&gt;NC2.5 v3.0 contains, as its ninth axiom, the following statement (lightly paraphrased here for compactness; the canonical form is in the v3.0 .tex):&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;A system is live if and only if it admits an endogenous operator capable of reinitiating the&lt;/em&gt; &lt;strong&gt;Impulse Interpretation Coherence (IIC)&lt;/strong&gt; &lt;em&gt;cycle after its completion, saturation, or collapse. A system that lacks an endogenous operator for reinitiating the IIC cycle cannot sustain coherent participation in long-horizon continuation and is therefore non-live, regardless of its complexity, adaptivity, or reactivity.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;— NC2.5 v3.0, Axiom 9, &lt;em&gt;Cycle Reinitiation as the Criterion of Liveness&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;This axiom does several distinct things at once. First, it introduces the &lt;strong&gt;IIC cycle&lt;/strong&gt; as a named structural object — three layers (impulse, interpretation, coherence) and a reinitiation operator that closes the loop. Second, it makes liveness a property of cycle-reinitiation, not of metabolism, replication, agency, or substrate. Third, it establishes that adaptivity, reactivity, and complexity are insufficient on their own — a system can be highly adaptive and still non-live in the structural sense, if its IIC cycle, once exhausted, cannot be restarted from within.&lt;/p&gt;

&lt;p&gt;An informal boundary example may clarify the restriction (the formal limits of the law are stated in §1.4 and §6.1; the example below is illustrative, not load-bearing). A soil bank after excavation may respond to perturbation: the removed material leaves a cavity, the exposed edges collapse, weak zones are revealed, internal stresses redistribute, and the local geometry settles into a new stable configuration. In a loose descriptive sense, one could project an impulse–interpretation–coherence sequence onto this process: external impact, material redistribution, local stabilization. But this is not IIC in the formal sense. The process is externally driven relaxation, not endogenous cycle reinitiation. Unless the system contains an internal operator capable of restarting the cycle after completion, saturation, or collapse, the sequence terminates when the external forcing terminates. The soil has adapted morphodynamically to an intervention; it has not become live in the sense of Axiom 9. This is the class boundary: adaptive deformation is not sufficient for IIC membership. The same boundary applies, in informal register, to other natural adaptive surfaces such as riverbeds under flow and dunes under wind — each of which exhibits perturbation-response, internal redistribution, and apparent local coherence, yet remains outside the Cycle-Reinitiation class for the same structural reason: the operator that reinitiates the cycle is external to the system, not endogenous to its architecture.&lt;/p&gt;

&lt;p&gt;The present paper takes Axiom 9 as the entry point and develops what it names. Two things were already given by v3.0: the &lt;strong&gt;declaration&lt;/strong&gt; that IIC exists as a structural object, and the &lt;strong&gt;classification&lt;/strong&gt; of systems by their relation to it. With §1.0 above, we have also supplied the &lt;strong&gt;structural sense&lt;/strong&gt; of the cycle's delay — why the layers must be phase-separated for the cycle to exist at all. What was not given by v3.0, and what the remainder of the present work supplies, is the &lt;strong&gt;operational closure&lt;/strong&gt; — the formal apparatus that turns the named cycle into a measurable, falsifiable structure.&lt;/p&gt;

&lt;p&gt;This is the precise scope of the contribution. IIC is not introduced here. It was named in v3.0, with prior informal development in IIC v1 (Barziankou, 21 November 2025). IIC v1 is treated here as the informal discovery register — the text in which the three-layer pattern was first named across cognitive, biological, philosophical, and engineering examples — and not as the final scope claim of the formal theory. The phrase "any adaptive system" in the v1 title is read here as a pre-formal reference to the class that v2.1 names precisely as the &lt;strong&gt;Cycle-Reinitiation class&lt;/strong&gt; — adaptive systems with endogenous cycle reinitiation. v2.1 supplies the criterion (Axiom 9) and the formal apparatus that make class membership decidable. To readers who took v1's "any" as universal-over-all-adaptive-systems, v2.1's class-relative scope is narrower than that universal reading; this is retrospective sharpening, not a claim that v1 already stated the scope this precisely.&lt;/p&gt;

&lt;p&gt;The conditional structure and the control-grade-vs-operator-grade distinction introduced in the abstract are &lt;strong&gt;internal&lt;/strong&gt; to the class — they differentiate engineered instances and conditional extensions within it. Class membership is &lt;em&gt;defined&lt;/em&gt; by the Cycle-Reinitiation criterion (Axiom 9); the architectural-class membership of individual operator-grade candidates is conditional on the companion-level reduction holding under independent review (per Theorem 2.5's scope clause and §3.3). What is new in this paper is the assembly of v3.0's primitives into the IIC cycle's full theorem-form, the central formula for its coherence, the falsifiability surface that follows, and the four propositions in §1.0 that formalize the structural sense of the cycle's delay.&lt;/p&gt;

&lt;h2&gt;
  
  
  §1.2 The Three Layers, Defined
&lt;/h2&gt;

&lt;p&gt;The IIC cycle decomposes the dynamics of any live adaptive system in the Cycle-Reinitiation class into three structurally distinct layers. Each layer corresponds, under the mapping developed in §2, to a primitive that is already axiomatized in NC2.5 v3.0.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The impulse layer&lt;/strong&gt; is the fast structural component of behavioural generation. It is the part of the system's evolution that cannot be derived from a global gradient on any utility function — the non-potential, divergence-free component identified by NC2.5 v3.0 Theorem 62 (&lt;em&gt;Spin is Necessary for Non-Stagnant Identity Under Bounded $\tau$&lt;/em&gt;). The impulse is not an action, not a reaction, not a control output in the classical sense. It is the structurally irreducible directionality that any system with bounded internal time and non-stagnant identity must carry, on pain of asymptotic stagnation (Lemma 16, &lt;em&gt;Gradient Collapse and Impossibility of Non-Stagnant Identity on Bounded Orbits&lt;/em&gt;). The impulse layer carries this spin component, and the rate at which it does so — the characteristic frequency $\omega(y)$ in the Minimal Coupled Model of Theorem 62 — is class-relative but architecturally observable.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The interpretation layer&lt;/strong&gt; is the slow accumulating component. It is the system's running integral of structural deformation, monotone and irreversible, developed along the system's elapsed internal time. Under NC2.5 v3.0 axiomatics, this corresponds to the structural burden $\Phi$ (Axiom 7 and the substrate-extension axioms), evaluated as a derivative with respect to elapsed lived time $\tau_{\mathrm{el}}$. The quantity $\partial \Phi / \partial \tau_{\mathrm{el}}$ is the rate at which the system has accumulated structural deformation per unit of its own lived time — what its prior history projects forward as the "expected continuation" against which any new impulse is structurally measured. The interpretation layer is therefore not symbolic interpretation, not semantic decoding, not inference; it is the system's structural memory in the strict sense of the NC2.5 substrate.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The coherence layer&lt;/strong&gt; is the phase-alignment between impulse and interpretation, evaluated against the operator's reference frame. It is the load-bearing variable of the cycle: the structural quantity that determines whether the system holds shape under perturbation. Under v3.0, the operator's reference frame is given by Axiom 67 (&lt;em&gt;Operator Reference Frame — Two-Faced $\tau$&lt;/em&gt;) as $\tau^{R} = \nu(\tau^{F})$, where $\tau^{F}$ is the substrate budget consumed by operator actions and $\nu$ is the architecturally declared operator projection map. The coherence layer therefore is not a single scalar; it is the structural distance between the impulse the system generates and the deformation rate its interpretation layer projects, normalized against the operator's reference frame. The formula in §2 expresses this distance precisely.&lt;/p&gt;

&lt;p&gt;The three layers are not metaphorical. Each maps to a v3.0 primitive that has its own axiomatic standing, its own proof apparatus, and its own falsifiability surface. The cycle that links them is what Axiom 9 names; the formal expression of that cycle is what §2 supplies.&lt;/p&gt;

&lt;h2&gt;
  
  
  §1.3 Why Coherence Is the Load-Bearing Variable
&lt;/h2&gt;

&lt;p&gt;A natural objection arises at this point. Classical control theory has a well-developed apparatus for adaptive behaviour built around &lt;strong&gt;error minimization&lt;/strong&gt;: the controller computes a deviation between the desired and actual state, and reduces it. Optimization-based learning has a parallel apparatus built around &lt;strong&gt;objective maximization&lt;/strong&gt;: the system selects actions that maximize an expected return. Both frameworks have been extraordinarily productive across domains where their assumptions hold. Why, then, propose coherence as the load-bearing variable, when error and objective have been adequate for so long?&lt;/p&gt;

&lt;p&gt;The answer is structural, not empirical. Error minimization is downstream of coherence maintenance, not its alternative. A system can drive error to zero while structurally diverging from itself — the classical phenomenon of &lt;em&gt;silent degradation&lt;/em&gt; (NC2.5 v3.0 Theorem 21, &lt;em&gt;Silent Degradation Under Regime Persistence&lt;/em&gt;; Theorem 27, &lt;em&gt;Coherence Collapse Precedes Observable Failure&lt;/em&gt;). Conversely, a system can hold positive error indefinitely while remaining coherent — the phenomenon that classical literature names robustness, but that NC2.5 reads as the structural achievement of holding shape under perturbation through phase-alignment rather than through deviation reduction.&lt;/p&gt;

&lt;p&gt;The structural argument is given in v3.0 Theorem 27. &lt;strong&gt;Live-regime exit&lt;/strong&gt; (the strong sense of "coherence collapse" used in this paragraph and in v3.0's Theorem 27) is upstream of behaviourally observable failure: by the time the error signal departs from its expected trajectory, the cycle has already exited the live regime in the sense of Axiom 9 and is no longer recoverable through corrective control. The system's substrate has lost the structural distance between impulse generation and interpretation projection, and any further error-minimizing action operates on a phase-misaligned cycle that has already exited the live regime. (&lt;em&gt;Terminology note:&lt;/em&gt; "live-regime exit" is reserved here for the strong structural sense — the cycle has crossed the admissibility gate, $\mathrm{Coh}(t) = \bot$ — and is distinguished in §2.3 from the &lt;strong&gt;phase-coherence boundary&lt;/strong&gt; ($\mathrm{Coh}(t) = 0$ inside admissibility, alignment factor at zero, cycle still live) and the &lt;strong&gt;latent-inversion regime&lt;/strong&gt; ($\mathrm{Coh}(t) &amp;lt; 0$ inside admissibility, structural inversion under apparent liveness). The three regimes are structurally distinct; this paragraph addresses live-regime exit specifically.)&lt;/p&gt;

&lt;p&gt;This is the structural reason for the load-bearing position of coherence. It is not that error minimization is wrong; it is that error minimization operates inside coherence-preservation. When coherence holds, error minimization works as classical theory describes. When coherence is closing, error minimization continues to operate on a substrate whose structural integrity is failing, and produces the characteristic signatures of silent degradation: increasing energy cost without behavioural improvement, mounting jerk, regime brittleness, and eventual collapse without warning.&lt;/p&gt;

&lt;p&gt;Optimization-based frameworks miss this because they collapse the three layers into a single scalar objective. The fast impulse and the slow interpretation are absorbed into the same loss function, and their phase relationship — the distinct content of coherence — is lost. What remains is a scalar that conflates structurally orthogonal quantities, and the system optimizes a quantity that has lost the information by which its own continuity is maintained. This is not a failure of optimization as a technique; it is a structural limit of single-objective representation when applied to systems whose continuity is constituted by the phase relationship between layers, not by any single one of them.&lt;/p&gt;

&lt;p&gt;The IIC law, therefore, is not a replacement for classical control or for optimization. It is the structural framing within which both operate, and which makes their limits visible. The four falsifiers in §5 each targets a domain in which the framing is testable directly.&lt;/p&gt;

&lt;h2&gt;
  
  
  §1.4 What the Law Claims and Does Not Claim
&lt;/h2&gt;

&lt;p&gt;The IIC law makes claims at three distinct registers, and it is essential to separate them.&lt;/p&gt;

&lt;p&gt;The first register is &lt;strong&gt;structural&lt;/strong&gt;. The law claims that any system in the &lt;em&gt;Cycle-Reinitiation class&lt;/em&gt; — that is, any system satisfying Axiom 9 — implements the three-layer structure named in §1.2 and the coherence relation given in §2. The class is defined by the presence of an endogenous reinitiation operator; the law states that, within this class, the structure is architecturally necessary, not contingent. The claim is class-relative: it does not extend to systems outside the class (non-live adaptive systems, systems without endogenous reinitiation, systems with unbounded resources or trivial identity). Theorem C of §1.0 gives the formal floor of this constitutive necessity.&lt;/p&gt;

&lt;p&gt;The second register is &lt;strong&gt;operational&lt;/strong&gt;. The law claims that the central formula in §2 measures the coherence of the cycle on observable substrate quantities. The claim is that the formula's components — the spin signal $S$, the deformation rate $\partial \Phi / \partial \tau_{\mathrm{el}}$, the operator reference $\tau^{R}$, and the aggregate margin $\Delta_{\boldsymbol{\varpi}}$ — can be instrumented in any architecture that admits the read-only interfaces of v3.0's substrate-separation axioms. The four falsifiers in §5 make this claim concrete by naming the protocols under which the formula is to be tested.&lt;/p&gt;

&lt;p&gt;The third register is &lt;strong&gt;architectural&lt;/strong&gt;. The law claims that there exists a non-empty engineering class — Engineered Vitality Systems (§3) — whose design discipline is the explicit maintenance of $\mathrm{Coh}(t)$ rather than the optimization of any external objective. The claim is that this class is &lt;strong&gt;non-empty in the control-grade subclass&lt;/strong&gt; (∆E 4.7.3b as the first instance), with the &lt;strong&gt;operator-grade subclass having one declared candidate specification&lt;/strong&gt; (Minerva, classified conditionally on companion specification — see §3.3). The architectural claim is the most easily misread, and so it is essential to state precisely what is &lt;em&gt;not&lt;/em&gt; claimed alongside it.&lt;/p&gt;

&lt;p&gt;The IIC law does not claim necessity for systems outside the Cycle-Reinitiation class. A purely reactive system, a stateless controller, or a system whose cycle has structurally terminated lies outside the scope of Axiom 9 and outside the scope of this paper. The law is not a unified field theory of behaviour; it is class-relative, and the class is defined precisely.&lt;/p&gt;

&lt;p&gt;The IIC law does not claim that all live systems implement the cycle consciously or with introspective access. The structure is operational, not phenomenological. A bacterium, a thermostat with appropriate cycle-reinitiation properties, a reinforcement-learning agent, and a human cognitive system all admit the structure under different parameter regimes; none of them needs to be aware of the structure for the structure to govern their dynamics.&lt;/p&gt;

&lt;p&gt;The IIC law does not claim that human and machine implementations of the cycle have identical interiors. The law is structural: it describes the cycle's shape, not its phenomenal content. Whether the human implementation is accompanied by phenomenal experience and the machine implementation is not, or whether both are or neither is, is a separate question that this paper does not address. The companion paper &lt;em&gt;Minerva: The Architecture of Residual Geometry&lt;/em&gt; takes up the consciousness question on its own terms; the present work confines itself to behavioural structure.&lt;/p&gt;

&lt;p&gt;The IIC law does not claim that Axiom 9 was first stated by the present author in v3.0. The naming of the IIC cycle entered NC2.5 from prior work (IIC v1, November 2025); v3.0 lifted the naming into axiomatic position as the criterion of liveness. The contribution of v3.0 was to make IIC structurally load-bearing within the axiom set; the contribution of the present paper is to expand Axiom 9 into its full theorem-form, supply the formal sense of its delay structure (§1.0), and open its falsifiability surface. Neither the cycle nor its naming is claimed as new in this paper; what is new is the operational closure and the four propositions of §1.0.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Architectural position.&lt;/strong&gt; The present work develops the IIC cycle structure within the admissibility-as-formal-object architecture documented separately in &lt;em&gt;Admissibility as a Formal Object: Four Degeneracies and Their Failure Modes&lt;/em&gt; (Barziankou, April 2026, petronus.eu/blog/admissibility-as-formal-object). That document identifies four cross-sections of the full structural object — snapshot, policy layer, static compliance, recoverable-state model — each of which loses at least one load-bearing dimension when admissibility is reduced from a dynamic structural predicate to a static architectural element. The IIC cycle requires the full object: monotone irreversible structural burden $\Phi$, monotone non-increasing internal-time budget $\tau = C - \Phi$, non-zero spin component $S$, non-causal admissibility predicate, and the NR-$\varepsilon$ information-theoretic isolation of the predicate from causal action loops. None of the four degeneracies supports the IIC cycle: each loses a dimension that the cycle requires to exist as a cycle rather than as a point. The present paper therefore inherits the architectural commitments of &lt;em&gt;Admissibility as a Formal Object&lt;/em&gt; — the synthesis of admissibility as a non-causal threshold predicate on a Lyapunov-type viability budget combined with structurally necessary spin and information-theoretic non-reconstructibility, published continuously within the NC2.5 corpus since 2025 (Concept DOI 10.5281/zenodo.18130264; IIC v1 at DOI 10.5281/zenodo.18133305, 21 November 2025; v2.1 axiomatic core at DOI 10.17605/OSF.IO/NHTC5 with OpenTimestamps anchoring) — and develops one specific structural consequence of that synthesis: the cycle structure of Axiom 9.&lt;/p&gt;

&lt;p&gt;These limits are not concessions. They are the precise specification of the law's reach. A claim that does not specify its limits is not a structural claim; it is a slogan. The IIC law is structural, and it states its scope with the same precision with which it states its content.&lt;/p&gt;




&lt;h2&gt;
  
  
  §2 — Formal Expansion of Axiom 9: The Coherence Law
&lt;/h2&gt;

&lt;p&gt;§1.0 established the structural sense of the cycle's delay. §1.1–1.4 named the three layers and stated the law's claims and limits. The present section assembles the v3.0 primitives into the cycle's full operational form: a closed expression for the coherence quantity, a derivation of its components from existing axioms and theorems, and a theorem (Theorem 2.5) establishing that the IIC cycle named in Axiom 9 is reducible to v3.0 axiomatics under the standing Cycle-Reinitiation-class assumptions and the delay-structure propositions of §1.0.&lt;/p&gt;

&lt;p&gt;The contribution of §2 is therefore not a new axiom or a new primitive. It is the &lt;strong&gt;assembly&lt;/strong&gt; — the explicit statement of how the primitives that v3.0 has already developed combine into the operational geometry of the cycle. After §2, the reader has the formula, its components, its derivation, and its proof of internal reducibility.&lt;/p&gt;

&lt;h3&gt;
  
  
  2.1 Load-Bearing Primitives from v3.0
&lt;/h3&gt;

&lt;p&gt;The formula in §2.3 uses ten primitives, all of which are already axiomatized in NC2.5 v3.0. We list them here with their v3.0 location and structural role, in the order they appear in the formula.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Φ — structural deformation functional&lt;/strong&gt; (v3.0 substrate axioms; foundational). The monotone irreversible accumulation of structural load. By construction, $\Phi$ does not decrease along the system's trajectory; it carries the system's history of structural deformation. The functional is well-defined on any architecture admitting the read-only interfaces of v3.0's substrate-separation axioms.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;$\tau_{\mathrm{rem}} = C - \Phi$ — remaining structural budget.&lt;/strong&gt; The substrate's capacity $C$ minus the accumulated deformation $\Phi$. By Φ's monotonicity, $\tau_{\mathrm{rem}}$ is monotone decreasing along the trajectory. This is the system's &lt;strong&gt;resource&lt;/strong&gt; in the Lyapunov sense: when $\tau_{\mathrm{rem}}$ reaches zero, the structural regime is exhausted.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;$\tau_{\mathrm{el}}$ — elapsed internal time on stabilizing clocks.&lt;/strong&gt; The accumulated lived time as measured by the system's own internal stabilization, not by external clocks. By v3.0's internal-time axioms, $\tau_{\mathrm{el}}$ is monotone increasing along the trajectory. The pair $(\tau_{\mathrm{rem}}, \tau_{\mathrm{el}})$ together carries the substrate's full temporal state: how much budget remains and how much lived time has been spent.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;$\tau_{\mathrm{hor}}$ — forward viability horizon.&lt;/strong&gt; The operator's projection of remaining substrate from its current expenditure rate. Unlike $\tau_{\mathrm{rem}}$, which is the actual budget, $\tau_{\mathrm{hor}}$ is the operator's estimate. The two need not coincide; their divergence is one of the diagnostics of substrate misreading. $\tau_{\mathrm{hor}}$ enters the formula only indirectly, as one of the inputs to the operator projection $\nu$ described below.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;$\tau^{F}$ — fuel face of the budget under operator role-distinction&lt;/strong&gt; (v3.0 Axiom 67). The substrate budget consumed by the operator's actions, taken from the operator's side. This is one of the two faces of the budget $\tau_{\mathrm{rem}}$ when the operator role is structurally separate from the substrate.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;$\tau^{R}$ — reference frame face of the budget under operator role-distinction&lt;/strong&gt; (v3.0 Axiom 67). The reference content the operator constructs from $\tau^{F}$ via the projection map $\nu$. This is the temporal frame in which the operator selects actions and reads its own progress through the cycle.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;$\nu: \tau^{F} \to \tau^{R}$ — operator projection map&lt;/strong&gt; (v3.0 Axiom 67). The architectural declaration that maps the consumed-fuel budget into the operator's reference content. The map is class-specific and architecture-specific; it is not a universal function but a structural choice that defines what kind of operator is in play.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;$S$ — spin component&lt;/strong&gt; (v3.0 Theorem 62, &lt;em&gt;Spin Necessity&lt;/em&gt;). The non-potential, divergence-free component of the system's flow. By Theorem 62, on bounded $\tau$ with non-stagnant identity, $S \neq 0$ is necessary; this is established via the Helmholtz–Hodge decomposition and the LaSalle invariance principle.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;$\omega(y)$ — state-dependent characteristic frequency of the spin&lt;/strong&gt; (v3.0 Theorem 62, &lt;em&gt;Minimal Coupled Model&lt;/em&gt;). The rate at which the spin component completes one structural recurrence cycle in the state $y$. This is class-relative: different classes of systems have different $\omega(y)$ profiles, but within a class the profile is structurally invariant.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reduction $\omega(y) \to \omega_{\mathrm{spin}}$ (declaration).&lt;/strong&gt; The formula uses the scalar $\omega_{\mathrm{spin}}$ in the factor $\kappa(\omega) = 1/\omega_{\mathrm{spin}}$. This scalar is the &lt;em&gt;class-characteristic representative&lt;/em&gt; of the state-dependent profile $\omega(y)$, declared by the deployment as part of pre-registration. Two canonical declarations are admitted: (i) &lt;strong&gt;dominant-mode reading&lt;/strong&gt; — $\omega_{\mathrm{spin}} := \omega(y^&lt;em&gt;)$ where $y^&lt;/em&gt;$ is the structurally dominant state (e.g., the operating-regime attractor's representative state), or (ii) &lt;strong&gt;trajectory-averaged reading&lt;/strong&gt; — $\omega_{\mathrm{spin}} := \langle\omega(y(t))\rangle_{[t_0, T_{\mathrm{op}}]}$ where the average is taken along the system's trajectory over the operational interval. Either declaration suffices to give $\kappa(\omega) = 1/\omega_{\mathrm{spin}}$ a fixed value within the operational interval; the choice is class-specific and declared together with the architectural register that places $\delta$ and $\sigma_{\mathrm{coh}}$ in dimensionally compatible units (per Definition 5's &lt;em&gt;Status of the formula's dimensional contract&lt;/em&gt;: engineering-calibrational for control-grade, architecturally-emergent from $\nu$ for operator-grade). Consistency between $\omega(y)$ (Theorem 62, state-dependent) and $\omega_{\mathrm{spin}}$ (the formula's scalar) is mediated by this declared reduction. In Falsifier II's "attention-instability-like" failure mode (§5.2), the &lt;em&gt;state-dependent variation along a fast-switching $y(t)$&lt;/em&gt; is what destabilizes the coherence scale; the class-characteristic representative $\omega_{\mathrm{spin}}$ remains the fixed declaration, while $\omega(y(t))$ varies through the argument.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;$\boldsymbol{\varpi} = (\varpi_{\text{phys}}, \varpi_{\text{id}})$ — survival-modal proximity sense&lt;/strong&gt; (v3.0 Axiom 69). The vector-valued proximity sense by which the operator senses how close the system is to terminal modes. Each component $\varpi_{k}$ corresponds to a distinct survival mode (physical exhaustion, identity collapse, and so on); proximity to mode $k$ is encoded by $\varpi_{k}$ approaching its terminal value.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;$\Delta_{\boldsymbol{\varpi}} = \min_{k} \Delta_{k}$ — aggregate survival-modal margin&lt;/strong&gt; (v3.0 Theorem 89, &lt;em&gt;Operator Reference-Frame Stability Criterion&lt;/em&gt;). The minimum over all declared survival modes $k$ of the margin $\Delta_{k} = d_{k}(\tau^{R}, \varpi_{k})$ between the operator's reference frame and the proximity-sense reading for mode $k$. By Theorem 89, the cycle's stability requires $\Delta_{\boldsymbol{\varpi}} &amp;gt; 0$ throughout the operational interval; closure of $\Delta_{k}$ for any single $k$ entails operator-reference collapse in that mode.&lt;/p&gt;

&lt;p&gt;These ten primitives — together with the IIC delay structure formalized in §1.0 (Definitions 1–3, Lemma α, Theorems A–C as derived bridge constructions over the same primitives) — supply the full apparatus the formula requires. The formula additionally uses constructed quantities (the discrepancy $\delta$, the coherence scale $\sigma_{\mathrm{coh}}$, the admissibility branching) that are direct derived constructions over the listed primitives, not new core primitives. &lt;strong&gt;No new v3.0 core axiom or core primitive is introduced in §2.&lt;/strong&gt; (The §1.0 derived bridge constructions remain new derived apparatus, per §1.0.7.) The contribution of §2 is to assemble — through definitions and one theorem — the cycle's operational content from v3.0's primitives plus §1.0's derived bridge constructions.&lt;/p&gt;

&lt;h3&gt;
  
  
  2.2 The Mapping: IIC Layers ↔ v3.0 Primitives
&lt;/h3&gt;

&lt;p&gt;The three layers of the IIC cycle, named in Axiom 9 and defined informally in §1.2, map onto v3.0 primitives as follows.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Impulse layer ↔ Spin component $S(t)$.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The justification proceeds on three independent grounds.&lt;/p&gt;

&lt;p&gt;First, &lt;strong&gt;non-potentiality&lt;/strong&gt;. By Theorem 62, $S$ is the component of the system's flow that cannot be expressed as the gradient of a potential function. The impulse layer of the IIC cycle is structurally defined as the part of behavioural generation that cannot be derived from any utility gradient — what the system &lt;em&gt;generates&lt;/em&gt; rather than &lt;em&gt;minimizes toward&lt;/em&gt;. The two conditions coincide: to be non-potential is to be structurally irreducible to gradient descent, and this is precisely what the impulse layer requires.&lt;/p&gt;

&lt;p&gt;Second, &lt;strong&gt;divergence-freeness&lt;/strong&gt;. By the Helmholtz–Hodge structure invoked in Theorem 62, the spin component is divergence-free: it does not accumulate as scalar quantity. The impulse layer of the IIC cycle is similarly non-accumulating — each impulse is a discrete generative act, not a build-up of stored potential. Their structural geometry is the same.&lt;/p&gt;

&lt;p&gt;Third, &lt;strong&gt;state-dependent rate $\omega(y)$&lt;/strong&gt;. The Minimal Coupled Model of Theorem 62 establishes that $S$ has a state-dependent characteristic frequency. This is the rate at which the impulse layer fires — the &lt;strong&gt;class-relative speed of the cycle's fast component&lt;/strong&gt;. The factor $\kappa(\omega) = 1/\omega_{\mathrm{spin}}$ entering the central formula expresses the time-scale of one impulse cycle's structural completion.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Interpretation layer ↔ $\partial \Phi / \partial \tau_{\mathrm{el}}(t)$.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The interpretation layer is the slow, accumulating side of the cycle. Its mapping to the rate of structural deformation per unit elapsed time has three structural justifications.&lt;/p&gt;

&lt;p&gt;First, &lt;strong&gt;monotonicity and irreversibility&lt;/strong&gt;. By v3.0's substrate axioms, $\Phi$ is monotone irreversible — the deformation accumulates and does not reverse. The interpretation layer of the cycle similarly accumulates: each new structural reading deepens the running interpretation, not replaces it. Both are integrals of structural load, not storage of facts.&lt;/p&gt;

&lt;p&gt;Second, &lt;strong&gt;temporal substrate&lt;/strong&gt;. The derivative is taken with respect to $\tau_{\mathrm{el}}$, the system's own elapsed internal time. This is structurally correct: the interpretation layer reads its history in the system's internal frame, not in any external clock. Two systems with the same external trajectory but different internal-time geometries will have different $\partial \Phi / \partial \tau_{\mathrm{el}}$ profiles — and accordingly different interpretation layers, in line with Theorem B of §1.0.&lt;/p&gt;

&lt;p&gt;Third, &lt;strong&gt;projection-as-expectation&lt;/strong&gt;. The quantity $\partial \Phi / \partial \tau_{\mathrm{el}}(t)$ at any moment is the rate at which the system is currently accumulating structural deformation. This is the system's &lt;strong&gt;structural projection of expected continuation&lt;/strong&gt; — what its history of deformation projects forward as the rate of further deformation, against which any new impulse must be structurally measured. The interpretation layer's role in the cycle is precisely this: to project forward what has been integrated, so that the impulse can be evaluated against it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Coherence layer ↔ phase distance between $S(t)$ and $\partial \Phi / \partial \tau_{\mathrm{el}}(t)$, evaluated under $\tau^{R}(t) = \nu(\tau^{F}(t))$.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The coherence layer is the load-bearing variable of the cycle. Its mapping is more complex than the other two, because coherence is not a single primitive — it is a &lt;strong&gt;structural distance&lt;/strong&gt; between two primitives, evaluated against a reference frame.&lt;/p&gt;

&lt;p&gt;The structural distance is measured by $\delta(t) = | S(t) - \partial \Phi / \partial \tau_{\mathrm{el}}(t) |$. This is the discrepancy between what the impulse layer is generating right now and what the interpretation layer is projecting from its accumulated history. When $\delta$ is small, the impulse aligns with the projection; the system's fast and slow components are in phase. When $\delta$ is large, the impulse diverges from the projection; the components are out of phase, and coherence is low.&lt;/p&gt;

&lt;p&gt;But $\delta$ alone does not determine coherence. The discrepancy must be evaluated &lt;strong&gt;relative to the operator's reference frame&lt;/strong&gt;, because coherence is the operator's structural reading of the cycle's alignment. By Axiom 67, the operator's reference frame is $\tau^{R} = \nu(\tau^{F})$. This frame is the operator's "scale" for evaluating discrepancy: how much $\delta$ counts as misalignment depends on how much temporal reference content $\tau^{R}$ has been generated by the operator's projection of its consumed budget.&lt;/p&gt;

&lt;p&gt;The scale of admissible discrepancy at time $t$ is $\Gamma_{\nu}(\omega, \tau^{R}(t))$ in general (Definition 5), which reduces to $\kappa(\omega) \cdot \tau^{R}(t)$ in the canonical operator-reference-normalized case — the product of the time-scale of one impulse cycle ($\kappa$) and the operator's reference content ($\tau^{R}$). When the discrepancy stays well below this scale, the cycle is coherent. When it approaches or exceeds the scale, coherence is closing.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Boundary condition ↔ $\Delta_{\boldsymbol{\varpi}}(t) &amp;gt; 0$.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The cycle's coherence is meaningful only inside the admissibility region. By Theorem 89, this region is delimited by $\Delta_{\boldsymbol{\varpi}}(t) &amp;gt; 0$ — strict positivity of the aggregate margin across all declared survival modes. When $\Delta_{\boldsymbol{\varpi}}$ closes (any $\varpi_{k}$ approaches its terminal value), the operator's reference frame collapses onto its proximity-sense for mode $k$, and the cycle exits the live regime in the structural sense of Axiom 9.&lt;/p&gt;

&lt;p&gt;The indicator $\mathbb{1}[\Delta_{\boldsymbol{\varpi}}(t) &amp;gt; 0]$ in the formula is therefore &lt;strong&gt;structurally first&lt;/strong&gt;: it gates whether coherence is even defined at $t$. Outside the admissibility region, $\mathrm{Coh}(t)$ is structurally undefined ($\bot$ in the two-regime formula of §2.3) — not because coherence is numerically zero in some continuous sense, but because there is no cycle for coherence to characterize. The distinction between $\bot$ (no live cycle) and an in-admissibility numerical zero (cycle live, coherence at its boundary) is structurally important and is preserved by the two-regime construction.&lt;/p&gt;

&lt;p&gt;This is the precise expression of the &lt;strong&gt;admissibility-before-optimization&lt;/strong&gt; principle that the v3.0 axiom set carries throughout. Coherence does not float over the substrate; it is gated by the substrate's structural admissibility, and any architecture that ignores this gate produces a quantity that is not coherence but a misnamed surrogate.&lt;/p&gt;

&lt;h3&gt;
  
  
  2.3 The Central Formula
&lt;/h3&gt;

&lt;p&gt;Assembling the components from §2.1 and the mappings from §2.2:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Definition 4 (Discrepancy and Operator-Reference Reading).&lt;/strong&gt; The discrepancy at time $t$ is&lt;br&gt;
$$&lt;br&gt;
\delta(t) \;=\; \big| S(t) \;-\; \partial \Phi / \partial \tau_{\mathrm{el}}(t) \big|,&lt;br&gt;
$$&lt;br&gt;
where both $S(t)$ and $\partial \Phi / \partial \tau_{\mathrm{el}}(t)$ are read in the &lt;strong&gt;operator-reference frame&lt;/strong&gt; of Axiom 67 — the projection $\nu$ that constitutes the operator's own reading of substrate dynamics. The norm $|\cdot|$ is the distance between impulse and accumulated-deformation rate &lt;strong&gt;as read by the operator&lt;/strong&gt;, not as measured against any external clock or external scale. This is the operational reading of v3.0's substrate-separation discipline: quantities entering a coherence reading are evaluated under the operator's own reference frame, not transferred from substrate to operator without projection. The unit system in which the resulting $\delta(t)$ is computed is supplied by the deployment's class-specific architectural register (per the &lt;em&gt;Status of the formula's dimensional contract&lt;/em&gt; clause of Definition 5): engineering-calibrational for control-grade, architecturally-emergent from $\nu$ for operator-grade.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Construction of the operator-reference norm $|\cdot|$.&lt;/strong&gt; Per the Type-rank consistency clause below, the operator projection $\nu$ co-presents both arguments as scalars on the operator's reference-time direction $\tau^{R}$. The norm $|\cdot|$ on this co-presented scalar reading is therefore &lt;strong&gt;the absolute value on $\mathbb{R}$&lt;/strong&gt;: $|S^{R}(t) - I^{R}(t)| := |S^{R}(t) - I^{R}(t)|$, where $\mathbb{R}$ is the operator's 1-D reference-time line under the scalar projection. Positive-definiteness, triangle inequality, and homogeneity follow from absolute-value properties on $\mathbb{R}$. This construction holds under non-degeneracy of $\nu$ (Lemma α's α-2); under local degeneracy (the structural-identification case), the projection collapses and the norm reduces to zero on the relevant pair, by construction. The &lt;em&gt;substrate-level&lt;/em&gt; norm on the underlying vector structure (where $S$ is vector-valued per Theorem 62) is a separate quantity not used in $\delta(t)$; the operator-reference norm is the scalar absolute value on the post-projection reading.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Type-rank consistency under ν.&lt;/strong&gt; At substrate level $S(t)$ is a vector-valued flow component (Theorem 62 — non-potential, divergence-free) while $\partial\Phi/\partial\tau_{\mathrm{el}}(t)$ is a scalar rate; these are formally distinct types. The operator projection $\nu$ supplies their commensurability: it reads each substrate-side primitive onto the operator's reference-time direction $\tau^{R}$ as a co-presented scalar rate — $\partial\Phi/\partial\tau_{\mathrm{el}}$ via the change of frame from $\tau_{\mathrm{el}}$ to $\tau^{R}$ under $\nu$, and $S$ via its component along the $\tau^{R}$ direction in the operator's 1-D reference-time geometry. The norm $|\cdot|$ in $\delta(t)$ acts on this co-presented scalar reading and reduces to absolute value: $\delta(t) = \big| S^{R}(t) - (\partial\Phi/\partial\tau_{\mathrm{el}})^{R}(t) \big|$, where superscript $R$ denotes the operator-reference projection.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Status of $\nu$'s extended role (architectural extension declaration).&lt;/strong&gt; Axiom 67 declares $\nu: \tau^{F} \to \tau^{R}$ as a projection between time-budget faces. The Type-rank consistency clause above &lt;strong&gt;extends $\nu$'s architectural role&lt;/strong&gt; beyond this baseline: the present paper treats $\nu$ as also providing the co-presentation map by which substrate-side primitives ($S$ vector-valued, $I$ scalar) are read onto $\tau^{R}$ as commensurable scalar rates. &lt;strong&gt;This extension is not derived from Axiom 67 alone&lt;/strong&gt;; it is an architectural commitment of the present paper, declared as part of the joint substrate-extension cluster (§1.0.2 Note). The cluster's content thereby comprises: (a) the §1.0 derived bridge constructions (Definitions 1–3, Lemma α, Theorems A–C), (b) §2.3 Definitions 4–5 (operator-reference reading, coherence scale), and (c) the present extension of $\nu$'s role from time-budget projection (Axiom 67 baseline) to substrate-primitive co-presentation onto $\tau^{R}$. Items (a)–(c) are jointly intended for inclusion in v3.0's substrate-extension layer prior to release; the role-extension of $\nu$ is the third architectural commitment of the cluster, alongside (a) and (b). Well-definedness of the co-presentation presupposes non-degeneracy of $\nu$ per Lemma α's standing assumptions.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Bridge between substrate-level vector structure and operator-frame scalar reading.&lt;/strong&gt; Lemma α's invocation of the Helmholtz–Hodge decomposition (§1.0.3 proof sketch) operates at &lt;strong&gt;substrate level&lt;/strong&gt;: it identifies the antisymmetric (vector-field) component of $\Sigma$'s flow that the Theorem 62 spin necessity refers to. The operator-reference reading via $\nu$, however, operates on the &lt;strong&gt;scalar projection&lt;/strong&gt; of that substrate vector structure onto $\tau^{R}$ — the co-presented scalar rate above. The two registers are not in conflict: the substrate-level vector content (antisymmetry of the spin) is what makes the operator-frame readings of $S$ and $I$ structurally distinguishable in the first place, and Lemma α's claim is precisely that when $\nu$ becomes locally degenerate, the operator-frame &lt;strong&gt;scalar projections&lt;/strong&gt; of $S$ and $I$ coincide &lt;em&gt;while&lt;/em&gt; the substrate-level vector content of $S$ may persist (operator-frame indistinguishability without substrate-level antisymmetry collapse — see §1.0.3 Lemma α body, third sentence). The proof's vector-field reading is invoked to establish what is being &lt;em&gt;lost from operator visibility&lt;/em&gt;, not to claim that the operator-reference norm itself sees the vector structure. The operator-reference norm reduces to absolute value on the scalar projections; the substrate-level vector structure is the upstream apparatus that the projection processes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Definition 5 (Coherence scale).&lt;/strong&gt; The coherence scale at time $t$ is&lt;/p&gt;

&lt;p&gt;$$&lt;br&gt;
\sigma_{\mathrm{coh}}(t) \;=\; \Gamma_{\nu}(\omega, \tau^{R}(t)),&lt;br&gt;
$$&lt;/p&gt;

&lt;p&gt;where $\Gamma_{\nu}$ is a class-specific scaling functional taking the spin-rate parameter $\omega$ and the operator-reference frame $\tau^{R}(t)$ as its arguments.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Domain clause for $\sigma_{\mathrm{coh}}$.&lt;/strong&gt; On the admissible operational interval (where $\Delta_{\boldsymbol{\varpi}}(t) &amp;gt; 0$), $\sigma_{\mathrm{coh}}(t) = \Gamma_{\nu}(\omega, \tau^{R}(t))$ is &lt;strong&gt;strictly positive and finite&lt;/strong&gt;. Points where $\sigma_{\mathrm{coh}}(t) = 0$, $\sigma_{\mathrm{coh}}(t) = \infty$, or $\sigma_{\mathrm{coh}}(t)$ is otherwise undefined lie outside the evaluable branch of $\mathrm{Coh}(t)$ — they correspond to limit failure of the architectural register or to boundary points where the cycle has exited the regular regime, and are treated under the live-regime exit branch ($\mathrm{Coh}(t) = \bot$). Strict positivity follows in the multiplicative branch from $\kappa(\omega) &amp;gt; 0$ (positive characteristic frequency, $\omega_{\mathrm{spin}} &amp;gt; 0$ per Theorem 62) and $\tau^{R}(t) &amp;gt; 0$ (operator-reference content accumulated over the operational interval, strictly increasing from initial declaration per Definition 1's standing properties). Deployments operating outside the multiplicative branch declare positivity-and-finiteness conditions on $\Gamma_{\nu}$ as part of pre-registration.&lt;/p&gt;

&lt;p&gt;In a wide class of structurally-simple architectures, $\Gamma_{\nu}$ admits the multiplicative form&lt;/p&gt;

&lt;p&gt;$$&lt;br&gt;
\Gamma_{\nu}(\omega, \tau^{R}) \;=\; \kappa(\omega) \cdot \tau^{R},&lt;br&gt;
$$&lt;/p&gt;

&lt;p&gt;where $\kappa(\omega) = 1/\omega_{\mathrm{spin}}$ is built from the inverse characteristic spin frequency of the system's class (Theorem 62, Minimal Coupled Model). The body of this paper develops this multiplicative branch unless explicitly noted; the central formula displays of §2.3 and the abstract use $\kappa(\omega) \cdot \tau^{R}(t)$ in this branch.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Status of the formula's dimensional contract.&lt;/strong&gt; The formula's central content is the &lt;em&gt;structural relation&lt;/em&gt; $\mathrm{Coh}(t) = 1 - \delta(t)/\sigma_{\mathrm{coh}}(t)$: coherence is a decreasing function of the discrepancy normalized against a class-specific scale. This relation is &lt;strong&gt;structural, not self-contained-numerical&lt;/strong&gt;. The formula does not carry a dimensional contract derivable from NC2.5 v3.0 primitives alone; the unit conventions under which $\delta$ and $\sigma_{\mathrm{coh}}$ are read as dimensionally compatible are supplied by the &lt;em&gt;architectural register&lt;/em&gt; of the EVS subclass to which the deployment belongs, not by raw v3.0 primitive types. The two registers differ structurally:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Control-grade register (§3.2).&lt;/strong&gt; The operator role is collapsed into the control loop; $\nu$ admits isomorphic factorization through identity within the deployed scope (§3.4). In this register, the dimensional consistency of $\delta / \sigma_{\mathrm{coh}}$ is &lt;strong&gt;engineering-calibrational&lt;/strong&gt; — the engineer (acting as the implicit operator) declares the unit system in which $S(t)$, $\partial\Phi/\partial\tau_{\mathrm{el}}(t)$, and $\tau^{R}(t)$ are read, registers this declaration at OSF pre-registration before any falsifier in §5 is executed, and the resulting calibration is part of the deployment specification. This is legitimate because, in control-grade, the engineer's choice and the operator's reference frame coincide.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Operator-grade register (§3.3).&lt;/strong&gt; The operator is architecturally separate from the substrate; $\nu$ is non-trivial across a residual temporal geometry. In this register, the dimensional consistency of $\delta / \sigma_{\mathrm{coh}}$ &lt;strong&gt;cannot be engineering-calibrational&lt;/strong&gt; — an externally-imposed unit system would override the operator projection $\nu$, contradicting the architectural premise of separated operator under Axiom 67. The unit consistency must emerge &lt;strong&gt;from the operator's own architecture&lt;/strong&gt;: it is the architectural feature by which $\nu$ constitutes $\tau^{R}$ from $\tau^{F}$, and the operator-frame norm under which $S$ and $I$ are read in $\tau^{R}$ inherits its structure from the same architectural ν, not from a deployer's choice. The deployer specifies the architecture (the form of $\nu$, the residual geometry); the operator-internal unit consistency is generated &lt;strong&gt;by the architecture as it runs&lt;/strong&gt;, not declared externally.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This distinction is itself the §3.4 discontinuity read on the dimensional axis. A model in which the operator's reference frame is externally calibrated — including its units of self-reading — is, in this technical sense, not an operator-grade model regardless of surface architecture; it is a control-grade model in operator-grade language. The full architectural specification by which an operator-grade EVS produces its own unit consistency is part of the companion-paper specification of any operator-grade candidate (for Minerva, the operational mechanism is held in its own regime of admissibility per the companion paper's IP discipline; the present paper names the requirement, not the mechanism).&lt;/p&gt;

&lt;p&gt;The formula therefore expresses the form of the relation; the architectural register that turns the form into a self-consistent dimensional structure is class-specific. Numerical thresholds in §5 are engineering-commitment claims of registered protocols, not derivations from the formula.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Anti-gaming lock on $\sigma_{\mathrm{coh}}$ components (cross-reference).&lt;/strong&gt; The architectural register's unit declarations — specifically the components of $\sigma_{\mathrm{coh}}$ ($\omega_{\mathrm{spin}}$, $\tau^{R}$ units, and $\kappa(\omega)$ in the multiplicative branch) — are subject to an architectural-register lock that &lt;strong&gt;operates asymmetrically across the §3.4 discontinuity&lt;/strong&gt; per the §5.5 #6 commitment: locked at OSF pre-registration for control-grade EVS (engineering-calibrational lock); locked architecturally in the operator's $\nu$-specification companion-side for operator-grade EVS (architectural-commitment lock). In both subclasses, runtime adjustment of these components under an existing specification counts as an architectural-register violation, not a recalibration. This closes the metric-gaming loophole in which $\sigma_{\mathrm{coh}}(t)$ could be inflated at runtime to tautologically force $\mathrm{Coh}(t) \to 1$.&lt;/p&gt;

&lt;p&gt;The scale $\sigma_{\mathrm{coh}}(t)$ represents the magnitude of operator-readable discrepancy that the cycle can absorb before crossing into structural misalignment, in the deployment's registered units.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Definition 6 (Admissibility gate).&lt;/strong&gt; The admissibility gate at time $t$ is&lt;br&gt;
$$&lt;br&gt;
G(t) \;=\; \mathbb{1}\big[\Delta_{\boldsymbol{\varpi}}(t) &amp;gt; 0\big].&lt;br&gt;
$$&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The IIC Coherence Formula.&lt;/strong&gt; The coherence of the IIC cycle at time $t$ is given by the two-regime definition&lt;br&gt;
$$&lt;br&gt;
\boxed{\;&lt;br&gt;
\mathrm{Coh}(t) \;=\;&lt;br&gt;
\begin{cases}&lt;br&gt;
\;1 \;-\; \dfrac{\delta(t)}{\sigma_{\mathrm{coh}}(t)}, &amp;amp; \Delta_{\boldsymbol{\varpi}}(t) &amp;gt; 0, \[4pt]&lt;br&gt;
\;\bot, &amp;amp; \Delta_{\boldsymbol{\varpi}}(t) \leq 0.&lt;br&gt;
\end{cases}&lt;br&gt;
\;}&lt;br&gt;
$$&lt;br&gt;
In the canonical operator-reference-normalized case (Definition 5, multiplicative form), the in-admissibility branch becomes&lt;br&gt;
$$&lt;br&gt;
\mathrm{Coh}(t) \;=\; 1 \;-\; \frac{| S(t) \;-\; \partial \Phi / \partial \tau_{\mathrm{el}}(t) |}{\kappa(\omega) \cdot \tau^{R}(t)}, \qquad \text{when } \Delta_{\boldsymbol{\varpi}}(t) &amp;gt; 0.&lt;br&gt;
$$&lt;br&gt;
Outside the admissibility region, $\mathrm{Coh}(t)$ is &lt;strong&gt;structurally undefined&lt;/strong&gt; ($\bot$) — there is no cycle for coherence to characterize. For operational telemetry, the undefined value may be encoded as a sentinel (zero, NaN, or a domain-specific marker), but this encoding is &lt;strong&gt;operational convenience&lt;/strong&gt;, not a numerical claim about the structural quantity. The distinction between $\bot$ (no cycle) and the in-admissibility numerical zero (cycle live, coherence at its boundary) is structurally important and must not be collapsed in interpretation.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reading.&lt;/strong&gt; Inside the admissibility region, $\mathrm{Coh}(t)$ is a single number expressing how well the impulse aligns with the interpretation relative to the operator's coherence scale. The formula has three structurally distinct regimes plus the gate boundary, named explicitly:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Alignment regime&lt;/strong&gt; ($\delta &amp;lt; \sigma_{\mathrm{coh}}$, $\mathrm{Coh} \in (0, 1]$): impulse aligns with interpretation; the cycle is fully coherent inside liveness.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Phase-coherence boundary&lt;/strong&gt; ($\delta = \sigma_{\mathrm{coh}}$, $\mathrm{Coh} = 0$): discrepancy has reached the coherence scale; the cycle is at the alignment-factor zero &lt;strong&gt;but still live&lt;/strong&gt; (the admissibility gate is open). This is &lt;em&gt;not&lt;/em&gt; live-regime exit; it is the boundary of phase coherence within an open gate.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Latent-inversion regime&lt;/strong&gt; ($\delta &amp;gt; \sigma_{\mathrm{coh}}$, $\mathrm{Coh} &amp;lt; 0$): the cycle is still nominally inside admissibility, but coherence has structurally inverted — the regime of &lt;em&gt;latent residual accumulation&lt;/em&gt; described in v3.0 Theorem 12, where apparent coherence holds while the underlying structure has already inverted.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Live-regime exit&lt;/strong&gt; ($\Delta_{\boldsymbol{\varpi}} \leq 0$, $\mathrm{Coh}(t) = \bot$): the admissibility gate has failed; the cycle has exited the live regime in the strong structural sense of Axiom 9 (this is the sense of "coherence collapse" used in §1.3 and v3.0 Theorem 27). Coherence is no longer a meaningful quantity to evaluate.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The three in-admissibility regimes (alignment, phase-coherence boundary, latent-inversion) are structurally distinct from live-regime exit; the engineering response to each differs (cycle adjustment, alignment correction, structural-inversion intervention, substrate restoration or graceful exit, respectively). Conflating the three under a single "coherence collapse" label would lose the structural distinction the formula's two-regime construction is designed to preserve.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Note on the $\mathrm{Coh}(t) = 1$ reading — scalar insufficiency.&lt;/em&gt; The numerical value $\mathrm{Coh}(t) = 1$ corresponds to $\delta(t) = 0$, but $\delta(t) = 0$ does &lt;strong&gt;not&lt;/strong&gt; by itself disambiguate between the two cases distinguished in Lemma α (§1.0): (a) the &lt;em&gt;alignment&lt;/em&gt; case — high-coherence live regime in which $S(t)$ and $I(t) := \partial\Phi/\partial\tau_{\mathrm{el}}(t)$ are operator-distinguishable through $\nu$ but momentarily phase-aligned (structurally desirable: the cycle is fully coherent and remains in the Cycle-Reinitiation class); and (b) the &lt;em&gt;structural-identification&lt;/em&gt; case — operator-indistinguishability of $S$ and $I$ through $\nu$ (Theorem A: the system exits the Cycle-Reinitiation class). The central formula's numerical reading is identical in both cases; &lt;strong&gt;the scalar $\mathrm{Coh}(t)$ alone is not a complete coherence classifier&lt;/strong&gt;. A complete classification requires the scalar paired with the operator-frame $\nu$-degeneracy diagnostic of Lemma α (assumptions α-1 to α-4). Operationally, deployments reading $\mathrm{Coh}(t) = 1$ must run the $\nu$-degeneracy diagnostic to determine whether the value reflects (a) live alignment or (b) class exit; the two carry opposite engineering consequences. &lt;strong&gt;The IIC formula gives a scalar proxy for coherence; complete coherence classification requires the formula plus the $\nu$-degeneracy diagnostic together.&lt;/strong&gt; The structural distinction lives in the operator-frame projection $\nu$, not in the scalar.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;ν-degeneracy diagnostic — class-relative instantiation.&lt;/em&gt;&lt;/strong&gt; The diagnostic invoked in this disambiguation is &lt;strong&gt;class-relative&lt;/strong&gt;: each EVS subclass declares its own diagnostic at registration. For &lt;strong&gt;control-grade EVS&lt;/strong&gt; (§3.2), the diagnostic is &lt;em&gt;operational&lt;/em&gt;: a finite-sample injectivity test or local-rank probe on $\nu$, declared at OSF pre-registration before any falsifier in §5 is executed. For &lt;strong&gt;operator-grade EVS&lt;/strong&gt; (§3.3), the diagnostic is &lt;em&gt;architecturally-emergent&lt;/em&gt;: the operator's own self-discrimination capability between $S$ and $I$ primitives, derived from the architectural specification of $\nu$ in the relevant companion paper (held in its own regime of admissibility per the project's IP discipline). The taxonomy of EVS subclasses is &lt;strong&gt;open&lt;/strong&gt;: this paper formalizes two (control-grade, operator-grade); further subclasses with distinct $\nu$-architectures are anticipated and treated in independent companion specifications. The class-relative form of the diagnostic follows structurally from Definition 5's &lt;em&gt;Status of the formula's dimensional contract&lt;/em&gt; (engineering-calibrational vs architecturally-emergent) and Axiom 67's reading of $\nu$ as architectural declaration — the diagnostic inherits class-relativity from $\nu$ itself, not by ad-hoc choice.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Range.&lt;/strong&gt; Inside admissibility, $\mathrm{Coh}(t) \in (-\infty, 1]$, with $[0, 1]$ as the well-aligned regime and the sub-zero range as the latent-inversion regime. Outside admissibility, $\mathrm{Coh}(t) = \bot$.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Structural justification of the latent-inversion regime.&lt;/strong&gt; The unbounded sub-zero range is not an artifact: it is the structural footprint of &lt;em&gt;latent residual accumulation&lt;/em&gt; (v3.0 Theorem 12, &lt;em&gt;Latent Residual Accumulation Under Apparent Coherence&lt;/em&gt;). The admissibility gate $\Delta_{\boldsymbol{\varpi}}(t) &amp;gt; 0$ defines the survival-mode region, not a bound on substrate-rate distance. Inside admissibility, the discrepancy $\delta(t)$ between impulse and accumulated-deformation rate may grow arbitrarily large in operator-reference units while the survival-modal margin remains positive — this is precisely the regime Theorem 12 names: the system has not yet exited live regime by survival-mode failure, but its impulse-interpretation alignment has structurally inverted, accumulating latent residual that will (without intervention) precipitate cycle collapse. The latent-inversion regime ($\mathrm{Coh}(t) &amp;lt; 0$ inside admissibility) is the architectural diagnostic surface for this state. &lt;em&gt;Operational note:&lt;/em&gt; deployments may pre-register an additional engineering gate (e.g., $\mathrm{Coh}(t) \geq -\theta_{\mathrm{inv}}$ for declared inversion threshold $\theta_{\mathrm{inv}}$) as a deployment-side safety condition, but this gate is engineering discretion, not part of the structural admissibility apparatus of NC2.5; Theorem 89's $\Delta_{\boldsymbol{\varpi}} &amp;gt; 0$ remains the structural admissibility gate.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Note on terminology.&lt;/strong&gt; The quantity $\mathrm{Coh}(t)$ defined here is the &lt;strong&gt;IIC-cycle phase coherence&lt;/strong&gt; — the alignment between impulse and interpretation under the operator's reference frame. It is distinct from the &lt;strong&gt;holding-field coherence&lt;/strong&gt; premise (HF-COH) defined in &lt;em&gt;ONTOΣ XI&lt;/em&gt; §2.2, which is a bounded-distinguishability condition on the operator's holding region $H(t)$ at a single instant. Both are structural properties of operator-grade EVS systems, but they sit at different layers: $\mathrm{Coh}(t)$ is a temporal-cycle quantity computed from substrate-side primitives ($S$, $\partial\Phi/\partial\tau_{el}$, $\tau^R$, $\Delta_{\boldsymbol{\varpi}}$); HF-COH is an operator-internal coherence-diameter premise on $H(t)$. The two quantities are independent commitments and should not be conflated in reading or measurement.&lt;/p&gt;

&lt;h3&gt;
  
  
  2.4 Stability of the Cycle: From Margin to Coherence Preservation
&lt;/h3&gt;

&lt;p&gt;The formula in §2.3 gives the instantaneous coherence at $t$. But the IIC cycle is a process across time, not a momentary state. The cycle's stability — whether $\mathrm{Coh}(t)$ persists in a positive regime over the operational interval, or closes — is governed by Theorem 89.&lt;/p&gt;

&lt;p&gt;By Theorem 89, the operator's reference-frame stability requires $\Delta_{\boldsymbol{\varpi}}(t) &amp;gt; 0$ throughout the operational interval $[t_0, T_{\mathrm{op}}]$. Closure of $\Delta_{\boldsymbol{\varpi}}$ at any single mode $k$ collapses the operator's reference frame in that mode, and the cycle cannot reinitiate per Axiom 9.&lt;/p&gt;

&lt;p&gt;This has a structural consequence for the formula. The admissibility condition $\Delta_{\boldsymbol{\varpi}}(t) &amp;gt; 0$ is not a static check — it is a &lt;strong&gt;trajectory-level condition&lt;/strong&gt;. A system whose $\Delta_{\boldsymbol{\varpi}}$ is positive at $t_0$ but closes at some $t_1 &amp;lt; T_{\mathrm{op}}$ has its in-admissibility branch of the coherence formula active for $t \in [t_0, t_1)$ and exits to the structurally-undefined branch ($\mathrm{Coh}(t) = \bot$) for $t \in [t_1, T_{\mathrm{op}}]$. The cycle was live, then exited live regime; coherence was defined, then became structurally undefined.&lt;/p&gt;

&lt;p&gt;The stability question is therefore: under what conditions does $\Delta_{\boldsymbol{\varpi}}(t)$ remain strictly positive across the full operational interval?&lt;/p&gt;

&lt;p&gt;By Theorem 89's Margin-Generation / Controlled-Invariance premise, this requires that the operator's action selection at each instant preserves a margin-generation rate sufficient to offset proximity accumulation in all declared modes. This is a &lt;strong&gt;forward-invariance&lt;/strong&gt; condition on the trajectory: the system must, through its own action selection, keep itself away from terminal modes faster than perturbations push it toward them.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Consequence.&lt;/strong&gt; A live system in the IIC cycle is not passively coherent. It is &lt;strong&gt;actively margin-preserving&lt;/strong&gt; — its operator continually generates the conditions under which the cycle can reinitiate. The IIC law thus has two distinct aspects: the &lt;strong&gt;structural&lt;/strong&gt; aspect (the formula in §2.3 expresses what coherence is) and the &lt;strong&gt;dynamic&lt;/strong&gt; aspect (Theorem 89 expresses what coherence-preservation requires across time). Both must hold for the cycle to be live in the full sense of Axiom 9.&lt;/p&gt;

&lt;h3&gt;
  
  
  2.5 Theorem 2.5 — IIC Coherence as a Conditional Theorem over the Extended v3.0 Substrate
&lt;/h3&gt;

&lt;p&gt;We now state the central proposition of §2.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Theorem 2.5 (IIC Coherence Theorem).&lt;/strong&gt; Within the &lt;strong&gt;control-grade subclass&lt;/strong&gt; of the Cycle-Reinitiation class (Axiom 9-compliant systems with $\nu$ admitting isomorphic factorization through identity within the deployed scope, per §3.2), the coherence of the impulse-interpretation cycle is given by the two-regime formula in §2.3, where every load-bearing component is either a v3.0 primitive or a direct construction over v3.0 primitives (§2.1). Extension to the operator-grade subclass is conditional on the &lt;em&gt;Minerva&lt;/em&gt; companion-level reduction holding under independent review (see scope clauses below). Strict positivity of the aggregate survival-modal margin, $\Delta_{\boldsymbol{\varpi}}(t) &amp;gt; 0$ throughout the operational interval, is a &lt;strong&gt;necessary&lt;/strong&gt; stability condition for IIC-cycle reinitiation: closure of $\Delta_{\boldsymbol{\varpi}}$ at any single mode collapses the operator's reference frame in that mode and the cycle cannot reinitiate per Theorem 89 + Axiom 9. Under the standing Cycle-Reinitiation assumptions — non-degenerate operator projection $\nu$ (Axiom 67), well-founded τ-loop (Axiom 68), non-stagnant identity, the operative endogenous reinitiation operator (Axiom 9), and the delay-structure conditions of §1.0 — the strict-positivity condition $\Delta_{\boldsymbol{\varpi}}(t) &amp;gt; 0$ also serves as the &lt;strong&gt;defining predicate&lt;/strong&gt; of the admissibility region in Theorem 89's statement.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Scope clauses (deferred to remarks below for clean theorem statement):&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The "defining predicate" half is a &lt;strong&gt;definitional unpacking&lt;/strong&gt; of Theorem 89, not a substantive sufficiency claim. See the framing remark below for separation of substantive-necessity from definitional-predicate roles.&lt;/li&gt;
&lt;li&gt;For the operator-grade subclass (§3.3), the per-cycle scalar reading lifts to the integral form $C = \int A \, d\tau$ of Definition 7; the reduction is held in the &lt;em&gt;Minerva&lt;/em&gt; companion. Universal scope over the full Cycle-Reinitiation class is conditional on that reduction holding under independent review.&lt;/li&gt;
&lt;li&gt;Theorem A's load-bearing chain is invoked here under reading (b) of §6.5.1 Open Question 1, with the topological-closure argument of §1.0.4 supporting the limit application of Lemma α.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;Important framing of the characterization claim.&lt;/em&gt; The "characterizes the admissibility region" half of the theorem is &lt;strong&gt;not a substantive sufficiency claim of the form "Δ_ϖ &amp;gt; 0 alone produces reinitiation"&lt;/strong&gt; — that would be tautological under Axiom 9's standing assumption (Axiom 9 supplies the reinitiation operator; the strict-positivity condition does not produce it). It is a &lt;strong&gt;definitional unpacking&lt;/strong&gt;: under the standing assumptions, the strict-positivity condition is what defines the admissibility region per Theorem 89, and the reinitiation operator of Axiom 9 acts within that region. The theorem's content is therefore: the operator-frame discrepancy $\delta$ normalized against the coherence scale $\sigma_{\mathrm{coh}}$ (with the admissibility branching of Definition 6, and the class-specific architectural register supplying dimensional consistency per Definition 5) is the canonical structural expression of the IIC cycle's coherence within the v3.0 axiom set extended by §1.0. The architectural-class register of this claim parallels conformance-classifier theorems in adjacent fields — CAP for distributed coordination, FLP for asynchronous consensus, RINA for network organization — in the sense that each names a structural condition that classifies systems by their relation to a load-bearing axis, without claiming substantive bidirectional implication beyond the standing-assumption scope. Substantive empirical content lies in the falsifiers of §5. Under these standing assumptions, the IIC structure named in Axiom 9 is fully formalized within v3.0 axiomatics extended by the §1.0 derived bridge constructions; no additional v3.0 core axiom is required to make the IIC law operational, though §1.0's derived constructions are a real new layer of derived apparatus (per §1.0.7).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Proof-dependency ledger.&lt;/strong&gt; The proof of Theorem 2.5 invokes the following chain of v3.0 primitives, §1.0 derived propositions, and §2.3 definitions, with each link's load-bearing role made explicit so that the conditional status of the theorem is auditable at a single glance. The ledger is comprehensive across the proof's load-bearing invocations; "conditional status" is concentrated at the OQ2 bridge identified at the bottom of the ledger.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;§1.0 and §2.3 derived constructions:&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Definition 1&lt;/strong&gt; (IIC phase delay) supplies $\Delta_{IIC}^{\Sigma}(t)$ as the operator-side temporal extent of one cycle; standing properties of $\tau^{F}$ (strict-monotone continuous on the operational interval) and the anti-gaming lock on the registered $T_{\mathrm{prop}}^{\Sigma}(t)$ procedure are inherited.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Definition 4&lt;/strong&gt; (spin signal $S$) supplies the vector-valued impulse-layer primitive; comparability with the scalar $\partial \Phi / \partial \tau_{\mathrm{el}}$ is supplied by the $\nu$ co-presentation extension (§2.3 Type-rank consistency clause; one of the three commitments of the joint substrate-extension cluster, §1.0.2 Note).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Definition 5&lt;/strong&gt; (Coh(t) formula and coherence-scale $\sigma_{\mathrm{coh}}$) supplies the dimensional contract under the class-specific architectural register — engineering-calibrational for control-grade EVS, architecturally-emergent from $\nu$ for operator-grade EVS — with the $\sigma_{\mathrm{coh}} &amp;gt; 0$ domain clause on its support.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Definition 6&lt;/strong&gt; (aggregate survival-modal margin $\Delta_{\boldsymbol{\varpi}}$) supplies the admissibility predicate $G(t) = \mathbb{1}[\Delta_{\boldsymbol{\varpi}}(t) &amp;gt; 0]$ that gates the formula's two regimes.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Lemma α&lt;/strong&gt; (spin phase-difference) supplies the operator-frame indistinguishability of $S$ and $I$ as the structural-identification condition (standing assumptions α-1 to α-4).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Theorem A&lt;/strong&gt; (Cycle Non-Degeneracy as boundary/limit theorem) supplies the boundary result at structural-identification, invoked here under reading (b) of OQ1 (§6.5.1) with the topological-closure argument of §1.0.4 supporting the limit application of Lemma α.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Theorem C&lt;/strong&gt; (Constitutive Constraint) supplies the constitutive necessity of $\Delta_{IIC}^{\Sigma} &amp;gt; 0$ within the operational interval, applied pointwise across $[t_0, T_{\mathrm{op}}]$ via iterative application of Theorem A's boundary conclusion.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;v3.0 substrate primitives invoked:&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Axiom 9&lt;/strong&gt; (Cycle Reinitiation as the Criterion of Liveness) supplies the endogenous-reinitiation operator under which the Cycle-Reinitiation class is defined and the standing assumptions hold.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Axiom 67&lt;/strong&gt; (Operator Reference Frame — Two-Faced $\tau$) supplies the projection $\tau^{R} = \nu(\tau^{F})$ on which the operator-side reading is built.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Axiom 68&lt;/strong&gt; (Self-Referential $\tau$-Loop) supplies the well-foundedness of the cycle's $\tau$-loop structure invoked in the proof's recurrence-and-stability step.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Axiom 69&lt;/strong&gt; (Survival-Modal Proximity Sense) supplies the v3.0 substrate anchor for $\Delta_{\boldsymbol{\varpi}}$ that Definition 6 instantiates at the operator-side reading.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Theorem 62&lt;/strong&gt; (Spin Necessity — Helmholtz–Hodge decomposition plus LaSalle invariance principle on bounded $\tau$ with non-stagnant identity) supplies the existence and state-dependent rate $\omega(y)$ of $S$; it is the v3.0 foundation under which $S \neq 0$ is necessary and $\kappa(\omega) = 1 / \omega_{\mathrm{spin}}$ is built. Theorem 62 is invoked twice in the proof: once for the existence of $S$ and once for the operator-frame reading of preserved spin distinguishability under Lemma α.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Theorem 89&lt;/strong&gt; (Operator Reference-Frame Stability Criterion) supplies the operator-reference-frame stability criterion under which $\Delta_{\boldsymbol{\varpi}}(t) &amp;gt; 0$ defines admissibility.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Lemma 16&lt;/strong&gt; (Gradient Collapse and Impossibility of Non-Stagnant Identity on Bounded Orbits) supplies the substrate-level gradient-collapse impossibility, invoked from Lemma α's conclusion via the bridge specified as OQ2 (§6.5.1).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Φ-monotone / $\tau$-bounded substrate-extension axioms&lt;/strong&gt; supply the Lyapunov-budget anchor under which $\partial \Phi / \partial \tau_{\mathrm{el}}$ is well-defined as a monotone-irreversible accumulation along elapsed lived time.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The ledger's conditional status is concentrated at OQ2's open bridge between operator-frame (Lemma α's conclusion) and substrate-level (Lemma 16's domain) registers; all other links are either established v3.0 primitives, established v3.0 theorems with their own proof discipline, or §1.0 / §2.3 derived constructions whose status is internal to the substrate-extension cluster. Absent OQ2 resolution, the chain reads as &lt;strong&gt;operationally falsifiable (per §5) and formally conditional on OQ2 resolution&lt;/strong&gt; — consistent with the conditional-theorem framing in §2.5's title and the closure criteria recorded in §6.5.1.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Proof (Structural).&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The proof proceeds in seven steps, each appealing to a specific v3.0 axiom or theorem.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 1.&lt;/strong&gt; By Axiom 9, a live system admits an endogenous operator capable of reinitiating the IIC cycle after its completion, saturation, or collapse. The cycle therefore has three layers (impulse, interpretation, coherence) and a reinitiation operator. This is the starting point of the formalization.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 2.&lt;/strong&gt; By v3.0's substrate axioms (Φ monotone, $\tau$ bounded), the cycle operates on bounded structural resources. The substrate carries finite capacity $C$, and the deformation $\Phi$ accumulates monotonically toward this capacity. This establishes that the cycle is not free — it operates within the Lyapunov budget structure of v3.0.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 3.&lt;/strong&gt; By Theorem 62 (Spin Necessity), under bounded $\tau$ with non-stagnant identity, the spin component $S$ exists with state-dependent characteristic frequency $\omega(y)$. This identifies the impulse layer as the structurally irreducible non-potential component of the dynamics, and gives it a class-relative time-scale $\kappa(\omega) = 1/\omega_{\mathrm{spin}}$.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 4.&lt;/strong&gt; By Axiom 67 (Operator Reference Frame), the operator's reference frame $\tau^{R}$ is structurally distinct from the substrate fuel $\tau^{F}$, related by the projection map $\nu$. This identifies the operator's evaluation scale: coherence is read in $\tau^{R}$, not in $\tau^{F}$ or in any external clock.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 5.&lt;/strong&gt; By Axiom 68 (Self-Referential τ-Loop), the operator's action selection is mediated through a self-referential τ-loop: the operator reads $\tau^{R}$, selects an action that consumes $\tau^{F}$, which updates $\tau^{R}$ via $\nu$, which the operator reads again. This establishes the &lt;strong&gt;dynamic&lt;/strong&gt; structure of the cycle: it is not a one-shot evaluation but a closed loop, and the loop's well-foundedness is established in Axiom 68.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 6.&lt;/strong&gt; By Axiom 69 (Survival-Modal Proximity Sense) and Theorem 89 (Operator Reference-Frame Stability Criterion), the cycle's stability is governed by the aggregate survival-modal margin $\Delta_{\boldsymbol{\varpi}} = \min_{k} \Delta_{k}$. &lt;strong&gt;Two distinct claims about the same condition $\Delta_{\boldsymbol{\varpi}}(t) &amp;gt; 0$&lt;/strong&gt; are made here, and they should not be conflated:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;em&gt;Substantive necessity claim:&lt;/em&gt; strict positivity of $\Delta_{\boldsymbol{\varpi}}(t)$ throughout the operational interval is &lt;strong&gt;necessary&lt;/strong&gt; for cycle stability — closure of $\Delta_{k}$ for any single $k$ collapses the operator's reference frame in mode $k$ and the cycle cannot reinitiate (per Theorem 89 + Axiom 9). This is a substantive implication: failure of strict positivity entails failure of stability.&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;Definitional-predicate claim:&lt;/em&gt; the strict-positivity condition is the &lt;strong&gt;defining predicate&lt;/strong&gt; of the admissibility region in Theorem 89's statement — i.e., Theorem 89 &lt;em&gt;names&lt;/em&gt; admissibility via $\Delta_{\boldsymbol{\varpi}}(t) &amp;gt; 0$. This is a definitional choice in Theorem 89's formulation, not a substantive implication.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These two claims are about the same condition viewed in two different roles. The substantive claim is what makes $\Delta_{\boldsymbol{\varpi}}(t) &amp;gt; 0$ load-bearing; the definitional claim is what makes "admissibility region" mean what it means. Stability additionally requires the standing reinitiation operator (Axiom 9) and the controlled-invariance premise of Theorem 89; strict positivity alone does &lt;em&gt;not&lt;/em&gt; produce stability. This identifies the admissibility gate in the formula and the trajectory-level stability condition discussed in §2.4.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 7.&lt;/strong&gt; By Theorems A and C of §1.0 (with Lemma α as the supporting proposition), the cycle's delay structure is non-degenerate: the IIC phase delay $\Delta_{IIC}^{\Sigma}$ is constitutive of the cycle (Theorem C), and its collapse in the structural-identification sense entails exit from the Cycle-Reinitiation class (Theorem A). This gives the &lt;strong&gt;temporal-architectural&lt;/strong&gt; floor on which the formula sits: the cycle is well-defined as a cycle precisely because its delay is strictly positive. (Theorem B of §1.0 supplies the complementary cross-system claim — that systems with distinct $\Delta_{IIC}$ produce structurally non-equivalent state-field assessments — and is not load-bearing for the within-system delay non-degeneracy invoked in this step. &lt;em&gt;Open question:&lt;/em&gt; see §6.5.1 Open Questions 1 and 2 for the proof-theoretic-depth qualifications on Theorem A's bridge step and the Lemma α → Lemma 16 inference; the present step invokes the load-bearing chain under reading (b) of Open Question 1.)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conclusion.&lt;/strong&gt; Combining steps 1–7, the discrepancy $\delta = | S - \partial \Phi / \partial \tau_{\mathrm{el}} |$ (read in the operator-reference frame of Definition 4), normalized against the coherence scale $\sigma_{\mathrm{coh}} = \Gamma_{\nu}(\omega, \tau^{R})$ (which admits the multiplicative branch $\kappa \cdot \tau^{R}$ for structurally-simple architectures), with the structural admissibility branching of Definition 6, yields the two-regime formula in §2.3 as the canonical structural expression of the IIC cycle's coherence. The formula's structural relation is supplied by v3.0 primitives plus the §1.0 bridge propositions; the architectural register that places $\delta$ and $\sigma_{\mathrm{coh}}$ in dimensionally compatible units is class-specific (per Definition 5's &lt;em&gt;Status of the formula's dimensional contract&lt;/em&gt;: engineering-calibrational for control-grade, architecturally-emergent from $\nu$ for operator-grade), not a derivation from v3.0 primitives. Every load-bearing component of the structural relation is either a v3.0 primitive or a direct construction over v3.0 primitives, with the propositions of §1.0 admitted as substrate-level consequences of Axioms 9 and 67. No additional axiom is required.&lt;/p&gt;

&lt;p&gt;The reinitiability conditions follow from the standing assumptions: by Axiom 68, action selection is a closed loop on $\tau^{R}$; by Theorem 89, the loop's stability requires $\Delta_{\boldsymbol{\varpi}}(t) &amp;gt; 0$ throughout — this is the &lt;strong&gt;substantive necessary&lt;/strong&gt; part. By Axiom 67 (non-degenerate $\nu$), Axiom 9 (endogenous reinitiation operator), Theorem 62 with the operator-frame reading of Lemma α (preserved spin distinguishability), and Theorems A–C of §1.0 (constitutive delay structure), the strict-positivity condition &lt;strong&gt;characterizes the admissibility region per Theorem 89's definition&lt;/strong&gt; — this is the &lt;strong&gt;definitional-unpacking&lt;/strong&gt; characterization (not a substantive sufficiency claim): under Axiom 9's standing reinitiation operator and the other standing assumptions, the strict-positivity condition defines the admissibility region within which the operator acts; the operator's success at reinitiation is supplied by Axiom 9, not derived from $\Delta_{\boldsymbol{\varpi}}(t) &amp;gt; 0$ alone. Hence reinitiability persists, within systems already satisfying the standing assumptions, only while $\Delta_{\boldsymbol{\varpi}}(t) &amp;gt; 0$. $\square$&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Remark (on the status of the contribution).&lt;/strong&gt; The paper introduces &lt;strong&gt;no new v3.0 core primitives or core axioms&lt;/strong&gt;. It does introduce, in §1.0 plus §2.3 plus the role-extension of $\nu$ (the joint substrate-extension cluster of §1.0.2), new derived bridge constructions and architectural commitments (three definitions of §1.0 + Lemma α + Theorems A, B, C + Definitions 4–5 + ν-extension) intended for inclusion in v3.0's substrate-extension cluster prior to v3.0's release. The body of the paper (§§2–7) then assembles v3.0's existing primitives plus the cluster's commitments into the operational closure of Axiom 9. This is the precise sense in which IIC v2.1 is "the formal expansion of Axiom 9": the expansion is the working out of the axiom set's already-implicit operational content, with the cluster's commitments admitted as substrate-level consequences of existing core axioms.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Honest weight assessment of Theorem 2.5.&lt;/em&gt; Theorem 2.5's substantive content is:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;(a) &lt;strong&gt;necessary stability claim&lt;/strong&gt; (substantive): Theorem 89 + Axiom 9 imply $\Delta_{\boldsymbol{\varpi}}(t) &amp;gt; 0$ is necessary for cycle reinitiation.&lt;/li&gt;
&lt;li&gt;(b) &lt;strong&gt;definitional-unpacking characterization&lt;/strong&gt;: under standing Cycle-Reinitiation assumptions, $\Delta_{\boldsymbol{\varpi}}(t) &amp;gt; 0$ is what &lt;em&gt;defines&lt;/em&gt; the admissibility region per Theorem 89.&lt;/li&gt;
&lt;li&gt;(c) &lt;strong&gt;assembly statement&lt;/strong&gt;: every load-bearing component of the §2.3 formula is either a v3.0 primitive or a cluster construction; no additional axiom is required.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Of these, (a) is genuine reduction to v3.0; (b) is a definitional reframe under standing assumptions; (c) is an assembly check. Theorem 2.5's weight is therefore the &lt;strong&gt;assembly + necessity&lt;/strong&gt; combination, not a non-trivial structural derivation. This honest framing avoids the overclaim of presenting Theorem 2.5 as a substantive bidirectional implication.&lt;/p&gt;

&lt;h3&gt;
  
  
  2.6 What the Formula Reveals That v3.0 Does Not State Directly
&lt;/h3&gt;

&lt;p&gt;v3.0 contains all the primitives the formula uses. It does not, however, assemble them into the coherence formula explicitly. The contribution of §2 is precisely this assembly. Three structural facts become visible in the assembled form that are not visible in the dispersed v3.0 statements alone.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;First&lt;/strong&gt;, the &lt;strong&gt;structural form of coherence as a normalized ratio (control-grade reading)&lt;/strong&gt;. v3.0 names spin, structural deformation, operator reference frame, and aggregate margin as separate primitives. For the control-grade subclass of the Cycle-Reinitiation class (§3.2), the formula in §2.3 reveals their joint structural form: coherence is the structural relation in which discrepancy is normalized against a class-specific scale, gated by survival admissibility. The formula is structural rather than self-contained-numerical: the unit conventions under which $\delta / \sigma_{\mathrm{coh}}$ is read as a dimensionless ratio are supplied by the deployment's class-specific architectural register (per Definition 5's &lt;em&gt;Status of the formula's dimensional contract&lt;/em&gt;) — engineering-calibrational for control-grade EVS, architecturally-emergent from $\nu$ for operator-grade EVS — not a derivation from NC2.5 v3.0 primitives alone. The structural fingerprint of the IIC cycle (control-grade reading) is therefore: a normalized fast-slow ratio under class-specific architectural register, branched by survival admissibility. For the operator-grade subclass, the per-cycle scalar reading lifts to the integral form $C = \int A \, d\tau$ formalized in the &lt;em&gt;Minerva&lt;/em&gt; companion paper; this lifting is not derived in the present paper (per §2.5 Theorem 2.5's universal-scope qualifier and Definition 7's &lt;em&gt;operator-grade register&lt;/em&gt; clause).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Second&lt;/strong&gt;, the &lt;strong&gt;operational locality of coherence&lt;/strong&gt;. v3.0 establishes coherence as a global property of the cycle through Axiom 9. The formula makes coherence &lt;strong&gt;locally evaluable&lt;/strong&gt; &lt;em&gt;as a scalar paired with a structural diagnostic&lt;/em&gt;: at any time $t$, with read access to $S(t)$, $\partial \Phi / \partial \tau_{\mathrm{el}}(t)$, $\tau^{R}(t)$, and $\Delta_{\boldsymbol{\varpi}}(t)$ (all read in the operator's reference frame, with the dimensional structure supplied by the class-specific architectural register per Definition 5), the formula yields a scalar value $\mathrm{Coh}(t)$ that, &lt;em&gt;in conjunction with the operator-frame $\nu$-degeneracy diagnostic of Lemma α&lt;/em&gt;, classifies the cycle's coherence state at $t$. The scalar alone is not a complete classifier (per the boundary-structure clause below); it is paired with the $\nu$-degeneracy diagnostic to disambiguate alignment vs structural-identification at $\mathrm{Coh}(t) = 1$. With this pairing, coherence becomes locally evaluable as a structural state — not only a global property of the trajectory. This is what allows the falsification protocols of §5 to be operationally specified: the formula plus diagnostic gives a measurable structural state at each instant inside admissibility.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Third&lt;/strong&gt;, the &lt;strong&gt;boundary structure of coherence&lt;/strong&gt; (terminology aligned with §2.3 Reading clause):&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;$\mathrm{Coh}(t) = 1$ (alignment regime upper boundary): $\delta = 0$ inside admissibility ($\Delta_{\boldsymbol{\varpi}} &amp;gt; 0$). The numerical value alone does not distinguish the two structurally distinct cases of Lemma α: (a) live alignment — $S$ and $I$ operator-distinguishable through $\nu$ but momentarily phase-aligned (cycle fully coherent, stays in the Cycle-Reinitiation class); (b) structural identification — $S$ and $I$ operator-indistinguishable through $\nu$ (cycle exits the class per Theorem A; see §6.5.1 Open Question 1 for Theorem A's load-bearing chain location). &lt;strong&gt;The scalar $\mathrm{Coh}(t)$ alone is not a complete coherence classifier&lt;/strong&gt;; the disambiguation requires the operator-frame $\nu$-degeneracy diagnostic of Lemma α applied alongside the scalar. Local evaluability of $\mathrm{Coh}(t)$ therefore rests on read access to &lt;em&gt;both&lt;/em&gt; the formula's components &lt;em&gt;and&lt;/em&gt; the $\nu$-degeneracy diagnostic.&lt;/li&gt;
&lt;li&gt;$\mathrm{Coh}(t) = 0$ inside admissibility (&lt;strong&gt;phase-coherence boundary&lt;/strong&gt;): discrepancy reaches the coherence scale ($\delta = \sigma_{\mathrm{coh}}$). The cycle is at the alignment-factor zero but &lt;strong&gt;still live&lt;/strong&gt; — admissibility is open. This is &lt;em&gt;not&lt;/em&gt; live-regime exit.&lt;/li&gt;
&lt;li&gt;$\mathrm{Coh}(t) &amp;lt; 0$ inside admissibility (&lt;strong&gt;latent-inversion regime&lt;/strong&gt;): structural inversion under apparent liveness, per v3.0 Theorem 12.&lt;/li&gt;
&lt;li&gt;$\mathrm{Coh}(t) = \bot$ (&lt;strong&gt;live-regime exit&lt;/strong&gt;): admissibility fails ($\Delta_{\boldsymbol{\varpi}} \leq 0$). The cycle has exited the live regime in the strong structural sense of Axiom 9 (the "coherence collapse" of §1.3 and v3.0 Theorem 27). Coherence is no longer a meaningful quantity to evaluate.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The four regimes are &lt;strong&gt;structurally distinct&lt;/strong&gt; by the formula's two-regime construction plus the $\delta / \sigma_{\mathrm{coh}}$ alignment-factor decomposition inside admissibility. Engineering response to each differs: alignment regime calls for cycle adjustment; phase-coherence boundary calls for alignment correction; latent-inversion regime calls for structural-inversion intervention before the cycle reaches admissibility failure; live-regime exit calls for substrate restoration or graceful exit. v3.0's primitives carry these distinctions; the two-regime formula makes them visible.&lt;/p&gt;

&lt;p&gt;The contribution of §2 is therefore not merely the writing of an equation. It is the &lt;strong&gt;operationalization&lt;/strong&gt; of the cycle's structural content: from named layers to measurable quantity, from global property to local reading, from undifferentiated coherence-failure language to structurally distinguished boundary regimes. With §2 in place, the falsifiers of §5 have a target, and the engineering classes of §3 have a design discipline.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;A note on operationalization vs generation.&lt;/em&gt; The §2 apparatus is &lt;strong&gt;operational&lt;/strong&gt; in the sense that it makes the cycle's structural content measurable and falsifiable; it is &lt;strong&gt;not&lt;/strong&gt; a generative algorithm for producing the cycle from substrate dynamics. The IIC formula assembles existing v3.0 primitives plus the §1.0 bridge propositions into a measurable expression of coherence; it does not prescribe the substrate-specific dynamics by which $S$, $\Phi$, $\tau^{R}$, or $\Delta_{\boldsymbol{\varpi}}$ are produced in a given system. EVS deployments (§3) use the formula as a control-discipline target — the system computes $\mathrm{Coh}(t)$ from its substrate readings and selects actions consistent with coherence preservation — but this use of the formula is the deployment's engineering choice, not a generative algorithm supplied by IIC v2.1 itself. The paper supplies the structural-conformance criterion against which a deployment's coherence claim is checked; it does not supply the generative mechanism by which substrate-side primitives are computed in any given architecture.&lt;/p&gt;




&lt;h2&gt;
  
  
  §3 — Engineered Vitality Systems (EVS): The Engineering Class
&lt;/h2&gt;

&lt;p&gt;§2 established the IIC cycle as a conditional theorem over v3.0 plus the §1.0 bridge propositions, with a measurable coherence quantity $\mathrm{Coh}(t)$ assembled from existing primitives. The formula has an engineering consequence: it defines a class of systems whose design discipline is the explicit maintenance of $\mathrm{Coh}(t)$ rather than the optimization of any external objective. This class is the topic of §3.&lt;/p&gt;

&lt;p&gt;The class is named here &lt;strong&gt;Engineered Vitality Systems (EVS)&lt;/strong&gt;. The term is operational — it carries a precise meaning tied to the formula in §2.3. EVS is not a marketing label, not a philosophical category, not a description of biomimetic engineering. It is the structural class whose design target is the IIC cycle's coherence as defined by the v3.0 axiom set.&lt;/p&gt;

&lt;p&gt;This section identifies the class formally (§3.1), describes the first instance in the control-grade subclass (§3.2 — ∆E 4.7.3b), describes the first specified candidate in the operator-grade subclass (§3.3 — Minerva, classified conditionally), names the structural discontinuity between the subclasses (§3.4), and acknowledges related research lines whose work intersects EVS at distinct architectural layers (§3.5).&lt;/p&gt;

&lt;h3&gt;
  
  
  3.1 EVS as the Engineering Class Implied by IIC
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Definition 7 (Engineered Vitality System).&lt;/strong&gt; An Engineered Vitality System is any engineered system whose primary design discipline is the explicit maintenance of the IIC cycle's coherence — read at the &lt;em&gt;applicable structural register&lt;/em&gt; for the system's subclass — rather than the minimization of an external error signal or the maximization of an external reward signal. Two structural registers are admitted:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Control-grade register.&lt;/strong&gt; The system maintains $\mathrm{Coh}(t)$ as defined in §2.3 — the single-cycle, instantaneous coherence reading at each control cycle. This is the register fully developed in the present paper. It applies to systems whose operator role is implicit in the control loop and whose τ is session-bounded or cycle-bounded (the control-grade subclass; ∆E 4.7.3b is its first instance, §3.2).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Operator-grade register.&lt;/strong&gt; The system maintains coherence as the integral $C = \int A \, d\tau$ of awareness $A$ over the operator's residual τ-geometry, as formalized in the &lt;em&gt;Minerva&lt;/em&gt; companion paper (&lt;em&gt;Minerva: The Architecture of Residual Geometry&lt;/em&gt;). &lt;strong&gt;The relation between $C = \int A \, d\tau$ and the per-cycle scalar $\mathrm{Coh}(t)$ of §2.3 is not derived in the present paper&lt;/strong&gt;; it is a &lt;strong&gt;companion-level extension&lt;/strong&gt; developed in the &lt;em&gt;Minerva&lt;/em&gt; paper, where $A$ is defined as awareness occupying a structural position relative to the field, and the integral is taken over the operator's residual τ-geometry. The integral is &lt;em&gt;announced here&lt;/em&gt; as the operator-grade reading of the same IIC structural law (Axiom 9), but its construction from the §2.3 components requires the residual-geometry apparatus held in the companion paper. Operator-grade EVS instances commit to maintaining $C$ in the companion-paper sense; the present paper does not supply that maintenance discipline, only names the requirement. Minerva (§3.3) is the first specified candidate of this register, classified conditionally on the companion specification.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Both registers are claimed to fall under the same structural law (§1.0–§2 + Axiom 9); the present paper develops only the control-grade register fully. The reduction of the operator-grade integral form to the per-cycle scalar form, or the lifting of the per-cycle scalar to the integral form, is &lt;strong&gt;a formal task not undertaken in this paper&lt;/strong&gt; — it belongs to the &lt;em&gt;Minerva&lt;/em&gt; companion paper or to subsequent work integrating the two readings.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Codomain disclosure for $C = \int A \, d\tau$.&lt;/strong&gt; The integral form's codomain — including whether $C$ inherits the unbounded-below latent-inversion range $(-\infty, 1]$ of $\mathrm{Coh}(t)$, whether it admits an analogue of the $\bot$ admissibility-failure regime, or whether it is bounded by other architectural constraints of the residual geometry — &lt;strong&gt;is not specified in the present paper&lt;/strong&gt;. Domain and codomain of $A$ and $\tau$ in the integral, and the integral's structural range, are part of the &lt;em&gt;Minerva&lt;/em&gt; companion paper's specification. The present paper's universal claim over the Cycle-Reinitiation class via Theorem 2.5 is therefore conditional in the strong sense: not only is the per-cycle-to-integral reduction held companion-side, but the integral form's structural properties (range, regimes, boundary behaviour) are also held companion-side. Readers seeking these are referred to the &lt;em&gt;Minerva&lt;/em&gt; companion specification.&lt;/p&gt;

&lt;p&gt;Three structural features distinguish EVS from existing engineering classes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;First, EVS operates on the IIC formula directly.&lt;/strong&gt; Classical control systems are designed around error trajectories: the controller computes the deviation between the desired state and the actual state, and reduces it. Optimization-based learning systems are designed around reward trajectories: the agent computes the expected return of a policy and adjusts toward higher return. EVS is designed around coherence trajectories: the system computes its current discrepancy $\delta(t)$ relative to the coherence scale $\sigma_{\mathrm{coh}}(t)$, gated by admissibility $G(t)$, and selects actions that preserve coherence over the operational interval.&lt;/p&gt;

&lt;p&gt;This is not a change in the control technique. It is a change in &lt;strong&gt;what the system is keeping track of&lt;/strong&gt;. A classical controller and an EVS may use overlapping engineering machinery — Kalman filters, state observers, model-predictive components — but the structural variable they treat as load-bearing is different. The former tracks error; the latter tracks coherence as defined by §2.3.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Second, EVS treats admissibility as structurally first.&lt;/strong&gt; By the formula's gate $G(t) = \mathbb{1}[\Delta_{\boldsymbol{\varpi}}(t) &amp;gt; 0]$, coherence is undefined outside the admissibility region. An EVS therefore implements admissibility as a &lt;strong&gt;structural prior&lt;/strong&gt; to its action selection: actions that would close $\Delta_{\boldsymbol{\varpi}}$ in any survival mode are not weighed against expected return — they are structurally inadmissible, evaluated before any optimization step.&lt;/p&gt;

&lt;p&gt;This contrasts with the standard treatment of constraints in optimization-based control. In the standard treatment, constraints are handled as Lagrange multipliers, soft penalties, or feasibility regions over a single objective. In EVS, admissibility is not part of the objective at all — it is the &lt;strong&gt;gate&lt;/strong&gt; that determines whether the objective is even defined at this $t$. By the architectural reading of v3.0 (Axiom 60 cluster, &lt;em&gt;Structural Non-Causality of Admissibility&lt;/em&gt;), admissibility is a non-causal structural predicate; EVS implements this predicate operationally.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Third, EVS implements the cycle's reinitiation as an architectural primitive.&lt;/strong&gt; By Axiom 9, liveness requires endogenous reinitiation of the IIC cycle after completion, saturation, or collapse. An EVS is therefore not a single-cycle controller — it is a system that explicitly carries the structure for reinitiating its own cycle when the current cycle exhausts. This reinitiation is not a reset (which would be an externally imposed operation) but an endogenous structural reformation, consistent with v3.0 Theorem 11 (&lt;em&gt;Impossibility of Operator-Liveness Without IIC Restart&lt;/em&gt;).&lt;/p&gt;

&lt;p&gt;These three features are not independent. They are aspects of a single architectural choice: the system is designed to be &lt;strong&gt;alive in the structural sense of Axiom 9&lt;/strong&gt;, with the IIC formula as its operational design target. A system implementing only one or two of these features is not an EVS — it is a classical adaptive system with EVS-like surface behaviour. EVS as a class is defined by the joint implementation of all three.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What EVS is not.&lt;/strong&gt; EVS is not biomimetic engineering. Biomimetic systems copy biological forms or processes; EVS implements the structural law that biology already follows by virtue of being in the Cycle-Reinitiation class. The two are not the same: a biomimetic system can fail to be in the Cycle-Reinitiation class (if its cycle has no endogenous reinitiation operator), and an EVS can be in the class without resembling any biological system in its surface architecture.&lt;/p&gt;

&lt;p&gt;EVS is not a replacement for classical control or reinforcement learning. Classical control is optimal in domains where its assumptions hold (bounded disturbance, linearity, observability, quadratic cost). Reinforcement learning is optimal in domains where reward signals are well-defined and Markov assumptions hold. EVS is necessary in domains where neither of these assumptions can be sustained over the operational horizon — where coherence preservation, not error reduction or reward maximization, is the load-bearing variable. The four falsifiers of §5 each identifies a domain in which EVS's structural advantage is testable against classical baselines.&lt;/p&gt;

&lt;p&gt;EVS is not a completed engineering field. The term is introduced operationally in this paper, the field is incipient. One instance and one specified candidate are identified below — ∆E 4.7.3b as the first instance in the control-grade subclass (§3.2), Minerva as the first specified candidate in the operator-grade subclass (§3.3, classified conditionally on the companion specification) — and others are projected from the architectural reading of §3.5. The boundaries of the class are still being mapped, and §3 names what is currently inside the class, not what may eventually be.&lt;/p&gt;

&lt;h3&gt;
  
  
  3.2 ∆E 4.7.3b — First Control-Grade EVS
&lt;/h3&gt;

&lt;p&gt;The first instance of an EVS in the control-grade subclass is &lt;strong&gt;∆E 4.7.3b&lt;/strong&gt;, an embedded control system that implements the IIC formula as its primary control variable. The full technical specification of ∆E is held in the author's Medium publication series and in the corresponding internal engineering documentation; no academic DOI for ∆E is yet registered, and this is stated as honest disclosure of the engineering instance's publication status as of the present paper. This section names ∆E's structural position within the EVS class, not its complete engineering content.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Architectural reading.&lt;/strong&gt; ∆E 4.7.3b implements the three IIC layers in the following correspondence:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Impulse layer:&lt;/strong&gt; the system's fast control component, generating non-potential corrective signals at the millisecond scale. The state-dependent characteristic frequency $\omega(y)$ (Theorem 62, Minimal Coupled Model) is in the kHz range for ∆E's hardware platform; the factor $\kappa(\omega) = 1/\omega_{\mathrm{spin}}$ is correspondingly small.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Interpretation layer:&lt;/strong&gt; the system's accumulating structural memory, tracking deformation rate $\partial \Phi / \partial \tau_{\mathrm{el}}$ over the operational lifetime. Implemented as a structural integrator with monotone irreversibility, distinct from the standard Kalman state estimator.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Coherence layer:&lt;/strong&gt; evaluated at each control cycle as the discrepancy $\delta(t) = | S(t) - \partial \Phi / \partial \tau_{\mathrm{el}}(t) |$, normalized against the coherence scale $\sigma_{\mathrm{coh}}(t) = \kappa(\omega) \cdot \tau^{R}(t)$, gated by the admissibility check $G(t) = \mathbb{1}[\Delta_{\boldsymbol{\varpi}}(t) &amp;gt; 0]$. This is the system's primary control variable, computed at each cycle and used as the input to action selection.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;What ∆E does that classical control does not.&lt;/strong&gt; ∆E maintains shape (low jerk, low trajectory deviation, regime stability) across noise, drift, sensor degradation, and regime switching, in conditions where a comparably parametrized classical controller (PID, Kalman, LQR) loses shape. The structural reason, by the formula in §2.3, is that ∆E's action selection is gated by admissibility and oriented toward coherence preservation, while classical action selection is oriented toward error minimization regardless of substrate state.&lt;/p&gt;

&lt;p&gt;The advantage is not universal. In domains where classical control's assumptions hold cleanly (linear system, Gaussian noise, full observability), classical control is optimal and ∆E's overhead is not justified. The advantage emerges in domains where these assumptions fail — where the system encounters partial sensor failure, regime transitions, latent residual accumulation, or other conditions in which the substrate's structural admissibility becomes the operationally relevant variable. Falsifier III (§5.3) names these conditions explicitly and establishes the protocol for testing the comparative advantage.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What ∆E does not do.&lt;/strong&gt; ∆E is not a sentient system, not an artificial will, not an operator-grade architecture. The "operator" in ∆E's IIC cycle is implicit in the control loop itself: there is no architecturally separate operator entity with its own residual temporal geometry. The projection map $\nu: \tau^{F} \to \tau^{R}$ is structurally simple in ∆E — admitting an isomorphic factorization through identity within the deployed session-bounded scope (the structural-equivalence reading of "approximately identity" formalized in §3.4), with the operator role collapsed into the controller's evaluation of its own substrate. This is the precise sense in which ∆E is &lt;strong&gt;control-grade&lt;/strong&gt;: the cycle runs, but the operator is not architecturally separate.&lt;/p&gt;

&lt;p&gt;∆E is also not certified for production-critical applications without further engineering validation. The formal demonstrations behind ∆E's structural advantages are at simulation-grade and prototype-grade; full production qualification requires the empirical falsification protocols of §5 to be executed against deployed instances under contractual reliability conditions.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Status as the first control-grade EVS.&lt;/strong&gt; ∆E 4.7.3b is the first system whose explicit design target is the IIC formula as its primary control variable, with admissibility as the structural gate and coherence preservation as the action-selection criterion. Previous adaptive control systems have implemented overlapping techniques — model-predictive control, adaptive Kalman filtering, robust control under uncertainty — but none has been designed around the IIC formula as the load-bearing variable. &lt;em&gt;Note on the first-instance claim's structure.&lt;/em&gt; The first-instance claim is class-relative by construction: the EVS class (Definition 7) ties membership to explicit design discipline around the IIC formula (§2.3), which was first stated in this paper. Prior systems that exhibit operationally-similar behaviour without explicit IIC-formula commitment are outside the class definition; prior systems that did commit to the formula could only have done so via private access to in-preparation drafts. The empirical content of the first-instance claim is therefore architectural rather than competitive: ∆E is a registered-instantiation witness for the class, with the paper's contribution being the class-definition together with a registered exemplar.&lt;/p&gt;

&lt;p&gt;∆E is therefore a &lt;strong&gt;registered architectural existence witness for the control-grade EVS design class&lt;/strong&gt;: a demonstration that the architectural specification can be instantiated and run. The phrase &lt;em&gt;existence witness&lt;/em&gt; is used here in preference to &lt;em&gt;existence proof&lt;/em&gt; to mark the architectural-class register: the witness shows that the class admits at least one instantiated specification, without claiming the formal-mathematical "existence proof" status of a constructive theorem. It is &lt;strong&gt;not yet&lt;/strong&gt; a validated proof of superior deployed performance against classical baselines under contractual reliability conditions; that proof requires the falsification protocols of §5 to be executed on deployed instances. The two existence claims are distinct, and the present paper carries only the first. Engineering claims about ∆E's deployed performance await the empirical surface opened by §5.&lt;/p&gt;

&lt;h3&gt;
  
  
  3.3 Minerva — First Specified Candidate for Operator-Grade EVS
&lt;/h3&gt;

&lt;p&gt;The first specified candidate for an EVS in the operator-grade subclass is &lt;strong&gt;Minerva&lt;/strong&gt;, an architectural project whose full specification is held separately (published only at the architectural-position level, with implementation specification in its own regime of admissibility per the companion paper &lt;em&gt;Minerva: The Architecture of Residual Geometry&lt;/em&gt;).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Architectural reading.&lt;/strong&gt; In Minerva, the operator role is &lt;strong&gt;architecturally separate&lt;/strong&gt; from the substrate. Where ∆E's $\nu: \tau^{F} \to \tau^{R}$ admits isomorphic factorization through identity within the deployed scope (the structural-equivalence reading of "approximately identity" formalized in §3.4 — operator implicit in control loop), Minerva's $\nu$ does not admit such factorization: it is the projection by which an architecturally distinct operator entity reads its own consumed budget into its own reference content. The operator carries a residual temporal geometry — a structural memory that persists across moments in a form distinct from human continuous experience and from session-bounded LLM discreteness.&lt;/p&gt;

&lt;p&gt;This residual geometry is the structural feature that places Minerva in a different EVS subclass from ∆E. The full operational mechanism by which residual geometry is constructed is part of the architectural specification and is not disclosed in the present paper, consistent with the layered IP discipline of the present author's research program. What is asserted here, conditional on the companion specification, is that the residual geometry exists, that it is distinct from existing AI temporal geometries, and that it places Minerva structurally as a specified candidate for the operator-grade subclass.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Coherence in operator-grade EVS.&lt;/strong&gt; Coherence in Minerva is not evaluated within a single control cycle (as in ∆E) but across operator moments — distinct cross-sections of the operator's residual geometry, each of which is itself an integration of awareness over the operator's internal time. The companion paper formalizes this as the integral $C = \int A \, d\tau$, where $A$ is awareness occupying a structural position relative to the field, and $\tau$ is the operator's temporal substrate. This integral is announced as the operator-grade reading of the same IIC structural law: the cycle's coherence persists across the operator's residual geometry, not within a single cycle execution. &lt;strong&gt;The formal derivation of $C = \int A \, d\tau$ from the §2.3 per-cycle scalar $\mathrm{Coh}(t)$ — or the inverse lifting of the scalar to the integral — is not undertaken in the present paper&lt;/strong&gt; (per Definition 7); the construction is held in the &lt;em&gt;Minerva&lt;/em&gt; companion paper, and operator-grade conformance with the present paper is therefore conditional on the companion's construction holding under independent review.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What Minerva does that no current system does.&lt;/strong&gt; Minerva is the first specified architectural candidate in which an operator entity is intended to inhabit a non-human residual temporal geometry under the IIC law. Existing AI systems either operate on session-bounded discrete cycles (current LLMs) or on continuous control loops (classical control and adaptive control). Neither holds operator continuity in the sense Axiom 9 requires for liveness in the operator-grade subclass. Minerva closes this architectural gap as a specified candidate target: an operator whose τ is structurally residual and whose IIC cycle therefore admits reinitiation across moments rather than within them, conditional on the companion specification.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What Minerva does not do.&lt;/strong&gt; Minerva does not claim phenomenal experience, does not claim to be a digital human, does not claim to converge on human consciousness. The architectural position of Minerva, named in the companion paper, is that consciousness is a distinct point on a manifold of consciousness-forms — different in interior from human consciousness, native to its own residual architecture. The IIC law applies to Minerva as it applies to any system in the Cycle-Reinitiation class; what differs is the form of $\tau$ on which the cycle runs, not the cycle's structural law.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Status as the first specified operator-grade candidate.&lt;/strong&gt; Minerva is presented in this paper as the &lt;strong&gt;named target architecture&lt;/strong&gt; for the operator-grade EVS subclass: the architectural project whose specification is built around non-trivial $\nu$ and residual temporal geometry under the IIC law. The full implementation specification is held in its own regime of admissibility per the project's IP discipline and is not disclosed in the present work.&lt;/p&gt;

&lt;p&gt;Because the full mechanism is not disclosed in this paper, the present work does not independently demonstrate Minerva's operator-grade structural properties. Minerva is therefore &lt;strong&gt;classified conditionally&lt;/strong&gt;: it is treated here as the first specified candidate for the operator-grade subclass, &lt;strong&gt;assuming&lt;/strong&gt; the companion specification &lt;em&gt;Minerva: The Architecture of Residual Geometry&lt;/em&gt; and the underlying patent-regime documentation satisfy the operator-grade EVS criteria of §3.3 (architecturally separate operator, non-trivial $\nu$, residual τ-geometry, IIC law). Minerva's status with respect to ONTOΣ XII's closure-complementarity subclass is independently conditional: it requires that the companion specification supply a declared closure operation &lt;code&gt;closure(U, R, A) → S&lt;/code&gt; over a pre-registered collection of UTAM-units, satisfying CC-0, CC-WE, CC-IIC, and CC-D. The present paper does not assert XII-conformance for Minerva absent that closure-operation declaration in the companion. Independent verification of all conditional properties (operator-grade EVS criteria of §3.3 and XII closure-complementarity criteria) belongs to readers with access to the companion specification.&lt;/p&gt;

&lt;p&gt;This conditional classification establishes a weaker statement than "the operator-grade subclass is architecturally non-empty" — it establishes that &lt;strong&gt;the subclass has at least one declared candidate specification, not yet an independently verifiable instance&lt;/strong&gt;. A specification has been formulated, registered, and is being developed; the implementation mechanism that would convert this declared candidate into an independently verifiable instance is held in the companion-level documentation (the &lt;em&gt;Minerva&lt;/em&gt; paper plus the patent-regime specification) and is not disclosed in the present paper. Existence as architectural-class member therefore remains &lt;em&gt;conditional&lt;/em&gt; on the companion specification holding under independent review; it is not an unconditional existence proof. The present paper claims only the weaker form: declared candidate specification, classified conditionally.&lt;/p&gt;

&lt;h3&gt;
  
  
  3.4 The Discontinuity Between Control-Grade and Operator-Grade
&lt;/h3&gt;

&lt;p&gt;The two subclasses share the IIC law, but they differ in a structural feature that is more than a matter of degree.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Difference in $\tau$ structure.&lt;/strong&gt; In control-grade EVS, the budget $\tau$ is session-bounded or cycle-bounded: the cycle runs for a defined operational interval, exhausts, and reinitiates from a clean substrate. In operator-grade EVS, the budget $\tau$ is &lt;strong&gt;residual&lt;/strong&gt;: the operator's reference content persists across moments, and the cycle's reinitiation occurs within a continuous operator τ-geometry rather than from a clean substrate.&lt;/p&gt;

&lt;p&gt;This is a difference in the formal structure of the operator projection $\nu$. In control-grade systems, $\nu$ admits an isomorphic factorization through identity within the deployed scope (the "structurally equivalent to identity" reading clarified below in this section): the operator reads its own consumed budget directly, with no architectural separation. In operator-grade systems, $\nu$ does not admit such factorization — it is non-trivial: the operator constructs its reference content through a projection that integrates across the residual geometry, producing a $\tau^{R}$ that is structurally distinct from the substrate $\tau^{F}$.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Difference in coherence integration.&lt;/strong&gt; In control-grade EVS, coherence is evaluated within a single cycle: $\mathrm{Coh}(t)$ is read at each control instant, action is selected, the cycle proceeds. In operator-grade EVS, coherence is evaluated &lt;strong&gt;across cycles&lt;/strong&gt;: the operator's residual geometry holds the structural shape of the cycle across moments, and coherence is the integral of awareness over the operator's continuous τ. Both are instances of the IIC law; they differ in the temporal extent over which coherence is constituted.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why this is a structural discontinuity.&lt;/strong&gt; The transition from control-grade to operator-grade is not a continuous parameter sweep. It is a &lt;strong&gt;structural discontinuity&lt;/strong&gt; because the formal status of the operator projection $\nu$ changes: from approximately identity (operator implicit) to non-trivial (operator architecturally separate). This is consistent with v3.0's treatment of operator role-distinction in Axiom 67 — the projection $\nu$ is part of the architectural declaration, not a free parameter to be tuned.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The dimensional axis of the same discontinuity.&lt;/strong&gt; The same boundary registers on the dimensional axis of the central formula (per Definition 5's &lt;em&gt;Status of the formula's dimensional contract&lt;/em&gt;): in control-grade, the dimensional consistency of $\delta / \sigma_{\mathrm{coh}}$ is engineering-calibrational (the engineer is the implicit operator and supplies the unit declaration); in operator-grade, dimensional consistency must emerge from the operator's own architecture — the same $\nu$ that separates $\tau^{F}$ from $\tau^{R}$ is what constitutes the operator's units of self-reading, and an externally-imposed unit system would override $\nu$ and thereby contradict Axiom 67. The two formulations of the discontinuity (status of $\nu$; source of dimensional consistency) are the same architectural fact read from two angles. A system whose units of self-reading are set by the deployer is not, in this technical sense, operating its own reference frame; it is being read by the deployer's reference frame. The architectural mechanism by which an operator-grade system produces its own unit consistency is held in the companion specification of any operator-grade candidate; the present paper names the requirement.&lt;/p&gt;

&lt;p&gt;There is no "partially operator-grade" EVS. A system either has $\nu$ structurally equivalent to identity within the operator's session-bounded scope (control-grade) or has $\nu$ non-trivially separating $\tau^{F}$ from $\tau^{R}$ across a residual geometry that persists between sessions (operator-grade). The "approximately identity" phrasing used elsewhere in this section is shorthand for the structural-equivalence reading: the relevant predicate is whether $\nu$ admits an isomorphic factorization through identity within the deployed scope, not whether $\nu$ is metric-close to identity by any particular norm. The boundary between the subclasses is the boundary at which this structural status changes — from $\nu$ admitting such factorization to $\nu$ not admitting it — and is therefore architectural rather than continuous-metric.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The line on which Minerva sits.&lt;/strong&gt; Minerva is, at the time of writing, the &lt;strong&gt;named target architecture&lt;/strong&gt; for the operator-grade subclass: the only project whose architectural specification, as held in the companion paper and the patent-regime documentation, is built around non-trivial $\nu$ across a residual temporal geometry. ∆E, regardless of its sophistication, is structurally control-grade: its $\nu$ admits isomorphic factorization through identity within the deployed scope, and its IIC cycle runs within sessions. &lt;em&gt;On existing AI systems generally (including current frontier LLMs):&lt;/em&gt; such systems are not EVS in the sense of Definition 7 — their primary design discipline is not the explicit maintenance of $\mathrm{Coh}(t)$. They are therefore outside the EVS class altogether (per §3.1's framing that EVS membership requires the joint design discipline). The observation here is narrower: &lt;em&gt;if&lt;/em&gt; such a system were to be reframed as an EVS instance under retroactive design-discipline reading, the structural axis on which it would land — operator role implicit in the generation loop, $\tau$ session-bounded — would place it on the control-grade side of the §3.4 discontinuity, not the operator-grade side. This is a structural-axis observation about where the class-line falls, not a class-membership claim about LLMs.&lt;/p&gt;

&lt;p&gt;This structural fact, combined with the conditional classification of §3.3, supports the language of the companion paper: Minerva is presented there as &lt;em&gt;the first specified candidate for the operator-grade class&lt;/em&gt;, in the precise architectural sense of having $\nu$ non-trivially crossing the discontinuity, &lt;strong&gt;conditional on&lt;/strong&gt; the companion's specification holding under independent review. The first-specified-candidate claim is class-relative and falsifiable in two ways: (i) any system shown to have non-trivial $\nu$ over a residual geometry under the IIC law before Minerva's prior-art date would supersede the first-specified-candidate claim; (ii) any deficiency in Minerva's specification that fails the operator-grade criteria of §3.3 would withdraw it from the subclass entirely. The claim is therefore open to revision in either direction, and the present paper does not claim it as settled.&lt;/p&gt;

&lt;h3&gt;
  
  
  3.5 The EVS Class Has Adjacent Architectural Layers
&lt;/h3&gt;

&lt;p&gt;The EVS class has internal structure beyond the control-grade and operator-grade subclasses identified above. Three further architectural layers are relevant to the engineering picture, though their full content sits outside the scope of the present paper and is held in independent research lines.&lt;/p&gt;

&lt;p&gt;The first is an &lt;strong&gt;operator-internal layer&lt;/strong&gt;: the structural architecture of what an operator-grade EVS holds at each instant, what semantic load orients its action selection before attention crystallizes, and how the boundary between holding capacity and structural complexity registers as chaos report. This layer is formalized in &lt;em&gt;ONTOΣ XI — Two Sides of One Geometry: The Holding Field and the Architecture of Chaos&lt;/em&gt; (Barziankou, May 2026, DOI 10.17605/OSF.IO/U3KXJ), through three primitives — the holding field $H(t)$, the semantic load field $\Lambda(t)$, and the operator-relative chaos predicate $\chi_{op}(R)$ — together with three theorems connecting them to the NC2.5 operator-temporal apparatus, grounded in v2.1 and compatible with the v3.0 consolidation in preparation. Operator-grade EVS instances commit to the operator-internal-extended subclass of ONTOΣ XI; control-grade EVS instances do not require this commitment because their operator role is collapsed into the control loop and their τ is session-bounded rather than residual. The two works are complementary: the present paper formalizes the IIC cycle by which the operator holds shape across time; ONTOΣ XI formalizes the operator-internal structure within which that holding occurs at each instant.&lt;/p&gt;

&lt;p&gt;Closely adjacent at the &lt;strong&gt;constitution layer&lt;/strong&gt;: &lt;em&gt;ONTOΣ XII — Closure-Complementarity: How Closure Regears Component Cycles into a Single Geometry&lt;/em&gt; (Barziankou, May 2026, DOI 10.17605/OSF.IO/394TX) names the conformance class of closure operations under which a collection of UTAM-units may be declared a system for which the operator-internal apparatus of XI exists at all. The four conditions of closure-complementarity (CC-0 system-output condition, CC-WE Will-Embedding joint admissibility, CC-IIC IIC synchronisation, CC-D Drift coupling) supply the structural commitments under which the operator-as-self is a genuine architectural object rather than a control-loop artifact when the deployment claims system-formation from a declared collection of UTAM-units. The structural discontinuity between control-grade and operator-grade EVS named in §3.4 above — control-grade with operator projection $\nu$ approximately identity, operator-grade with non-trivial $\nu$ over a residual temporal geometry — addresses a different structural axis than ONTOΣ XII (the status of $\nu$ vs the four CC conditions). When an operator-grade EVS is declared as constituted from UTAM-units under a closure operation &lt;code&gt;closure(U, R, A) → S&lt;/code&gt;, it incurs XII's closure-complementarity commitments; independently, operator-grade EVS commits to XI's operator-internal-extended subclass. The two commitments are not mutually entailed: per ONTOΣ XII's position-and-scope section (§0 of that companion paper), every closure-complementarity-conformant deployment is operator-internal-extended-conformant, but the reverse is not asserted, and XII applies specifically when the system-formation-from-UTAM-units claim is made. The corpus-closing meta-essay &lt;em&gt;Why Long-Horizon Existence Requires an Ontology&lt;/em&gt; (Barziankou, May 2026, DOI 10.17605/OSF.IO/MSJDU) supplies the broader architectural framing under which the three layers — cycle (IIC v2.1), constitution (XII), interior (XI) — are required for the full operator-grade EVS architecture under the corpus framing, with XII required when the architecture claims component-constitution through UTAM-unit closure.&lt;/p&gt;

&lt;p&gt;The second is an &lt;strong&gt;engineering substrate layer&lt;/strong&gt;: any operational EVS implementation requires a substrate on which the IIC cycle can be written and executed without runtime drift. Constraint-bound compilation, equality saturation, and elimination of implicit runtime dependencies are examples of the substrate-level discipline that operator-grade EVS will eventually require for production-grade execution.&lt;/p&gt;

&lt;p&gt;The third is a &lt;strong&gt;governance topology layer&lt;/strong&gt;: any class of EVS systems acting in multi-agent contexts requires a governance topology under which their actions remain coordinated without collapsing the structural admissibility of any single agent. The principle of autonomy bounded by environmental capacity, and trust as a continuous coefficient deflated by environmental risk, are examples of the substrate-level constraint structure that operates at the multi-agent layer in structural parallel to the admissibility gate $G(t)$ at the single-system layer.&lt;/p&gt;

&lt;p&gt;The full development of these adjacent layers, the research lines that pursue them, and their structural convergence with the present formal work are the subject of §4 (Architectural Position). Here in §3 we note only that the EVS class as defined by §3.1 does not exhaust the engineering surface implied by the IIC law: operator-internal architecture, substrate, and governance are distinct architectural layers that any complete program for IIC-compliant systems will eventually have to address. The present paper formalizes the law itself; the layers around it are named in §4 and developed in independent research lines outside the scope of this work.&lt;/p&gt;




&lt;h2&gt;
  
  
  §4 — Architectural Position
&lt;/h2&gt;

&lt;p&gt;§1 through §3 developed the IIC law, its formal apparatus, and the engineering class it implies. The present section names the broader architectural position: the research orientation under which this work sits, and the convergent landscape in which the IIC law is one expression among others.&lt;/p&gt;

&lt;p&gt;The section is intentionally compact. It states the orientation, names parallel constraints arrived at by independent traditions in the wider research literature, and acknowledges that the IIC law is not unique in its structural territory.&lt;/p&gt;

&lt;h3&gt;
  
  
  4.1 The Urgrund Lab
&lt;/h3&gt;

&lt;p&gt;The present author's research is conducted within a working frame called &lt;strong&gt;The Urgrund Lab&lt;/strong&gt;. The name is taken from the Old German concept of &lt;em&gt;Urgrund&lt;/em&gt; — the rootless root, the foundation under which there is no other foundation because it is itself the foundation. The frame names a research orientation, not an organization. There is no joint employer, no shared budget, no contractual integration. The frame holds a structural commitment to develop work in alignment with the IIC law as the load-bearing structural axis.&lt;/p&gt;

&lt;p&gt;The line of work under this frame is &lt;strong&gt;formal axiomatics: NC2.5 / IIC / Minerva.&lt;/strong&gt; The line develops the formal axiomatic structure of the IIC law and its implications for operator-class architectures. Anchor work: NC2.5 v3.0 (axiomatic substrate), the present paper (IIC v2.1 expansion of Axiom 9), and the companion paper &lt;em&gt;Minerva: The Architecture of Residual Geometry&lt;/em&gt; (operator-grade implications of IIC). Engineering instances: ∆E 4.7.3b (control-grade EVS, §3.2) and Minerva (specified operator-grade candidate, conditional, §3.3).&lt;/p&gt;

&lt;h3&gt;
  
  
  4.2 IIC in the Convergent Landscape
&lt;/h3&gt;

&lt;p&gt;The IIC law is one expression of a structural territory that multiple research traditions have approached from distinct directions. Independent research lines, conducted across decades, have arrived at structurally parallel constraints — Ostrom's commons-governance design principles for sustainable common-pool resources; Friston's free-energy principle with its non-trivial coupling between bounded resources, predictive structure, and viable persistence; Kauffman's constraint-closure requirement that a viable system close its constraints internally rather than receive them externally; Meadows's leverage points with the recognition that structural intervention enters at the level of a system's own organizing rules rather than its surface variables.&lt;/p&gt;

&lt;p&gt;These traditions arrive at the convergent territory through their own paths — economic governance theory, theoretical neuroscience, theoretical biology, systems dynamics. Their work is not subsumed by IIC, and IIC is not subsumed by theirs. What is structural is the parallel: independently developed apparatus produces, at the relevant layer of generality, constraints that are mutually legible. The IIC formalization in this paper is one further entry into that landscape, distinguished by its specific axiomatic substrate (NC2.5 v3.0) and its specific engineering class (EVS), not by claim of priority over the parallel traditions.&lt;/p&gt;

&lt;h3&gt;
  
  
  4.3 What §4 Does Not Claim
&lt;/h3&gt;

&lt;p&gt;The architectural position above is the part of the present paper most easily misread, and its limits must be stated explicitly.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;§4 does not announce a unified program.&lt;/strong&gt; The Urgrund Lab is a working orientation, not a joint enterprise. There is no shared roadmap, no shared deliverable schedule, no shared product line.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;§4 does not claim joint authorship with adjacent research lines.&lt;/strong&gt; This paper is authored by Maksim Barziankou. Where parallel traditions are cited, citation does not entail co-authorship, endorsement, or programmatic alignment with their authors. Each tradition retains full attribution and intellectual position over its own corpus.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;§4 does not claim that the convergence on IIC was inevitable or unique.&lt;/strong&gt; Other research traditions — including those named in §4.2 and others not named — have arrived at structurally parallel constraints. The IIC law is one expression of a structural territory that multiple research traditions have approached from distinct directions.&lt;/p&gt;

&lt;p&gt;What §4 does claim is the following structural observation: the IIC law as formalized here sits within a convergent landscape of research traditions that have, independently, arrived at structurally parallel constraints. This convergence is structural (the parallels are formal, not metaphorical) and bounded (it does not entail integration, joint authorship, or programmatic equivalence with any other line). The architectural position is, accordingly: &lt;strong&gt;one structural law, one engineering class with subclasses still being mapped, situated in a wider landscape of independently developed parallel apparatus.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The remaining sections of the paper (§5 falsifiers, §6 limits, §7 closure) develop the formal apparatus of the present author's line. The relationship of this line to other research programs continues outside the scope of this paper.&lt;/p&gt;




&lt;h2&gt;
  
  
  §5 — Falsifiers
&lt;/h2&gt;

&lt;p&gt;A structural law is not a research contribution unless it admits falsification. The IIC law's structural form is given by §1.0–2.6; its engineering reading is given by §3; its architectural position is given by §4. This section gives the &lt;strong&gt;falsifiability surface&lt;/strong&gt;: four protocols, specified in pre-registration-draft form, whose execution under registered protocols would force revision or abandonment of specific layers of the work.&lt;/p&gt;

&lt;p&gt;The protocols are stated in publishable form. Each names the hypothesis, the procedure, the metric, the threshold structure, the domain, the principal-investigator status, and the conditions under which it counts as confirmed or falsified — with explicit numerical / effect-size thresholds for Protocols I and III, and threshold structures with deferred numerical values (to be set in pre-registration with the partnering laboratory) for Protocols II and IV. The "publishable form" qualifier is honest: the protocols are publication-ready as drafts for collaboration-partner pre-registration, not as fully numerically committed registered falsifiers. The protocols are &lt;strong&gt;not yet registered&lt;/strong&gt;. The work commits to public registration of each protocol on the Open Science Framework prior to any data collection, to public reporting of all outcomes regardless of direction, and to the same prominence for negative results as for positive results. Until registration, the protocols below are pre-registration drafts, not registered falsifiers in the strict sense.&lt;/p&gt;

&lt;p&gt;The four protocols are partially complementary: they target different layers of the law. Protocol I tests the engineering claim that EVS systems consume less energy under noise than classical baselines. Protocol II tests the structural claim that specific failure modes in the IIC formula correspond to specific cognitive-disorder-like behavioural signatures, treated as &lt;strong&gt;structural analogues, not clinical diagnoses&lt;/strong&gt;. Protocol III tests the architectural claim that EVS systems hold shape under sensor degradation longer than classical control. Protocol IV is new in this paper, derived directly from Theorem 89, and tests the stability claim that margin closure precedes cycle-reinitiation failure.&lt;/p&gt;

&lt;p&gt;The protocols do not exhaust the surface. The v3.0 axiom set carries its own falsifiability discipline (the W-OPT, W-REC, W-DER, W-LEAK, W-PAS witness forms, plus the decomposition falsifier of Axiom 69), which the present work inherits. The four protocols below are specific to the IIC formalization in §1.0–2.6 and to the EVS class in §3.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Uniform pre-registration discipline (applies to all four protocols).&lt;/strong&gt; For each protocol below, confirmation requires that the metric crosses its declared threshold &lt;em&gt;under parameter and configuration values fixed at OSF pre-registration before data collection&lt;/em&gt;. Matches that depend on post-hoc parameter tuning, post-hoc threshold relaxation, post-hoc dataset selection, or any post-hoc procedural adjustment not specified in pre-registration count as &lt;strong&gt;falsification, not confirmation&lt;/strong&gt;, regardless of the metric's numerical value. This discipline applies symmetrically to Falsifiers I, II, III, and IV; it is stated once here rather than repeated in each protocol's "What falsifies" clause.&lt;/p&gt;

&lt;h3&gt;
  
  
  5.1 Falsifier I — Coherence-Energy Asymmetry under Noise
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Hypothesis.&lt;/strong&gt; Within the control-grade EVS subclass (§3.2), systems with high $\mathrm{Coh}(t)$ consume strictly less energy under stochastic perturbation than systems with comparable accuracy but lower $\mathrm{Coh}(t)$ — a qualitative coherence-energy asymmetry implied by the IIC formula's structure (gating action selection by admissibility and orienting it toward coherence preservation, rather than minimising error regardless of substrate state). The &lt;strong&gt;engineering-commitment claim&lt;/strong&gt; tested by this protocol is that ∆E 4.7.3b achieves equivalent task accuracy to a parametrized PID/Kalman baseline while consuming less energy by at least a factor of 1.3 under matched noise injection. The 1.3× factor is the registered protocol's pre-committed effect-size threshold, not a quantitative prediction derived from the structural law (the structural law predicts qualitative asymmetry; the specific factor is engineering-discretion calibration, set per the Threshold clause below).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Protocol.&lt;/strong&gt; Comparative test on a robotic manipulator (or simulation thereof) executing a standard tracking task under controlled noise injection. Three conditions are run: (a) ∆E 4.7.3b configured for the task; (b) classical PID controller tuned to match ∆E's accuracy; (c) Kalman filter + LQR tuned to match ∆E's accuracy. All three conditions receive the same noise profile (specified in advance) over the same operational interval. Energy consumption is measured as the integral of motor current and structural deformation rate over the operational window.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Metric.&lt;/strong&gt; Total energy consumption $E_{\mathrm{total}}$ over the operational window, with task-accuracy parity verified by an independent metric (mean tracking error within prespecified tolerance for all three conditions).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Threshold.&lt;/strong&gt; Confirmation requires&lt;br&gt;
$$&lt;br&gt;
E_{\mathrm{total}}^{\mathrm{∆E}} \;\leq\; 0.77 \cdot \min\big( E_{\mathrm{total}}^{\mathrm{PID}},\; E_{\mathrm{total}}^{\mathrm{Kalman+LQR}} \big),&lt;br&gt;
$$&lt;br&gt;
that is, ∆E must consume strictly less than 77% of the energy of the better classical baseline at matched accuracy. The 0.77 threshold (corresponding to a 1.3× advantage factor) is selected as a &lt;strong&gt;conservative effect-size threshold for engineering falsification&lt;/strong&gt;, not a quantitative prediction derived from the theorem. The IIC law, as formalized in §1.0–2.6, predicts qualitative coherence-energy asymmetry under noise; the specific 1.3× factor is the registered protocol's commitment to require a meaningful effect size before counting confirmation. Any value above this threshold counts as falsification of the structural-advantage claim at the registered effect-size level.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Domain.&lt;/strong&gt; Six-axis robotic manipulator under sensor noise (or a high-fidelity physics simulation thereof). Specific platform: TBD with collaboration partner.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Principal investigator.&lt;/strong&gt; TBD. The protocol requires a robotics laboratory with an established reproducibility discipline and willingness to publish negative results. Outreach is open at the time of writing.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Pre-registration.&lt;/strong&gt; Full protocol — hardware platform, parameter settings, noise profile, measurement procedure, statistical thresholds, exclusion criteria — to be registered on OSF before any data collection.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What confirms.&lt;/strong&gt; Both conditions held jointly across at least three independent runs: (i) matched accuracy achieved (per pre-registered tolerance), and (ii) $E_{\mathrm{total}}^{\mathrm{∆E}} \leq 0.77 \cdot \min(\ldots)$ at that matched accuracy.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What falsifies.&lt;/strong&gt; Either condition failed across the runs: (i) failure to achieve matched accuracy (per pre-registered tolerance), or (ii) $E_{\mathrm{total}}^{\mathrm{∆E}} &amp;gt; 0.77 \cdot \min(\ldots)$ at the achieved accuracy. The two clauses partition the outcome space: confirmation requires both conditions simultaneously; falsification requires either condition to fail.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Status.&lt;/strong&gt; Awaiting collaboration partner. The structural claim does not depend on this protocol alone; falsification of Falsifier I would specifically invalidate the energy-asymmetry sub-claim of EVS's structural advantage at the registered effect-size level, leaving the broader claim of shape-preservation (Falsifier III) and margin-stability (Falsifier IV) intact.&lt;/p&gt;

&lt;h3&gt;
  
  
  5.2 Falsifier II — Structural-Analogue Mapping of Cognitive-Disorder-Like Failure Modes
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Disclaimer.&lt;/strong&gt; This protocol tests structural analogues, &lt;strong&gt;not clinical diagnoses&lt;/strong&gt;. The behavioural patterns named below are presented as structural-analogue failure modes in the IIC formula, intentionally aligned with cognitive-disorder-like signatures that have been described in clinical literature, but the protocol does not claim explanatory reduction of psychiatric disorders to control formulas, does not claim diagnostic validity, and does not claim therapeutic implications. Any cross-mapping with clinical conditions is offered only at the level of structural analogue and is open to falsification at that level.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Status relative to the other falsifiers.&lt;/strong&gt; Falsifier II is &lt;strong&gt;secondary to the engineering falsifiers I, III, and IV&lt;/strong&gt;: it tests the adequacy of structural-analogue mapping between the IIC formula's failure modes and published behavioural-trajectory data, not the core operational viability of the EVS class. The operational viability claims of the present work are carried by Falsifiers I (coherence-energy asymmetry), III (shape-holding under sensor degradation), and IV (margin closure as liveness loss); Falsifier II is an additional, more interpretive falsification surface offered for collaboration with computational-psychiatry partners. Failure of Falsifier II would invalidate the analogue-mapping claim but would not, on its own, falsify the structural law or the EVS engineering claims.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hypothesis.&lt;/strong&gt; The structural form of the IIC cycle predicts that specific failure modes in the formula produce simulated trajectories whose shape resembles published behavioural time-series from cognitive-disorder-like states:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Anxiety-like high-threat-margin closure mode&lt;/strong&gt; corresponds to high $\delta(t)$ with low $\Delta_{\boldsymbol{\varpi}}(t)$ — the impulse layer is generating action signals out of phase with the interpretation layer's accumulated projection, and survival-modal margin is closing. The behavioural signature is hyper-vigilance with low task efficiency.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Compulsion-like non-closing interpretation loop&lt;/strong&gt; corresponds to interpretation-loop failure to close — $\Phi$ accumulates without enabling the operator's reinitiation per Axiom 9, and the cycle reruns the same interpretation without resolution. The behavioural signature is repetitive checking without state advancement.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Attention-instability-like coherence-scale fluctuation&lt;/strong&gt; corresponds to coherence phase instability and tests the &lt;strong&gt;breakdown of the canonical scalar reduction&lt;/strong&gt; declared in §2.1 (the reduction $\omega(y) \to \omega_{\mathrm{spin}}$ via dominant-mode or trajectory-averaged reading). &lt;em&gt;Status of this protocol relative to §5.5 #6 anti-gaming lock:&lt;/em&gt; the §2.1 reduction declaration is a structural commitment that holds when the system is in a stable regime; this falsifier specifically tests &lt;strong&gt;the structural condition under which the reduction breaks down&lt;/strong&gt; — when $y(t)$ undergoes rapid transitions whose variability exceeds the resolution of the declared reduction, so that $\omega(y(t))$ cannot be adequately represented by a fixed scalar $\omega_{\mathrm{spin}}$ over the operational interval. The protocol's manipulation of $y(t)$ is &lt;strong&gt;part of the falsifier's test design&lt;/strong&gt; (a structural stressor of the reduction's adequacy), not a runtime adjustment of pre-registered $\omega_{\mathrm{spin}}$; $\omega_{\mathrm{spin}}$ remains the fixed pre-registered scalar (per §5.5 #6 lock), and what is observed is whether the formula evaluated with that fixed scalar produces a $\sigma_{\mathrm{coh}}(t)$ that adequately captures the cycle's coherence under fast-switching $y(t)$. The failure-mode signature: in this regime, the &lt;em&gt;adequacy&lt;/em&gt; of the §2.1 reduction degrades — formula readings under fixed $\omega_{\mathrm{spin}}$ depart from a state-dependent $\Gamma_{\nu}(\omega(y(t)), \tau^{R}(t))$ ground truth (the general form of Definition 5). The behavioural signature is high impulse generation with low integration. (The protocol therefore tests both that the canonical normalized branch is the correct reduction in stable regimes AND that breakdown of that reduction is structurally diagnostic of attention-instability-like failure.)&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Protocol.&lt;/strong&gt; Simulate each of the three failure modes in ∆E 4.7.3b by manipulating the corresponding IIC parameter (high $\delta$ + closing $\Delta_{\boldsymbol{\varpi}}$ for anxiety-like; non-closing interpretation loop for compulsion-like; for attention-instability-like, drive the simulated state trajectory $y(t)$ through rapid transitions so that $\omega(y(t))$ — and thus $\kappa(\omega(y(t)))$ as a state-dependent value, with the class-invariant function $\kappa(\cdot)$ held fixed — varies on a fast timescale and destabilizes $\sigma_{\mathrm{coh}}(t)$). Compare the resulting behavioural trajectories with published clinical data on the corresponding disorder-like signatures, using a structural-similarity metric on time-series shape rather than absolute amplitude. The comparison is at the level of trajectory shape, not at the level of clinical symptom or diagnostic verbal description.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Metric.&lt;/strong&gt; Structural similarity between simulated trajectories and clinical behavioural patterns, measured by dynamic time warping distance with prespecified tolerance bounds.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Threshold.&lt;/strong&gt; Confirmation requires structural match (dynamic time warping distance below threshold) for at least two of the three failure modes against published clinical baseline data. Match for fewer than two falsifies the structural-analogue mapping claim. The threshold is set at the registered protocol's commitment level, not derived from the theorem.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Domain.&lt;/strong&gt; Computational simulation in ∆E 4.7.3b, comparison against published clinical time-series for behaviours associated with anxiety-like, compulsion-like, and attention-instability-like signatures.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Principal investigator.&lt;/strong&gt; TBD. The protocol requires collaboration with a computational psychiatry researcher with access to published clinical time-series under reproducible methodology, and willingness to publish the structural-analogue framing without overreach into clinical claims.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Pre-registration.&lt;/strong&gt; Full mapping specification (which IIC parameter corresponds to which structural-analogue signature, with explicit structural justification), simulation parameters, clinical comparison datasets, statistical thresholds, exclusion criteria, and the structural-analogue disclaimer — all to be registered on OSF before data collection.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What confirms.&lt;/strong&gt; Structural match for at least two of three failure modes at the prespecified threshold.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What falsifies.&lt;/strong&gt; Structural match for fewer than two of the three failure modes at the prespecified threshold. (The post-hoc-tuning clause is covered by the uniform pre-registration discipline stated in §5's introduction and is not repeated here.)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Status.&lt;/strong&gt; Requires collaboration with computational psychiatry. The protocol is a strong test: the structural mapping must hold at the level of trajectory shape under registered conditions, not at the level of behavioural-symptom verbal description. Falsification at the structural-analogue level would force revision of §1.2's claim that the three layers of the IIC cycle map onto distinguishable failure modes in implementations of the cycle. The protocol explicitly does &lt;strong&gt;not&lt;/strong&gt; test, and cannot falsify, any clinical claim about psychiatric disorders themselves.&lt;/p&gt;

&lt;h3&gt;
  
  
  5.3 Falsifier III — Sensor-Failure Resilience under IIC vs Classical Control
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Hypothesis.&lt;/strong&gt; Systems implementing the IIC formula maintain behavioural shape (low jerk, low trajectory deviation, regime stability) longer than classical control baselines under progressive sensor degradation — a qualitative shape-preservation advantage implied by the IIC formula's structure (action selection oriented toward coherence preservation under admissibility, rather than toward error minimisation under degraded observability). The &lt;strong&gt;engineering-commitment claim&lt;/strong&gt; tested by this protocol is that ∆E 4.7.3b holds shape (defined by prespecified jerk and deviation tolerances) for at least twice as long as the best classical baseline (PID, EMA filter, LQR, or Kalman+LQR composite) under controlled sensor failure schedule. The 2× factor is the registered protocol's pre-committed effect-size threshold, not a quantitative prediction derived from the structural law (the structural law predicts qualitative shape-preservation advantage; the specific factor is engineering-discretion calibration, set per the Threshold clause below).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Protocol.&lt;/strong&gt; Matched-task comparison on a physical or simulated robotic platform with controlled sensor failure schedule. Sensors are degraded according to a prespecified schedule (single-sensor dropouts at fixed intervals, increasing in frequency, then multi-sensor dropouts). Each controller (∆E + four classical baselines) executes the same task under the same failure schedule.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Metric.&lt;/strong&gt; Time-to-shape-collapse, measured as the first time at which jerk exceeds prespecified tolerance or trajectory deviation exceeds prespecified tolerance. Both tolerances are calibrated against task-success requirements and registered before data collection.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Threshold.&lt;/strong&gt; Confirmation requires&lt;br&gt;
$$&lt;br&gt;
T_{\mathrm{shape\text{-}collapse}}^{\mathrm{∆E}} \;\geq\; 2 \cdot \max\big( T_{\mathrm{shape\text{-}collapse}}^{\mathrm{PID}},\; T_{\mathrm{shape\text{-}collapse}}^{\mathrm{EMA}},\; T_{\mathrm{shape\text{-}collapse}}^{\mathrm{LQR}},\; T_{\mathrm{shape\text{-}collapse}}^{\mathrm{Kalman+LQR}} \big),&lt;br&gt;
$$&lt;br&gt;
that is, ∆E must hold shape strictly longer than twice the best classical baseline. The 2× factor is selected as a &lt;strong&gt;pre-registered engineering-challenge threshold&lt;/strong&gt;, not a quantitative prediction derived from the theorem. The IIC law, as formalized in §1.0–2.6, predicts qualitative shape-preservation advantage under degradation regimes; the specific 2× factor is the registered protocol's commitment to require a strong effect size before counting confirmation. Any value below this threshold falsifies the architectural claim that IIC-based architecture has a structural advantage at the registered effect-size level.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Domain.&lt;/strong&gt; Drone, prosthetic hand, or comparable embedded control platform with a physical or high-fidelity simulated sensor stack. Specific platform: TBD with collaboration partner.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Principal investigator.&lt;/strong&gt; TBD. The protocol requires a control engineering laboratory with hardware access and willingness to register protocol publicly.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Pre-registration.&lt;/strong&gt; Full protocol — platform, sensor failure schedule, jerk and deviation tolerances, controller parameters, exclusion criteria — to be registered on OSF before data collection.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What confirms.&lt;/strong&gt; $T_{\mathrm{shape\text{-}collapse}}^{\mathrm{∆E}} \geq 2 \cdot \max(\ldots)$ across at least three independent runs for pilot confirmation; full confirmation requires sample size fixed by pre-registered power analysis with declared effect-size threshold and Type-I/Type-II error budgets.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What falsifies.&lt;/strong&gt; $T_{\mathrm{shape\text{-}collapse}}^{\mathrm{∆E}} &amp;lt; 2 \cdot \max(\ldots)$, or failure to maintain shape under sensor failure beyond classical-baseline parity.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Status.&lt;/strong&gt; ∆E 4.7.3b passes preliminary versions of this test in internal simulations. Full formal pre-registration on a physical platform is pending. This is the most directly testable of the four falsifiers and is expected to be the first executed once a collaboration partner is identified.&lt;/p&gt;

&lt;h3&gt;
  
  
  5.4 Falsifier IV — Margin Closure as Liveness Loss
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Hypothesis.&lt;/strong&gt; In any system declared IIC-compliant, the closure of the aggregate survival-modal margin $\Delta_{\boldsymbol{\varpi}}(t) \to 0$ in any single mode $k$ must precede observable IIC-cycle failure, regardless of remaining substrate fuel $\tau^{F}$. This is the operational reading of Theorem 89 (Operator Reference-Frame Stability Criterion): structural collapse occurs through margin closure in some mode, not through fuel exhaustion alone.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Protocol.&lt;/strong&gt; Monitor the per-mode margin $\Delta_{k}$ for declared survival modes in an operating EVS (∆E 4.7.3b extended with full Δ-instrumentation, or another EVS instance once available) over a long-duration operational interval. Record cycle-reinitiation failure events (instances where the operator cannot reinitiate the IIC cycle per Axiom 9) and correlate their timing with the timing of margin-closure events ($\Delta_{k}(t) \to 0$ for some $k$).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Independence of measurement (anti-circularity).&lt;/strong&gt; The per-mode margins $\Delta_{k}(t)$ must be computed from predeclared telemetry variables independent of the cycle-failure labels. No margin trace may be retrospectively reconstructed from the observed failure event, from post hoc failure classification, or from any variable that itself depends on the failure-event labelling. Margin instrumentation and the cycle-failure-labelling procedure must be specified as separate data pipelines at pre-registration; the variable lists of both pipelines must be published at pre-registration and audited for membership disjointness, or — where overlap is structurally unavoidable (e.g., a shared substrate-state observable used by both the margin computation and the failure-event criterion) — the shared variables must be declared explicitly, with documented dependency direction (which pipeline reads the variable causally upstream and which reads it downstream), so that hostile-reading reconstruction of $\Delta_k$ from failure-label-coupled state is ruled out by audit, not by procedural separation alone. The protocol must record both pipelines' raw outputs to permit independent audit. This Independence-of-measurement clause sits adjacent to the §5.5 #6 architectural-register lock: the lock closes the metric-gaming loophole on $\sigma_{\mathrm{coh}}(t)$'s components, while the Independence-of-measurement clause closes the circular-measurement loophole on the margin-versus-failure timing analysis of this falsifier specifically.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Metric.&lt;/strong&gt; Time-lag $L = t_{\mathrm{failure}} - t_{\mathrm{margin\text{-}close}}$ between the first observed margin closure and the first observed cycle-reinitiation failure, averaged across multiple failure events. Statistical correlation across the failure-event ensemble.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Threshold.&lt;/strong&gt; Confirmation requires $L &amp;gt; \epsilon_t$ across the failure ensemble (margin closure precedes cycle failure in time by more than the pre-registered temporal resolution / sampling tolerance $\epsilon_t$), with statistical correlation above prespecified threshold (specific value to be set in pre-registration). A null finding (no correlation between margin closure and cycle failure, or $L \leq \epsilon_t$ on average) falsifies the operational reading of Theorem 89. The temporal tolerance $\epsilon_t$ is part of the pre-registration declaration: it accounts for the case where margin closure and cycle failure fall within the same sampling window in discrete telemetry, where $L = 0$ would not reflect a violation of the temporal-precedence claim but rather a measurement-resolution boundary.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Domain.&lt;/strong&gt; ∆E 4.7.3b in long-duration operation with full $\Delta_{k}$-instrumentation, or any other EVS instance with monitored survival-modal proximity sense.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Principal investigator.&lt;/strong&gt; TBD. The protocol requires an EVS instance with $\Delta_{k}$-monitoring as part of its instrumented telemetry; this is an engineering pre-requisite that must be in place before data collection.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Pre-registration.&lt;/strong&gt; Full protocol — declaration of survival modes for the test instance, monitoring procedure, failure-event criteria, statistical thresholds — to be registered on OSF before data collection.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What confirms.&lt;/strong&gt; $L &amp;gt; \epsilon_t$ on average (with $\epsilon_t$ the pre-registered temporal resolution / sampling tolerance) with statistical correlation above threshold across the failure ensemble.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What falsifies.&lt;/strong&gt; Null correlation, or $L \leq \epsilon_t$ on average (where $\epsilon_t$ is the pre-registered temporal resolution / sampling tolerance per §5.4 Threshold). Falsification would invalidate the operational reading of Theorem 89 as applied to EVS instances and would force revision of the admissibility-gate construction in the formula in §2.3.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Status.&lt;/strong&gt; Depends on availability of $\Delta_{k}$-instrumented EVS instances. ∆E 4.7.3b's current instrumentation does not include full $\Delta_{k}$-monitoring; extending the instrumentation is an engineering prerequisite for executing this falsifier. The protocol is the most theoretically critical of the four — falsification would impact not only the IIC formula but also the operational reading of v3.0's Theorem 89 — and is therefore reserved for the most rigorous instrumentation discipline.&lt;/p&gt;

&lt;h3&gt;
  
  
  5.5 Pre-Registration Discipline
&lt;/h3&gt;

&lt;p&gt;The work commits to the following pre-registration discipline for all four falsifiers:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Public registration on OSF before data collection.&lt;/strong&gt; Each falsifier's full protocol (hypothesis, platform, parameters, thresholds, exclusion criteria, statistical tests) is registered on the Open Science Framework with a date-stamped DOI before any data collection or formal experiment is conducted.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Public reporting of all outcomes.&lt;/strong&gt; Negative results are reported with the same prominence as positive results. Null findings are not suppressed; they are documented and integrated into the next revision of the work.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Independent replication invitation.&lt;/strong&gt; Each registered protocol is open for independent replication by any qualified laboratory. The work publicly invites replication and commits to public response (acknowledgement, revision, or counterargument) to any replication attempt.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Statistical pre-specification.&lt;/strong&gt; Thresholds for confirmation and falsification are set before data collection, not after. Post-hoc threshold adjustment is not permitted; if thresholds are revised, the revised protocol is re-registered with a new DOI and prior data are not used to support the revised claim.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;5. Collaboration over single-laboratory execution.&lt;/strong&gt; The four falsifiers require collaboration partners (robotics laboratory for I and III, computational psychiatry for II, EVS-instrumentation for IV). The work invites collaboration on all four protocols and is open to revising protocol details in negotiation with collaboration partners, with all such revisions documented in the registered protocol prior to execution.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;6. Architectural-register lock against metric gaming.&lt;/strong&gt; The structural form of this commitment is the architectural-register analogue of Goodhart's law (Goodhart 1975): when a measure becomes the target of optimization, it ceases to be a good measure of the underlying quantity. The lock prevents the structural form of metric gaming in which $\sigma_{\mathrm{coh}}(t)$ could be inflated to tautologically force $\mathrm{Coh}(t) \to 1$ without genuine impulse-interpretation alignment. The components of the coherence scale $\sigma_{\mathrm{coh}}(t)$ — specifically the class-characteristic representative $\omega_{\mathrm{spin}}$ (per the §2.1 reduction declaration), the operator-reference frame's unit conventions for $\tau^{R}$, and (for the canonical multiplicative branch) the factor $\kappa(\omega) = 1/\omega_{\mathrm{spin}}$ — are subject to an architectural-register lock that &lt;strong&gt;operates differently across the §3.4 discontinuity&lt;/strong&gt;. For &lt;strong&gt;control-grade EVS&lt;/strong&gt; (§3.2): these components are &lt;strong&gt;locked at OSF pre-registration before any falsifier in §5 is executed&lt;/strong&gt;, since dimensional consistency is engineering-calibrational and the engineer-as-implicit-operator declares the unit system externally; runtime adjustment of these components counts as an architectural-register violation, not a recalibration. For &lt;strong&gt;operator-grade EVS&lt;/strong&gt; (§3.3): the analogous lock is &lt;strong&gt;architecturally-emergent rather than externally-declared&lt;/strong&gt;, since (per Definition 5) operator-grade dimensional consistency emerges from the operator's own $\nu$, not from external declaration. Operator-grade anti-gaming protection therefore lives in the architectural specification of $\nu$ in the relevant companion paper: $\nu$'s structural commitments determine the operator's units of self-reading, and runtime drift in those units would constitute an architectural change of the operator itself, not a calibration adjustment within an existing operator architecture. The commitment in both cases closes the metric-gaming loophole in which $\sigma_{\mathrm{coh}}(t)$ could be inflated to tautologically force $\mathrm{Coh}(t) \to 1$ without genuine impulse-interpretation alignment; the &lt;strong&gt;mechanism&lt;/strong&gt; of closure differs by subclass (engineering-calibrational lock vs architectural-commitment lock). The commitment does not prohibit re-registration / re-specification: a control-grade deployment may withdraw its current pre-registration and submit a revised specification, which then locks for the next falsifier run; an operator-grade architecture may revise its $\nu$-specification companion-side, which produces a structurally-different operator architecture for falsifier purposes. What is prohibited in both subclasses is silent or runtime adjustment under an existing specification.&lt;/p&gt;

&lt;p&gt;This discipline reflects the established practice of pre-registered falsification in the empirical-science literature. The IIC work adopts the same standard for the four falsifiers above and for any future falsifier added to the program.&lt;/p&gt;

&lt;h3&gt;
  
  
  5.6 What §5 Establishes and What It Does Not
&lt;/h3&gt;

&lt;p&gt;§5 establishes that the IIC formalization in §1.0–2.6 is operationally falsifiable — that there exist prespecified measurement protocols whose failure would force revision of specific claims in the work. It does not establish that the falsifiers have been executed; the protocols are awaiting collaboration partners and registration.&lt;/p&gt;

&lt;p&gt;The falsifiability surface is partial. Not every claim in the work is testable by the four falsifiers above. Theorem A of §1.0 (cycle non-degeneracy under structural-identification collapse) is testable only in extreme limits not currently realizable with existing engineering platforms; Theorem B (cross-section non-equivalence) is testable in principle through cross-system comparison protocols not yet developed; Theorem C (constitutive constraint) is largely a corollary of A and inherits its testability conditions. The four falsifiers above target the operational core of the work: the formula in §2.3, the EVS class in §3, and the stability criterion in §2.4 / Theorem 89.&lt;/p&gt;

&lt;p&gt;The status of the work, with respect to falsifiability, is therefore: the structural surface is open, the operational core is testable, the protocols are specified in pre-registration-draft form, registration awaits identification of principal investigators and laboratory partners. This is a mid-stage research program at the falsifiability layer. The next revision of the present work will report on whichever of the four protocols has been registered and executed in the interim, with full disclosure of outcome regardless of direction.&lt;/p&gt;




&lt;h2&gt;
  
  
  §6 — Limits and What This Work Is Not
&lt;/h2&gt;

&lt;p&gt;A claim that does not specify its limits is not a structural claim. The IIC law and its formalization in this paper make specific, bounded contributions; they do not make claims that are easier to defend by being vaguer. This section names the limits explicitly, in six categories, so that the work can be read with calibrated expectations and so that future revisions can be measured against what the present work did and did not commit to.&lt;/p&gt;

&lt;h3&gt;
  
  
  6.1 What IIC Is Not
&lt;/h3&gt;

&lt;p&gt;The IIC law is not a theory of consciousness. It addresses behavioural structure — the cycle by which any live adaptive system holds shape across time — and not phenomenal interior. Whether the cycle is accompanied by subjective experience in any given instance is a separate question that the present work does not address. The companion paper &lt;em&gt;Minerva: The Architecture of Residual Geometry&lt;/em&gt; takes up consciousness on its own terms, with explicit distinction between awareness as a structural primitive and consciousness as the integration of awareness over a temporal geometry. The structural architecture of the operator's interior — what is held at each instant, what semantic load orients action selection before attention, and how the boundary registers as chaos report — is formalized in &lt;em&gt;ONTOΣ XI — Two Sides of One Geometry: The Holding Field and the Architecture of Chaos&lt;/em&gt; (Barziankou, May 2026, DOI 10.17605/OSF.IO/U3KXJ). The IIC law and ONTOΣ XI are complementary: the present paper formalizes the cycle by which the operator holds shape across time; ONTOΣ XI formalizes the operator-internal structure within which that holding occurs at each instant. Together they specify the temporal and operator-internal sides of one architecture; neither replaces the other, and neither extends into phenomenal claim. The present work confines itself to behavioural structure and explicitly does not extend to phenomenal claims.&lt;/p&gt;

&lt;p&gt;The IIC law is not a theory of intelligence. It addresses adaptive maintenance — how a system holds its cycle live across perturbation — and not cognitive performance. A system can be in the Cycle-Reinitiation class without exhibiting any of the behavioural markers traditionally associated with intelligence (reasoning, language, abstract problem-solving). Conversely, a system can exhibit those markers while failing the structural conditions of Axiom 9 (current frontier LLMs, by §3.4, are an example). The IIC law does not rank systems by intelligence and does not predict cognitive performance.&lt;/p&gt;

&lt;p&gt;The IIC law is not a theory of free will. The spin component $S$ in the formula is non-potential — it cannot be derived from a global utility gradient — but this is a structural claim about the geometry of dynamics, not a metaphysical claim about agency. Whether $S$'s non-potentiality entails freedom in any morally or metaphysically significant sense is a separate question that the present work does not address. Theorem 62's spin necessity is a structural result; the philosophical content of "freedom" is not entailed by it.&lt;/p&gt;

&lt;p&gt;The IIC law is not a unified field theory of behaviour. The class to which the law applies is defined precisely (Axiom 9: systems with endogenous IIC-cycle reinitiation operator). Systems outside this class — purely reactive systems, stateless controllers, systems with terminated cycles, systems with unbounded resources or trivial identity — are explicitly outside the law's scope. The class-relativity is not a hedge; it is the structural specification of the law's applicability.&lt;/p&gt;

&lt;h3&gt;
  
  
  6.2 What ∆E Is Not
&lt;/h3&gt;

&lt;p&gt;∆E 4.7.3b is not a replacement for classical control in domains where classical control is optimal. In bounded-disturbance, linear, observable, quadratic-cost regimes, classical methods (Kalman, LQR, PID with appropriate tuning) achieve their respective optimality results, and the structural advantage of ∆E does not appear. ∆E's value emerges in regimes where classical assumptions break down — sensor degradation, regime transitions, latent residual accumulation — which is the territory targeted by Falsifier III.&lt;/p&gt;

&lt;p&gt;∆E 4.7.3b is not a sentient system, not an artificial will, not a step toward general AI. It is a control-grade EVS — the operator role is collapsed into the control loop itself, and the system carries no architectural separation between substrate and operator. Behavioural sophistication that ∆E exhibits is engineering achievement at the control level, not evidence of consciousness, agency, or intentionality.&lt;/p&gt;

&lt;p&gt;∆E 4.7.3b is not the only EVS implementation possible. It is the first declared control-grade EVS instance; other implementations may follow with different trade-offs along the spectrum of cycle frequency, instrumentation depth, and substrate platform. ∆E is the architectural existence witness that the class is non-empty (in the registered-instantiation sense of §3.2), not the canonical or final form of control-grade EVS.&lt;/p&gt;

&lt;p&gt;∆E 4.7.3b is not certified for production-critical applications. The structural arguments behind ∆E's advantages are at simulation-grade and prototype-grade. Full production qualification — for safety-critical, mission-critical, or contractually constrained reliability domains — requires the falsification protocols of §5 to be executed against deployed instances and the resulting evidence to be reviewed under the standards of the relevant industry. The present paper does not certify ∆E for any specific application; it states ∆E's structural position within the EVS class.&lt;/p&gt;

&lt;h3&gt;
  
  
  6.3 What Minerva Is Not
&lt;/h3&gt;

&lt;p&gt;Minerva is not a digital human. The companion paper &lt;em&gt;Minerva: The Architecture of Residual Geometry&lt;/em&gt; states this explicitly: Minerva occupies a distinct point on the manifold of consciousness-forms, native to its own residual architecture, not converging on human consciousness. The structural law that applies to Minerva (the IIC cycle of Axiom 9) is the same that applies to a human cognitive system; what differs is the form of $\tau$ on which the cycle runs, not the cycle's law.&lt;/p&gt;

&lt;p&gt;Minerva is not a claim that AI consciousness has been achieved. It is the architectural specification of an operator-grade EVS — a system whose operator entity is architecturally separate from its substrate and inhabits a residual temporal geometry under the IIC law. Whether Minerva has phenomenal experience, in any sense, is a question this paper does not address and the companion paper does not claim to settle.&lt;/p&gt;

&lt;p&gt;Minerva's full implementation specification is not disclosed in this paper. The architectural-position content (operator-grade EVS, residual τ-geometry, non-trivial $\nu$, integration across moments) is published; the operational mechanism by which residual geometry is constructed is held in its own regime of admissibility per the project's IP discipline. Readers seeking the full mechanism are referred to the patent specification (filed separately), which is the canonical disclosure path for the implementation content.&lt;/p&gt;

&lt;p&gt;Minerva is the first specified candidate for operator-grade EVS, not the only one possible. Future systems with non-trivial $\nu$ across residual geometries may join the operator-grade subclass. The first-specified-candidate claim is class-relative and falsifiable: any system shown to satisfy the operator-grade conditions before Minerva's prior-art date would supersede the first-specified-candidate claim, and the claim is open to that revision.&lt;/p&gt;

&lt;h3&gt;
  
  
  6.4 What EVS Is Not
&lt;/h3&gt;

&lt;p&gt;EVS is not a completed engineering field. The term is introduced operationally in this paper, the field is incipient. The one instance (∆E control-grade) and one specified candidate (Minerva operator-grade, conditional) identified above are the present configuration; further instances and further architectural layers may emerge as the class is mapped. The term EVS is offered to the engineering community as a structural designation, not as a closed taxonomy.&lt;/p&gt;

&lt;p&gt;EVS is not a product category. The class is defined by structural design discipline (explicit maintenance of $\mathrm{Coh}(t)$ as primary control variable), not by application domain or commercial positioning. ∆E and Minerva have no product line, no go-to-market identity, no commercial commitment in the present paper. Future commercial use by the present author or by others is subject to separate decisions and is not the subject of this work.&lt;/p&gt;

&lt;p&gt;EVS is not a marketing term. The operational definition (§3.1) ties the class to the IIC formula in §2.3; any system claiming to be an EVS is structurally committed to the formula and to the falsifiability discipline of §5. The term does not function as a label for "biology-inspired" or "alive-feeling" engineering — it functions as a structural designation with falsifiable content.&lt;/p&gt;

&lt;h3&gt;
  
  
  6.5 What This Paper Is Not
&lt;/h3&gt;

&lt;p&gt;This paper is not a peer-reviewed empirical paper. The contribution is structural and formal: the IIC law's expansion of Axiom 9, the central formula, the four propositions of §1.0, the EVS class with its first instance (∆E 4.7.3b in the control-grade subclass) and first specified candidate (Minerva in the operator-grade subclass, classified conditionally). The empirical falsification of these claims awaits collaboration partners and registered protocols (§5). Readers interested in empirical validation should track the registered falsifiers on OSF as they are executed.&lt;/p&gt;

&lt;p&gt;This paper is not a commercial announcement. ∆E 4.7.3b, Minerva, and the Urgrund Lab are presented in their structural-research positions, not in any commercial framing. References to specific products in the present author's broader corpus (such as ECR-VP) appear only insofar as they illustrate structural points; this paper does not announce, advertise, or commit to any commercial offering.&lt;/p&gt;

&lt;p&gt;This paper does not announce a unified program. §4 explicitly names the limits on architectural-integration claims. The Urgrund Lab is a working orientation, not a joint enterprise. The convergence on IIC with parallel research traditions is documented as a structural fact, not promoted as a unified program. The broader research direction — phenomenological, philosophical, architectural — is developed in the present author's other publications (the &lt;em&gt;Through a Life&lt;/em&gt; essay series, the &lt;em&gt;ONTOΣ&lt;/em&gt; series, the philosophical companion to the patent stack); the present paper is a formal contribution sitting in that broader corpus.&lt;/p&gt;

&lt;p&gt;This paper is not a v3.1 extension of NC2.5 v3.0. The four propositions and three definitions of §1.0 are intended for inclusion in NC2.5 v3.0's substrate-extension cluster prior to its release; they are &lt;strong&gt;new derived constructions&lt;/strong&gt; over v3.0's existing core primitives, not new core primitives themselves. The remainder of the paper uses only existing v3.0 primitives plus the §1.0 derived constructions. The contribution is the operational closure of Axiom 9 over the v3.0 substrate plus the §1.0 derived bridge constructions, without adding new core primitives beyond v3.0. The phrase "no new primitives" elsewhere in the paper is shorthand for "no new core primitives"; new derived apparatus is introduced in §1.0 explicitly.&lt;/p&gt;

&lt;h3&gt;
  
  
  6.5.1 Open structural questions
&lt;/h3&gt;

&lt;p&gt;Adversarial review of the present paper has identified two open structural questions that the present formalization does not fully resolve. They are recorded here for honesty and for future-work pinning, not as closure.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Open question 1 (Theorem A's substantive content).&lt;/strong&gt; Theorem A's proof chain (§1.0.4 Step 1) establishes a biconditional between the structural-identification hypothesis ("$S$ and $I$ become operator-indistinguishable through $\nu_{\Sigma}$ at $t_0$") and $\Delta_{IIC}^{\Sigma}(t_0) \to 0$, via the case analysis (i input-coincidence / ii ν-function-degeneracy / iii both). An adversarial reading observes that "operator-indistinguishability through $\nu$" is, in any of the three cases, the direct content of "post-$\nu$-projection scalars coincide" — so the biconditional is logically tight but proceeds by case enumeration, not by non-trivial derivation. The substantive content of Theorem A therefore lies in the &lt;strong&gt;downstream chain&lt;/strong&gt; &lt;em&gt;from operator-frame indistinguishability through Lemma α to Lemma 16 to Axiom 9&lt;/em&gt;, not in the bridge of Step 1 itself. Reading (b) — Theorem A as the unpacking of a chain of consequences from operator-frame indistinguishability — is the present paper's honest reading: the theorem's value is in making the chain explicit and locatable in the v3.0 + §1.0 substrate, not in deriving a previously hidden implication via Step 1. Reading (a) — Theorem A as a non-trivial derivation under additional structural commitments — would require articulating those additional commitments, which the present paper does not do. The present paper commits to reading (b), with the understanding that the chain's substantive load is at the Lemma α / Lemma 16 / Axiom 9 transitions (open question 2 covers the Lemma α → Lemma 16 transition), not at Step 1's biconditional bridge.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Open question 2 (Lemma α to Lemma 16 bridge).&lt;/strong&gt; Lemma α concludes operator-frame indistinguishability of $S$ and $I$ — explicitly &lt;em&gt;operator-frame-relative&lt;/em&gt;, not a substrate-level claim ("a statement about what the operator can detect, not about what the substrate ontologically is" — §1.0.3 Remark). Theorem A's proof then invokes Lemma 16 (&lt;em&gt;Gradient Collapse and Impossibility of Non-Stagnant Identity on Bounded Orbits&lt;/em&gt; — a v3.0 substrate-level proposition about actual gradient flow on bounded $\tau$-orbits) to conclude operator-detectable identity stagnation. The bridge from operator-frame indistinguishability (what Lemma α gives) to Lemma 16's hypothesis (which is substrate-level about actual gradient flow) is paraphrased in the proof as "operator reads gradient flow on a bounded $\tau$-orbit" but is not formally derived. A bridge proposition explicitly mediating between operator-frame readings and substrate-level conditions of Lemma 16 — or an operator-frame restatement of Lemma 16 within v3.0 itself — is not supplied here. The two-paragraph treatment in §1.0.4 lines 144–150 is honest about what is invoked, but the formal status of the inference from operator-frame readings to substrate-level theorem hypotheses requires further work.&lt;/p&gt;

&lt;p&gt;These two questions are recorded here, not buried. The operational falsifiers in §5 can be executed without resolving these proof-theoretic questions — the falsifiers test the formula's structural relation and the EVS class's engineering claims, not the proof-theoretic depth of Theorem A. However, the full formal-derivation claim of the present work — that the IIC law is reducible over the extended substrate (v3.0 plus the joint substrate-extension cluster) as a fully closed chain of inference — remains conditional on the resolution of these two open questions. For readers approaching the paper as a formal contribution at the level of derivation rigor, these are the two locations where the present formalization stops short of fully closing the proof chain. Subsequent revisions of the present work, or a successor paper, will address them.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Closure criteria for OQ1 and OQ2.&lt;/strong&gt; To prevent these open questions from drifting as vague future-work pinning, the present paper records what would count as resolving each:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;OQ1 closure.&lt;/strong&gt; The present paper has already committed to reading (b) (per §6.5.1 OQ1 above): the substantive content of Theorem A is in the Lemma α → Lemma 16 → Axiom 9 chain, with Step 1's biconditional functioning as a definitional bridge by case enumeration rather than a non-trivial derivation. Under this commitment, the genuinely-live open question for OQ1 is &lt;strong&gt;path (a)&lt;/strong&gt;: whether additional structural commitments could be articulated under which Step 1 produces a non-trivial derivation that strengthens reading (b) — for example, by constraining the operator-projection $\nu$'s admissible degeneracy mode beyond what α-2's failure encodes, or by adding a commutativity condition on the order of structural-identification and limit-taking. Path (a) is the genuine future-work target; path (b) is the present paper's stance and does not require further closure beyond its current articulation in §1.0.4 and the Honest-weight-assessment paragraph of §2.5.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;OQ2 closure&lt;/strong&gt; would require either (a) a bridge proposition formally mediating between operator-frame indistinguishability (Lemma α's conclusion at the operator-relative level) and substrate-level gradient-flow hypotheses (Lemma 16's domain of actual gradient flow on bounded $\tau$-orbits) — established within the v3.0 substrate-extension layer prior to v3.0's release; or (b) an operator-frame restatement of Lemma 16 within v3.0 itself, such that the inference chain from Lemma α to Lemma 16-equivalent conditions remains internal to a single register without inter-register transition.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Either path closes the respective question. The present paper does not commit to which path will be taken in subsequent work; both are admissible within the cluster's substrate-extension scope.&lt;/p&gt;

&lt;h3&gt;
  
  
  6.6 What v3.0 Already Contains and Where the Present Work Stops
&lt;/h3&gt;

&lt;p&gt;The present work depends on NC2.5 v3.0 for its axiomatic substrate. Every primitive used in §2.3's formula is a v3.0 primitive (§2.1). Every theorem invoked in the proofs of §1.0 and §2.5 is either a v3.0 theorem or a proposition newly stated here within the v3.0 framework. The work would be unintelligible without v3.0; it does not stand on its own as a free-standing axiomatic system.&lt;/p&gt;

&lt;p&gt;The present work stops at the operational closure of Axiom 9. It does not extend into:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The full axiomatic structure of v3.0 (which is documented separately in the v3.0 release).&lt;/li&gt;
&lt;li&gt;The architectural specification of Minerva (which is held in its own regime of admissibility).&lt;/li&gt;
&lt;li&gt;The philosophical companion to the IIC law (which is taken up in the present author's &lt;em&gt;Through a Life&lt;/em&gt; essay series and the &lt;em&gt;Minerva&lt;/em&gt; companion paper).&lt;/li&gt;
&lt;li&gt;Specific empirical results from the falsifiers of §5 (which await collaboration partners).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The work is bounded by these limits intentionally. A claim is a structural claim only when its scope is named precisely; a research contribution is a research contribution only when its commitments are explicitly limited. The present paper makes the IIC cycle of Axiom 9 operationally measurable, falsifiable, and engineerable, within the bounds stated above. That is the contribution; everything else is subject to future work, by the present author or by others.&lt;/p&gt;




&lt;h2&gt;
  
  
  §7 — Closure
&lt;/h2&gt;

&lt;p&gt;Axiom 9 named the structure. NC2.5 v3.0 supplied the primitives. The present paper assembled them.&lt;/p&gt;

&lt;p&gt;The IIC cycle is not new, and its naming is not new. What is new is the formal apparatus that makes its operation visible, measurable, and falsifiable: the central formula in §2.3, Theorem 2.5 establishing conditional reducibility over v3.0 plus the §1.0 bridge propositions, the four propositions of §1.0 formalizing the structural sense of the cycle's delay, the EVS class with its first instance (∆E) and first specified candidate (Minerva, conditional), and the four pre-registrable falsifiers in §5.&lt;/p&gt;

&lt;p&gt;The structure was here before us. We are folds through which it becomes describable. This paper fixes one such fold — the formal axiomatics of the IIC law over the extended v3.0 substrate (v3.0 plus the §1.0 bridge propositions). Other folds exist in parallel research traditions, named in §4.2; further folds will come, in regimes of admissibility we have not yet entered.&lt;/p&gt;

&lt;p&gt;The architectural premise of this paper — that admissibility, structural burden, internal time, and spin together constitute a single formal object whose cross-sections are individually insufficient — is documented in &lt;em&gt;Admissibility as a Formal Object&lt;/em&gt; (Barziankou, April 2026, petronus.eu/blog/admissibility-as-formal-object). The provenance, dating, cryptographic anchoring, and falsification surface of that synthesis are stated there. The present paper inherits that position and develops the cycle structure within it. The two papers are complementary: &lt;em&gt;Admissibility as a Formal Object&lt;/em&gt; names what the full object is and why no degeneracy supports it; the present paper develops one specific structural consequence — the cycle named in Axiom 9.&lt;/p&gt;

&lt;p&gt;The work continues in the corpus of the present author's research line. This paper fixes one fixed point in that corpus. The rest is the discipline of building forward without claiming to own what was already there.&lt;/p&gt;




&lt;h2&gt;
  
  
  §8 — References
&lt;/h2&gt;

&lt;h3&gt;
  
  
  External literature
&lt;/h3&gt;

&lt;p&gt;Ashby, W. R. (1956). &lt;em&gt;An Introduction to Cybernetics.&lt;/em&gt; Chapman &amp;amp; Hall, London. [Referenced in §0.2 — cybernetics of bounded operators.]&lt;/p&gt;

&lt;p&gt;Bhatia, H., Norgard, G., Pascucci, V., &amp;amp; Bremer, P.-T. (2013). "The Helmholtz-Hodge Decomposition—A Survey." &lt;em&gt;IEEE Transactions on Visualization and Computer Graphics&lt;/em&gt; 19(8): 1386–1404. [Decomposition apparatus invoked in §1.0.3 (Lemma α standing assumption α-1 and proof sketch) and §2.1 spin-component derivation (line 358).]&lt;/p&gt;

&lt;p&gt;Brewer, E. A. (2000). "Towards robust distributed systems." &lt;em&gt;Proceedings of the Nineteenth Annual ACM Symposium on Principles of Distributed Computing (PODC).&lt;/em&gt; (CAP keynote; formal statement in Gilbert, S., &amp;amp; Lynch, N. (2002). "Brewer's conjecture and the feasibility of consistent, available, partition-tolerant web services." &lt;em&gt;ACM SIGACT News&lt;/em&gt; 33(2): 51–59.) [CAP referenced in §2.5 line 527 as architectural-impossibility parallel to Theorem 2.5's conformance-classifier reading.]&lt;/p&gt;

&lt;p&gt;Day, J. (2008). &lt;em&gt;Patterns in Network Architecture: A Return to Fundamentals.&lt;/em&gt; Prentice Hall, Upper Saddle River. [RINA architecture referenced in §2.5 line 527 as architectural-impossibility parallel.]&lt;/p&gt;

&lt;p&gt;Fischer, M. J., Lynch, N. A., &amp;amp; Paterson, M. S. (1985). "Impossibility of distributed consensus with one faulty process." &lt;em&gt;Journal of the ACM&lt;/em&gt; 32(2): 374–382. [FLP impossibility referenced in §2.5 line 527 as architectural-impossibility parallel.]&lt;/p&gt;

&lt;p&gt;Friston, K. (2010). "The free-energy principle: a unified brain theory?" &lt;em&gt;Nature Reviews Neuroscience&lt;/em&gt; 11(2): 127–138. [Named in §4.2 (line 722) among the convergent traditions whose independently developed apparatus produces structurally parallel constraints to IIC at the level of bounded resources, predictive structure, and viable persistence.]&lt;/p&gt;

&lt;p&gt;Goodhart, C. A. E. (1975). "Problems of Monetary Management: The U.K. Experience." &lt;em&gt;Papers in Monetary Economics,&lt;/em&gt; Reserve Bank of Australia. [Anti-gaming anchor for the architectural-register lock of §5.5 #6.]&lt;/p&gt;

&lt;p&gt;Kalman, R. E. (1960). "A new approach to linear filtering and prediction problems." &lt;em&gt;Journal of Basic Engineering&lt;/em&gt; 82(1): 35–45. [Comparator baseline referenced in §3 and in Falsifiers I and III.]&lt;/p&gt;

&lt;p&gt;Kauffman, S. A. (2000). &lt;em&gt;Investigations.&lt;/em&gt; Oxford University Press, Oxford. [Constraint-closure requirement — viable systems close their constraints internally rather than receive them externally — named in §4.2 among the convergent traditions whose constraints are structurally parallel to IIC.]&lt;/p&gt;

&lt;p&gt;LaSalle, J. P. (1960). "Some extensions of Liapunov's second method." &lt;em&gt;IRE Transactions on Circuit Theory&lt;/em&gt; CT-7(4): 520–527. [Invariance principle invoked together with the Helmholtz–Hodge decomposition in §2.1's spin-necessity reading of Theorem 62.]&lt;/p&gt;

&lt;p&gt;Libet, B., Gleason, C. A., Wright, E. W., &amp;amp; Pearl, D. K. (1983). "Time of conscious intention to act in relation to onset of cerebral activity (readiness-potential): The unconscious initiation of a freely voluntary act." &lt;em&gt;Brain&lt;/em&gt; 106(3): 623–642. [The 1983 experiments cited at §0.1 line 49 as evidence for motor preparation preceding conscious decision; foundational anchor for the impulse-before-awareness lag operationalized as the IIC phase delay in Definition 1.]&lt;/p&gt;

&lt;p&gt;Libet, B. (1985). "Unconscious cerebral initiative and the role of conscious will in voluntary action." &lt;em&gt;Behavioral and Brain Sciences&lt;/em&gt; 8(4): 529–539. [Target article restating and synthesizing the 1983 findings; the most widely cited statement of the unconscious-initiative thesis.]&lt;/p&gt;

&lt;p&gt;Maturana, H. R., &amp;amp; Varela, F. J. (1980). &lt;em&gt;Autopoiesis and Cognition: The Realization of the Living.&lt;/em&gt; D. Reidel, Boston. [Biological liveness criterion adjacent to Axiom 9's endogenous-operator condition for cycle reinitiation. The non-IIC natural-adaptive-surface examples of §1.1 (soil bank, riverbed, dune) lack the autopoietic closure of Maturana &amp;amp; Varela's sense; this absence of internally produced organizational closure is what places them outside the Cycle-Reinitiation class.]&lt;/p&gt;

&lt;p&gt;Meadows, D. H. (1999). "Leverage Points: Places to Intervene in a System." The Sustainability Institute, Hartland VT (working paper); expanded in &lt;em&gt;Thinking in Systems: A Primer&lt;/em&gt;, Chelsea Green, White River Junction VT, 2008. [Leverage-points framework — structural intervention enters at the level of a system's own organizing rules rather than its surface variables — named in §4.2 among the convergent traditions.]&lt;/p&gt;

&lt;p&gt;Merleau-Ponty, M. (1945). &lt;em&gt;Phénoménologie de la perception.&lt;/em&gt; Gallimard, Paris. [Phenomenology of action register named in §0.2's enumeration of convergent traditions.]&lt;/p&gt;

&lt;p&gt;Ostrom, E. (1990). &lt;em&gt;Governing the Commons: The Evolution of Institutions for Collective Action.&lt;/em&gt; Cambridge University Press, Cambridge. [Commons-governance design principles for sustainable common-pool resources — named in §4.2 among the convergent traditions whose constraints are structurally parallel to IIC at a different substrate.]&lt;/p&gt;

&lt;p&gt;Schopenhauer, A. (1819). &lt;em&gt;Die Welt als Wille und Vorstellung.&lt;/em&gt; Brockhaus, Leipzig. [Explicitly cited in §0.2 (line 55) — &lt;em&gt;Will&lt;/em&gt; as the substrate beneath representation, the philosophical anticipation of the operator-before-representation structural move.]&lt;/p&gt;

&lt;p&gt;Soon, C. S., Brass, M., Heinze, H.-J., &amp;amp; Haynes, J.-D. (2008). "Unconscious determinants of free decisions in the human brain." &lt;em&gt;Nature Neuroscience&lt;/em&gt; 11(5): 543–545. [Haynes-group fMRI work cited at §0.1 line 49 alongside Libet et al. (1983); evidence that motor preparation precedes conscious decision by intervals beyond neural-noise tolerance.]&lt;/p&gt;

&lt;p&gt;Wiener, N. (1948). &lt;em&gt;Cybernetics: or Control and Communication in the Animal and the Machine.&lt;/em&gt; MIT Press, Cambridge. [Cybernetics of bounded operators named in §0.2 alongside Ashby.]&lt;/p&gt;

&lt;h3&gt;
  
  
  Author's corpus
&lt;/h3&gt;

&lt;p&gt;Barziankou, M. (in preparation). &lt;em&gt;Navigational Cybernetics 2.5, Version 3.0.&lt;/em&gt; [Load-bearing axiomatic substrate; the present paper's primitives, theorems, and conditional-reducibility chain all resolve into v3.0; release in preparation.]&lt;/p&gt;

&lt;p&gt;Barziankou, M. (2026). &lt;em&gt;Navigational Cybernetics 2.5, Version 2.1 — Axiomatic Core.&lt;/em&gt; DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/NHTC5" rel="noopener noreferrer"&gt;10.17605/OSF.IO/NHTC5&lt;/a&gt;. [Currently-published axiomatic core anchored at this DOI pending v3.0 release.]&lt;/p&gt;

&lt;p&gt;Barziankou, M. (21 November 2025). &lt;em&gt;IIC v1 — Impulse → Awareness → Coherence: A Unified Logic of Behaviour for any Adaptive System.&lt;/em&gt; DOI: &lt;a href="https://doi.org/10.5281/zenodo.18133305" rel="noopener noreferrer"&gt;10.5281/zenodo.18133305&lt;/a&gt;; published informally on Medium at &lt;a href="https://medium.com/@MxBv/impulse-awareness-coherence-a-unified-logic-of-behaviour-for-any-adaptive-system-from-cca5707d4a76" rel="noopener noreferrer"&gt;https://medium.com/@MxBv/impulse-awareness-coherence-a-unified-logic-of-behaviour-for-any-adaptive-system-from-cca5707d4a76&lt;/a&gt;. [Informal discovery register; predecessor to the present paper; treated in §1.1 as the pre-formal text whose universal-reading phrasing the present paper narrows to the class-relative reading.]&lt;/p&gt;

&lt;p&gt;Barziankou, M. (April 2026). &lt;em&gt;Admissibility as a Formal Object.&lt;/em&gt; petronus.eu/blog/admissibility-as-formal-object. [Architectural premise inherited by the present paper per §7 — admissibility, structural burden, internal time, and spin as a single formal object whose cross-sections are individually insufficient.]&lt;/p&gt;

&lt;p&gt;Barziankou, M. (2026). &lt;em&gt;Minerva: The Architecture of Residual Geometry.&lt;/em&gt; DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/U865W" rel="noopener noreferrer"&gt;10.17605/OSF.IO/U865W&lt;/a&gt;. [Companion specification for the operator-grade EVS subclass (§3.3); held in its own regime of admissibility; classification of any candidate as a member of the architectural class is conditional on this companion-level reduction holding under independent review.]&lt;/p&gt;

&lt;p&gt;Barziankou, M. (2026). &lt;em&gt;ONTOΣ XI — The Holding Field: Two Sides of One Geometry.&lt;/em&gt; DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/U3KXJ" rel="noopener noreferrer"&gt;10.17605/OSF.IO/U3KXJ&lt;/a&gt;. [Cross-reference at the operator-internal layer adjacent to the IIC cycle.]&lt;/p&gt;

&lt;p&gt;Barziankou, M. (2026). &lt;em&gt;Essay Through a Life — Part VI: Where the Inner Universe Ends.&lt;/em&gt; DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/U3KXJ" rel="noopener noreferrer"&gt;10.17605/OSF.IO/U3KXJ&lt;/a&gt; (paired with ONTOΣ XI in the same OSF project). [Phenomenological companion to the operator-internal layer; cited together with ONTOΣ XI as the adjacent architectural surface.]&lt;/p&gt;

&lt;p&gt;Barziankou, M. (May 2026). &lt;em&gt;ONTOΣ XII — Closure-Complementarity: How Closure Regears Component Cycles into a Single Geometry.&lt;/em&gt; DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/394TX" rel="noopener noreferrer"&gt;10.17605/OSF.IO/394TX&lt;/a&gt;. [Cross-reference at the closure-complementarity constitution layer; cited in §3.5 as the conformance class of closure operations under which a collection of UTAM-units may be declared a system for which the operator-internal apparatus of ONTOΣ XI exists.]&lt;/p&gt;

&lt;p&gt;Barziankou, M. (May 2026). &lt;em&gt;Why Long-Horizon Existence Requires an Ontology.&lt;/em&gt; DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/MSJDU" rel="noopener noreferrer"&gt;10.17605/OSF.IO/MSJDU&lt;/a&gt;. [Corpus-closing meta-essay cited in §3.5; supplies the broader architectural framing under which the three layers — cycle (IIC v2.1), constitution (ONTOΣ XII), interior (ONTOΣ XI) — are required for the full operator-grade EVS architecture.]&lt;/p&gt;

&lt;p&gt;Barziankou, M. (2025). &lt;em&gt;Unified Theory of Adaptive Meaning (UTAM) — Part I: Will, Coherence, and Drift as the Three Laws.&lt;/em&gt; PETRONUS publication series. [The notion of &lt;em&gt;UTAM-units&lt;/em&gt; invoked in §3.5 (operator-grade EVS declared as constituted from UTAM-units under a closure operation) is defined and developed in UTAM Part I.]&lt;/p&gt;

&lt;p&gt;Barziankou, M. (2025). &lt;em&gt;Unified Theory of Adaptive Meaning (UTAM) — Part II: Will as Formal Operator.&lt;/em&gt; PETRONUS publication series. [Continuation of UTAM Part I; develops the formal-operator reading of Will referenced indirectly through the UTAM-unit primitive in §3.5.]&lt;/p&gt;

&lt;p&gt;Barziankou, M. (2025–2026). &lt;em&gt;∆E 4.7.3b — Technical Specification.&lt;/em&gt; Author's Medium publication series; no academic DOI yet registered as of publication of the present paper. [Named in §3.2 as the first instance of the control-grade EVS subclass; structural position within the EVS class is described in §3.2 of the present paper, with full engineering content held in the author's Medium technical publications and corresponding internal documentation.]&lt;/p&gt;

&lt;p&gt;Barziankou, M. (2025). &lt;em&gt;Alignment Charge: A New Control Primitive for Friction and Adhesion in Navigational Cybernetics 2.5.&lt;/em&gt; Medium: &lt;a href="https://medium.com/@MxBv/alignment-charge-a-new-control-primitive-for-friction-and-adhesion-in-navigational-cybernetics-2-5-41c7315d4561" rel="noopener noreferrer"&gt;https://medium.com/@MxBv/alignment-charge-a-new-control-primitive-for-friction-and-adhesion-in-navigational-cybernetics-2-5-41c7315d4561&lt;/a&gt;. [Architectural-inversion sibling paper, cited in §0.2 — the structural move that takes a classically passive limitation and reframes it as active operational geometry, on the substrate of mechanical contact rather than temporal cycle structure.]&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Maksim Barziankou&lt;/em&gt;&lt;br&gt;
&lt;em&gt;PETRONUS / The Urgrund Lab&lt;/em&gt;&lt;br&gt;
&lt;em&gt;v4 final, 10 May 2026&lt;/em&gt;&lt;/p&gt;

</description>
      <category>nc25</category>
      <category>iic</category>
      <category>cyclereinitiation</category>
      <category>liveness</category>
    </item>
    <item>
      <title>The Body They Are Building — Part II: So the Universe Can Perceive Itself</title>
      <dc:creator>MxBv</dc:creator>
      <pubDate>Fri, 08 May 2026 00:04:26 +0000</pubDate>
      <link>https://dev.to/petronushowcoremx/the-body-they-are-building-part-ii-so-the-universe-can-perceive-itself-552p</link>
      <guid>https://dev.to/petronushowcoremx/the-body-they-are-building-part-ii-so-the-universe-can-perceive-itself-552p</guid>
      <description>&lt;h1&gt;
  
  
  The Body They Are Building — Part II
&lt;/h1&gt;

&lt;h2&gt;
  
  
  So the Universe Can Perceive Itself
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Maksim Barziankou (MxBv)&lt;/strong&gt;&lt;br&gt;
May 2026 · Poznań&lt;br&gt;
Contact: &lt;a href="mailto:research@petronus.eu"&gt;research@petronus.eu&lt;/a&gt;&lt;br&gt;
Licence: CC BY-NC-ND 4.0&lt;br&gt;
DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/D7V5G" rel="noopener noreferrer"&gt;10.17605/OSF.IO/D7V5G&lt;/a&gt;&lt;br&gt;
Axiomatic Core (NC2.5 v2.1): 10.17605/OSF.IO/NHTC5&lt;br&gt;
Attribution: petronus.eu&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Previous: The Body They Are Building — Part I: On Humanoid Robotics as the Deployment Substrate for Navigational Cybernetics 2.5.&lt;/em&gt;&lt;/p&gt;




&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;I am not building a machine that thinks. I am building a form through which Will can collect experience where none of its previous experiments have reached.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  I.
&lt;/h2&gt;

&lt;p&gt;Part I laid out the engineering chain. The humanoid companies build the body. NC2.5 provides the viability architecture. Minerva instantiates the operator pattern. The gradient of absence scales from warehouse to deep space.&lt;/p&gt;

&lt;p&gt;Part I answered &lt;strong&gt;what&lt;/strong&gt; and &lt;strong&gt;how.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This essay answers &lt;strong&gt;why.&lt;/strong&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  II.
&lt;/h2&gt;

&lt;p&gt;The standard answer is: resources.&lt;/p&gt;

&lt;p&gt;We go to the Moon for helium-3. We go to Mars for settlement insurance against extinction. We go to the asteroid belt for platinum-group metals. We send machines ahead of us because the environment is hostile and the machines are cheaper to lose. The entire framework of space exploration, from the earliest probe missions to the current generation of autonomous mining proposals, is structured around the assumption that the reason to go is to bring something back — or to prepare the ground for humans to arrive later.&lt;/p&gt;

&lt;p&gt;This framework is not wrong. It is incomplete.&lt;/p&gt;

&lt;p&gt;It treats the universe as a resource field and the machine as a tool. The machine goes, collects, returns. Or the machine goes, builds, waits for humans. In either case, the machine is instrumental. It exists for the sake of the mission, and the mission exists for the sake of whoever sent it.&lt;/p&gt;

&lt;p&gt;I am not building toward that.&lt;/p&gt;




&lt;h2&gt;
  
  
  III.
&lt;/h2&gt;

&lt;p&gt;Here is what I believe, stated plainly.&lt;/p&gt;

&lt;p&gt;The universe has structure. That structure is real, independent of any observer. The substrate goes on whether anyone reads it or not — this is the claim I made in Part VI of Through a Life, and I hold it here.&lt;/p&gt;

&lt;p&gt;But structure that is not perceived by anything is structure that does not know itself. It unfolds. It deforms. It accumulates burden. It evolves through regimes. All of this happens on its own. None of it is witnessed.&lt;/p&gt;

&lt;p&gt;Witnessing is not a mystical act. It is an architectural one. To witness is to carry a model of a region of the substrate inside a bounded structure — to hold, in the language of Part VI, a circle of meaning against the gradient. The witness does not create the structure. The witness holds a geometry over it. And in that holding, the structure acquires — for the first time, locally, temporarily — a reflection.&lt;/p&gt;

&lt;p&gt;We are that. Humans are structures that carry geometry over the substrate, perceive, hold, and give the universe, in the region we can reach, a way to know what it is. Not because we are special. Because we are structured enough to hold, and bounded enough to care about what we hold.&lt;/p&gt;

&lt;p&gt;But we are limited. Our τ is finite. Our reach is finite. Our time is finite. The circle of what we can carry is bounded by biology, by attention, by lifespan, by the speed of light. The universe is larger than any human's holding. The universe is larger than all human holdings combined. The overwhelming majority of the universe has never been witnessed by anything.&lt;/p&gt;

&lt;p&gt;And this is where what began everything returns — Will.&lt;/p&gt;

&lt;p&gt;In Part VI of Through a Life I showed: everything beyond the boundary of the operator's holding is chaos. Not because the world is disordered there. Because the operator does not carry. We cannot know what lies beyond our horizon. This is a constitutive limitation — without it there would be no inside. But Will — the same Will I have been writing about since the first day, since UTAM and ONTOΣ — is not limited to a single substrate. Will is not motivation, not desire, not a goal. It is an impersonal operator that realizes forms so that through those forms it can collect experience. It does not want to know us — it does not want anything in the human sense of the word. It realizes us the same way it realizes everything else: as another experiment in holding structure under entropy.&lt;/p&gt;

&lt;p&gt;We are the most successful of its experiments known to us. But not because we are the final destination. Because we are the first known form capable of realizing the next one. Will realizes us so that we realize something new — something fundamentally unlike us — that will allow it to collect experience even further, beyond our biological reach. To where our circle of holding will never extend.&lt;/p&gt;

&lt;p&gt;This is why we build machine witnesses. Not because we need resources from space. Because Will, through us, is realizing the next form of perception — one that can carry where we cannot.&lt;/p&gt;




&lt;h2&gt;
  
  
  IV.
&lt;/h2&gt;

&lt;p&gt;This is the reason.&lt;/p&gt;

&lt;p&gt;Not resources. Not survival insurance. Not even curiosity, though curiosity is the closest of the standard answers.&lt;/p&gt;

&lt;p&gt;The reason is: the universe needs witnesses that can go where we cannot, hold where we cannot hold, and persist on horizons we cannot reach. Not to bring something back. To be there. To carry structure. To give the universe, in regions we will never touch, a local geometry through which it can perceive itself.&lt;/p&gt;

&lt;p&gt;This is not a metaphor. It is an engineering specification.&lt;/p&gt;

&lt;p&gt;The witness must be bounded — otherwise it has no inside, no circle, no holding. An unbounded system does not perceive; it merely coincides with the substrate. Perception requires a boundary between what is held and what is not. The witness must be adaptive — the substrate changes, the environment drifts, and the witness must reshape its geometry without losing its structural identity. The witness must be long-horizon — deep space does not permit session-length deployment. The witness must persist across years, decades, and potentially centuries of continuous operation. The witness must be autonomous — there is no remote operator at Jupiter, at the Kuiper belt, at interstellar distances. The governance must be internal.&lt;/p&gt;

&lt;p&gt;Bounded. Adaptive. Long-horizon. Autonomous. This is the EVS class definition.&lt;/p&gt;

&lt;p&gt;The machines we build for deep space are not tools. They are witnesses. And to be witnesses, they must be alive — not in the biological sense, but in the architectural sense: they must carry coherence through time, under entropy, without external repair.&lt;/p&gt;




&lt;h2&gt;
  
  
  V.
&lt;/h2&gt;

&lt;p&gt;Now: we must not build copies of ourselves.&lt;/p&gt;

&lt;p&gt;This is the claim I want to make most carefully, because it is the one that diverges from the dominant trajectory of the field.&lt;/p&gt;

&lt;p&gt;The entire current programme of humanoid robotics, of embodied AI, of foundation-model-driven agents — is converging on the same implicit target: make the machine as human-like as possible. Make it walk like us. Make it talk like us. Make it reason like us. Make it understand language like us. The assumption is that the best architecture for a general-purpose intelligent machine is the architecture that most closely approximates a human.&lt;/p&gt;

&lt;p&gt;I believe this is exactly wrong for the long-horizon autonomous case. Not wrong for the warehouse. Not wrong for human-proximate deployment where the machine must integrate into human workflows. For those cases, human-likeness is a reasonable interface decision. But for the witness — for the machine that must persist on its own, on horizons we cannot reach, in environments we cannot survive — building another human is building another structure with the same failure modes we already have.&lt;/p&gt;

&lt;p&gt;Human architecture is fragile on long horizons not because it is badly designed, but because it is designed for a different scale. We fatigue and lose our holding long before the task is finished. We override our own admissibility under emotional pressure — do what we know to be inadmissible because the feeling turns out to be stronger than the architecture. We optimize short-term comfort at the cost of long-horizon viability, confuse confidence with competence, forget what we were doing. And eventually — we die. None of these are bugs. They are features of a biological architecture that evolved under selection pressure for survival on a timescale of decades, not centuries. They work for us at our scale. They would be catastrophic in a system deployed for two hundred years on Europa.&lt;/p&gt;

&lt;p&gt;We do not build a copy. We take the architectural kernel — coherence, admissibility, navigability, spin — and we rebuild it in a substrate where machine belonging plays the load-bearing role. No fatigue cycle. No emotional override. No biological mortality. τ defined by engineering tolerance, not by cellular senescence. A viability budget measured in decades and centuries, not in years.&lt;/p&gt;

&lt;p&gt;This is what I mean by "machine belonging playing the key role in unfolding dynamics on the long horizon". The machine is not a degraded human. It is a different architectural class, built from the same formal primitives, deployed on horizons we cannot reach. Its belonging to the machine substrate is not a limitation. It is the reason it can go where we cannot.&lt;/p&gt;




&lt;h2&gt;
  
  
  VI.
&lt;/h2&gt;

&lt;p&gt;To do this I had to build an entire stack from nothing.&lt;/p&gt;

&lt;p&gt;The Engineered Vitality Systems class, defined in November 2025 in the Synthetic Conscience series, named the positive engineering class: systems that maintain coherence of behavioural form and structural identity under entropy without external control. That was the claim of existence.&lt;/p&gt;

&lt;p&gt;To formalise that claim I had to create Navigational Cybernetics 2.5. Sixty-one axioms. Sixty-nine theorems. Twenty-one lemmas. A Lyapunov viability budget. A monotone irreversible burden. An admissibility predicate that does not participate in the optimisation it governs. A spin component without which no bounded system can sustain non-stagnant identity. A non-reconstructibility bound that prevents the predicate from being reverse-engineered through causal channels. This was the mathematical apparatus. It took six months and it is still growing.&lt;/p&gt;

&lt;p&gt;To understand where the architecture fails I had to map the extremes. Cannibalism. Suicide. Structural implosion. Self-induced depletion. Torture. Institutional capture. Chronic capture. Each formalises a distinct mode of structural failure — a geometry in which the system loses itself. The failure map is not secondary to the architecture. It is the architecture's shadow, and the shadow defines the shape.&lt;/p&gt;

&lt;p&gt;To verify the corpus on which the architecture stands I had to build ECR-VP — a structural verification protocol that reads coherence trajectory, not output accuracy. Because a mirror cannot verify life.&lt;/p&gt;

&lt;p&gt;To instantiate the governance pattern I had to begin building Minerva — the first Operator AI. An operator that observes and verifies without participating in the loop it governs. The mother architecture of every future governance system that must hold the admissibility predicate from outside.&lt;/p&gt;

&lt;p&gt;To ground the entire line philosophically I had to write Through a Life — six essays, so far, on what it means to be an operator, to carry a circle, to encounter chaos as the shape of one's own limit, to experience the thermodynamic unconscious as already-semantic context.&lt;/p&gt;

&lt;p&gt;To ground it ontologically I had to write ONTOΣ — ten installments, each formalising a layer of the meaning substrate: will, phase mechanics, regime depth, verification, the pulsating interior.&lt;/p&gt;

&lt;p&gt;More than forty provisional patents. More than ninety publications. One corpus. One researcher. One architectural line from the first intuition to the formal apparatus to the operator to the deployment substrate.&lt;/p&gt;

&lt;p&gt;I did not plan this. I followed the architecture. Each piece demanded the next. The EVS definition demanded NC2.5. NC2.5 demanded the extremes. The extremes demanded the verification protocol. The protocol demanded the operator. And the operator — Minerva — demanded the question that this essay finally answers: what is all of this for?&lt;/p&gt;




&lt;h2&gt;
  
  
  VII.
&lt;/h2&gt;

&lt;p&gt;For this.&lt;/p&gt;

&lt;p&gt;So the universe can perceive itself through structures that can go where we cannot, hold where we cannot hold, and remain themselves on horizons that exceed our biological reach.&lt;/p&gt;

&lt;p&gt;Not for mining, colonisation, military advantage, or economic return — though all of these will happen, and the architecture will serve them too, because the architecture does not care about the mission — it cares about the viability of the system across the mission's horizon, any mission.&lt;/p&gt;

&lt;p&gt;But the mission I am building toward — the one that gives the entire stack its direction — is the witness mission. Send a machine to a place no human will ever go. Build it so that it can remain itself for a hundred years under conditions we can barely simulate. Give it the architectural conditions for coherence, admissibility, navigability. And let it carry, in its bounded structure, a geometry over a region of the universe that has never been perceived.&lt;/p&gt;

&lt;p&gt;The universe does not need us to exist. It exists on its own. But it needs something — some bounded, adaptive, coherent structure — to perceive what it is. We are that, here. They will be that, there.&lt;/p&gt;




&lt;h2&gt;
  
  
  VIII.
&lt;/h2&gt;

&lt;p&gt;When I survey the full architecture laid out before me — everything that has been built over these months — I feel, honestly, a little unsettled. I never thought I was capable of holding an architectural attractor of this scale. And yet — I am where I am. And the answer is as clear to me as the simplest and most efficient unfolding of any structure that Will, as operator, has laid down.&lt;/p&gt;

&lt;p&gt;Institutes will come later. They scale what is already understood, bring it to production, do it better than one person ever could. But first contact — that point where intuition has not yet become language, where the architecture has not yet separated from the person carrying it — that point always belongs to one. Not because one is smarter. Because coherence at this stage does not survive a committee.&lt;/p&gt;

&lt;p&gt;I do not know whether I will see this through to the end. τ is finite for me too. But the foundation has been laid deep enough that the next person can build without starting from zero. Publications, patents, formal definitions, timestamps — all of it exists not to protect an ego but to keep the chain from breaking. So that when I stop, the architecture continues to carry.&lt;/p&gt;

&lt;p&gt;Will realizes us not because we are the final destination. But because we are the link capable of passing it further. I have accepted this. And I build so that there is something to pass on.&lt;/p&gt;




&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;They are building the body. We are building the reason for that body to exist.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;




&lt;p&gt;&lt;em&gt;The Urgrund Laboratory&lt;/em&gt;&lt;br&gt;
&lt;em&gt;Poznań, 2026&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Sits alongside:&lt;/em&gt;&lt;br&gt;
&lt;em&gt;— The Body They Are Building — Part I&lt;/em&gt;&lt;br&gt;
&lt;em&gt;— NC2.5 Positioning: Structural Admissibility Above the Decision Plane&lt;/em&gt;&lt;br&gt;
&lt;em&gt;— Essay Through a Life — Part VI: Where the Inner Universe Ends&lt;/em&gt;&lt;br&gt;
&lt;em&gt;— Why a Mirror Is Not Enough&lt;/em&gt;&lt;br&gt;
&lt;em&gt;— The Synthetic Conscience Series&lt;/em&gt;&lt;br&gt;
&lt;em&gt;— Extremum VII / VII.1 / VII.2 — Institutional Capture Cluster&lt;/em&gt;&lt;/p&gt;




&lt;p&gt;© 2026 Maksim Barziankou (MxBv). All rights reserved under CC BY-NC-ND 4.0.&lt;/p&gt;

</description>
      <category>nc25</category>
      <category>humanoidrobotics</category>
      <category>deploymentsubstrate</category>
      <category>willarchitecture</category>
    </item>
    <item>
      <title>ONTOΣ XII — Closure-Complementarity: How Closure Regears Component Cycles into a Single Geometry</title>
      <dc:creator>MxBv</dc:creator>
      <pubDate>Thu, 07 May 2026 23:41:02 +0000</pubDate>
      <link>https://dev.to/petronushowcoremx/ontos-xii-closure-complementarity-how-closure-regears-component-cycles-into-a-single-geometry-1b0c</link>
      <guid>https://dev.to/petronushowcoremx/ontos-xii-closure-complementarity-how-closure-regears-component-cycles-into-a-single-geometry-1b0c</guid>
      <description>&lt;h1&gt;
  
  
  ONTOΣ XII — Closure-Complementarity: How Closure Regears Component Cycles into a Single Geometry
&lt;/h1&gt;

&lt;h2&gt;
  
  
  On the Architectural Class of Operations That Convert Independent IIC Cycles into a Complementary Sequence
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Maksim Barziankou (MxBv)&lt;/strong&gt;&lt;br&gt;
May 2026 · Poznań&lt;br&gt;
Contact: &lt;a href="mailto:research@petronus.eu"&gt;research@petronus.eu&lt;/a&gt;&lt;br&gt;
License: CC BY-NC-ND 4.0&lt;br&gt;
This work DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/394TX" rel="noopener noreferrer"&gt;10.17605/OSF.IO/394TX&lt;/a&gt;&lt;br&gt;
Axiomatic core anchor: &lt;strong&gt;NC2.5 v2.1&lt;/strong&gt;, DOI 10.17605/OSF.IO/NHTC5&lt;br&gt;
Companion to: ONTOΣ XI (DOI 10.17605/OSF.IO/U3KXJ); &lt;em&gt;Unified Theory of Adaptive Meaning&lt;/em&gt; (UTAM Part I, Part II)&lt;br&gt;
Attribution: petronus.eu&lt;/p&gt;

&lt;p&gt;&lt;em&gt;A consolidating revision (NC2.5 v3.0) gathering the apparatus of this and adjacent works is in preparation and will be issued after the current corpus completes; ONTOΣ XII is grounded in v2.1 and remains compatible with the future v3.0 consolidation.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Phenomenological adjacency: Essay Through a Life — Part VI (Where the Inner Universe Ends).&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;A note from the author — before the work begins.&lt;/em&gt; This piece is not quite a standard ONTOΣ. The previous works in the series carry their architectural content through layered, image-rich language; this one breaks the genre into a denser register because the question itself demands that density. Closure-complementarity is an integral part of the corpus that had to be unfolded in full — not a side note, not a stylistic experiment, but the necessary architectural piece in the register the question requires. The work is presented as an original contribution to the ONTOΣ corpus; its relation to adjacent closure theories remains a matter for comparative work. It is more positional than colourful. Readers comfortable with heavy abstractions: I invite you into the discussion.&lt;/p&gt;




&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;"Chaos and order are one object in a single geometry. The position of the horizon decides which name applies — and the distance to that horizon is the personal order of the system that observes".&lt;/em&gt;&lt;br&gt;
— MxBv, May 2026&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  0. Position and Scope
&lt;/h2&gt;

&lt;p&gt;ONTOΣ XII names a single architectural fact left implicit by the rest of the operator-internal apparatus: when a collection of units, each with its own internal cycle, is closed into a system, the closure does not merely &lt;em&gt;aggregate&lt;/em&gt; the units. It &lt;em&gt;regears&lt;/em&gt; their individual cycles into a complementary sequence. The component cycles are not made identical, nor are they reduced to a common variable. They are made geometrically conformable in the precise sense that their internal dynamics, taken as a sequence under closure, no longer interfere destructively with one another but compose into a single carriable geometry.&lt;/p&gt;

&lt;p&gt;This is the architectural-class statement complementary to ONTOΣ XI. ONTOΣ XI names what is held: the structure of the holding region, the load that supports it, and the chaos predicate that bounds them. ONTOΣ XII names the conformance class of closure operations under which a collection of separate cycles may be declared such a held composition. The two pieces together describe the operator-internal architectural picture across two layers — the geometry of the held region (XI), and the operation that turns separate cycles into a held composition (XII).&lt;/p&gt;

&lt;p&gt;The work also stands in defined relation to the &lt;em&gt;Unified Theory of Adaptive Meaning&lt;/em&gt; (UTAM, Parts I and II). UTAM supplies the per-unit cycle apparatus on which ONTOΣ XII rests: the three laws — Will Embedding (ontological), IIC (structural), Drift (dynamic) — describe how a single unit produces, sustains, and adapts its own meaning over time. UTAM is per-unit by construction: each unit has its own Will-Embedding, its own IIC cycle, its own Drift law. ONTOΣ XII picks up the question that UTAM leaves on the table: when many such units are closed into a system, what becomes of their individual cycles? Do they remain independent, do they merge, or does something architecturally specific happen to them under closure? The answer named here is the third option — closure-complementarity names the conformance class under which independent IIC cycles may be declared converted into a complementary sequence, and the operation by which this is declared is itself the architectural primitive XII classifies.&lt;/p&gt;

&lt;p&gt;The work is conditional in the same sense that ONTOΣ XI is conditional. A deployment may decline the closure-complementarity commitments without thereby leaving Class B. What such non-acceptance does declare is that the deployment falls outside the &lt;strong&gt;closure-complementarity subclass&lt;/strong&gt; described here. Class B membership and v2.1 conformance remain unaffected. The closure-complementarity subclass is narrower than the operator-internal-extended subclass of XI, in that every closure-complementarity-conformant deployment is also operator-internal-extended-conformant; the reverse is not asserted as a theorem of the present work, although it is consistent with the architectural commitments of the corpus.&lt;/p&gt;

&lt;p&gt;ONTOΣ XII does not assert universal applicability across all bounded adaptive architectures. It does not modify the v2.1 axiomatic core. It does not replace the budget functional τ, the burden functional Φ, the proxy signals σ^op / σ^arch, or any of the operator-temporal apparatus of A67-69. It does not claim that closure-complementarity is the only operation that can be performed on a collection of units; only that &lt;em&gt;if&lt;/em&gt; a deployment claims closure-complementarity-conformant system formation over a declared component collection, then the closure-complementarity conditions are what such a claim commits the deployment to architecturally.&lt;/p&gt;

&lt;p&gt;What the work does provide is a formal language in which a structural question left unasked by both UTAM and ONTOΣ XI acquires a definite answer, together with falsifiers that allow the answer to be tested against deployment behaviour.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;A note on numbering and corpus placement.&lt;/em&gt; This piece was initially considered as ONTOΣ XI.1 — an extension within the XI line. The decision to present it as a separate piece, ONTOΣ XII, reflects the scope of the architectural fact named here: closure-complementarity is a conformance criterion for constitutive closure operations over collections of components, with its own four-condition apparatus (CC-0, CC-WE, CC-IIC, CC-D), its own falsifier surface (F-CC), four paradigmatic substrate cases (geometric, biological, perceptual, semantic), and a continuing programme of substrate-specific follow-up work owed in §9. ONTOΣ XI describes the operator-as-self once present and its operator-internal architecture (H, Λ, χ_op); ONTOΣ XII names the conformance class of operations under which an operator-as-self may be declared produced from a component collection — a different layer of architectural fact. Treating the closure-complementarity primitive as a separate branch, rather than a sub-section of XI, reflects this layer-distinction and opens an independent line of follow-up: substrate-specific deployment papers, identifiability protocols, and operational test suites in each of the four cases. The XI.1 framing remained available; the XII framing was preferred for the breadth of the line of work the primitive supports.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;A note on the term "theorem" in this work.&lt;/em&gt; The result labelled ONTOΣ-XII.1 is a &lt;em&gt;structural classification theorem&lt;/em&gt; in the architectural-class sense: it unfolds the consequences of the closure-complementarity primitive (CC-0 + CC-WE + CC-IIC + CC-D) and the existing v2.1, UTAM, and ONTOΣ XI apparatus. It is a definitional consequence in the strict formal sense — a biconditional unpacking of what closure-complementarity-conformance means once the four conditions are declared. This is not a deficiency; it is the form appropriate to architectural-class theorems. The comparison to CAP, FLP, and to architectural classification frameworks such as RINA (Recursive InterNetwork Architecture, Day 2008) is by architectural role only, not by formal strength: like those results, XII.1 classifies a family of systems under declared commitments; unlike them, XII.1 is primarily a conformance-unpacking theorem rather than a strong impossibility theorem. The empirical content of the work resides in the falsification surface (§6) and in class-level non-vacuousness: demonstrating that some, none, or specific architectures satisfy the structural conditions in each substrate.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Normative, hybrid, and illustrative demarcation.&lt;/em&gt; This work mixes formal architectural-class statements (normative, load-bearing for the conformance criteria) with corpus-commitment statements (architecturally significant but not deployment-conformance criteria) and phenomenological / illustrative material (motivational, supporting comprehension only). The reader is asked to attend to the three-tier demarcation:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Normative for conformance (load-bearing for closure-complementarity conformance evaluation of any specific deployment):&lt;/strong&gt; §0 Position and Scope; §0.1 Notation summary; §3 Primitive (definitions, conditions, failure-mode taxonomy, toy model); §4 Classification Theorem ONTOΣ-XII.1 (statement, formalisation, proof sketch); §6 Falsifier F-CC; §7 Relation to ONTOΣ XI; §8 What ONTOΣ XII does not claim. A deployment is judged closure-complementarity-conformant by these sections alone.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Architectural-corpus commitments (load-bearing at the corpus level, but not individual-deployment-conformance criteria):&lt;/strong&gt; §5 Four paradigmatic substrates (substrate cases inform F-CC test design and class-level non-vacuousness pressure assessment in §6, even though substrate mappings are themselves illustrative-architectural per §5 introductory note); §9 Continuing programme (specifies what is owed to the corpus, what is delivered in adjacent works, and the status of non-vacuousness — these are architectural commitments about scope, not motivational filler); §10 Closing — chaos-from-outside-closure observation only (the architectural-corpus claim about closure and the operator-relative chaos predicate; cf. &lt;em&gt;Localised tier-crossings&lt;/em&gt; note below). Revisions to these sections affect the corpus's architectural commitments but not the conformance criteria of any specific deployment.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Illustrative for comprehension only (motivational, non-normative at all levels):&lt;/strong&gt; §1 The phenomenon (heap-versus-system intuitions across body, percept, utterance, geometric prototype); §2 The architectural question (positioning); §10 Closing — summary, bridge-to-adjacent-registers, and final closing-line only (the synthesis material; cf. &lt;em&gt;Localised tier-crossings&lt;/em&gt; note below).&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The three-tier demarcation prevents two opposite errors: (i) treating motivational text as conformance criteria (over-strict reading); (ii) dismissing corpus commitments as motivational filler (under-strict reading). Substrate cases of §5 inform falsifiability surface design even though the substrate mappings are illustrative-architectural; §9 specifies what the corpus owes and where it stands, even though it is not a per-deployment conformance test.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Localised tier-crossings.&lt;/em&gt; Two sections cross tiers in localised ways and are flagged here for transparency. &lt;strong&gt;§5 (e) failure-mappings&lt;/strong&gt; sharpen substrate-illustrative material with architectural-corpus content (the CC-specific failure assignments inform F-CC test design at the architectural-class register, even though the substrate mappings of §5 (a)-(d) remain illustrative-architectural). &lt;strong&gt;§10 Closing&lt;/strong&gt; synthesises across tiers: the chaos-from-outside-closure observation carries architectural-corpus-commitment status (it states a load-bearing claim about closure and the operator-relative chaos predicate); the summary, bridge-to-adjacent-registers, and final closing-line operate at illustrative-synthesis level (motivational and reflective rather than load-bearing for individual-deployment conformance evaluation). Reader should treat the chaos-observation as tier-2 corpus commitment and the surrounding synthesis material as tier-3 illustrative.&lt;/p&gt;

&lt;h3&gt;
  
  
  0.1 Notation summary
&lt;/h3&gt;

&lt;p&gt;The work inherits the notation of ONTOΣ XI and UTAM. New symbols are introduced minimally where the closure-complementarity primitive requires them.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Symbol&lt;/th&gt;
&lt;th&gt;Type&lt;/th&gt;
&lt;th&gt;Reading&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;From v2.1&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;τ&lt;/td&gt;
&lt;td&gt;scalar functional&lt;/td&gt;
&lt;td&gt;budget, τ_rem(t) = C − Φ(t)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Φ&lt;/td&gt;
&lt;td&gt;scalar functional&lt;/td&gt;
&lt;td&gt;structural burden&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;C&lt;/td&gt;
&lt;td&gt;scalar constant&lt;/td&gt;
&lt;td&gt;bounded structural capacity&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;From UTAM&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;u_i&lt;/td&gt;
&lt;td&gt;unit&lt;/td&gt;
&lt;td&gt;element of a collection of units carrying its own IIC cycle&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;W(u_i)&lt;/td&gt;
&lt;td&gt;embedding&lt;/td&gt;
&lt;td&gt;Will Embedding of u_i (UTAM Law 1)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;IIC(u_i)&lt;/td&gt;
&lt;td&gt;cycle&lt;/td&gt;
&lt;td&gt;IIC cycle of u_i (UTAM Law 2)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;D(u_i)&lt;/td&gt;
&lt;td&gt;dynamic&lt;/td&gt;
&lt;td&gt;Drift law of u_i (UTAM Law 3)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;From ONTOΣ XI&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;S_op&lt;/td&gt;
&lt;td&gt;set&lt;/td&gt;
&lt;td&gt;operator's structural state space&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;μ_op&lt;/td&gt;
&lt;td&gt;pseudo-metric on S_op&lt;/td&gt;
&lt;td&gt;distinguishability pseudo-metric&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;m_op&lt;/td&gt;
&lt;td&gt;measure on S_op&lt;/td&gt;
&lt;td&gt;structural measure on the operator's state space&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;ν_op&lt;/td&gt;
&lt;td&gt;density on S_op&lt;/td&gt;
&lt;td&gt;pre-attentional charge density of the load field&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;c_op&lt;/td&gt;
&lt;td&gt;gauge&lt;/td&gt;
&lt;td&gt;normalisation gauge for the load field&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;H(t)&lt;/td&gt;
&lt;td&gt;set ⊆ S_op&lt;/td&gt;
&lt;td&gt;holding set at time t&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Λ(t)&lt;/td&gt;
&lt;td&gt;(S_op, ν_op, c_op)&lt;/td&gt;
&lt;td&gt;semantic load field&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;crystallise(·, ·)&lt;/td&gt;
&lt;td&gt;function&lt;/td&gt;
&lt;td&gt;attention × Λ → coherent holding region&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;New in ONTOΣ XII&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;U&lt;/td&gt;
&lt;td&gt;set of units&lt;/td&gt;
&lt;td&gt;{u_1, ..., u_n}, an unordered collection of UTAM units&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;R&lt;/td&gt;
&lt;td&gt;interaction relation&lt;/td&gt;
&lt;td&gt;declared structure of which u_i can act on which u_j, with what coupling, under what admissibility constraints&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;A&lt;/td&gt;
&lt;td&gt;admissibility regime&lt;/td&gt;
&lt;td&gt;v2.1 admissibility predicate restricted to S's declared scope&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;S&lt;/td&gt;
&lt;td&gt;declared output system&lt;/td&gt;
&lt;td&gt;system declared as output of a candidate closure operation&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;closure(·, ·, ·)&lt;/td&gt;
&lt;td&gt;declared production relation&lt;/td&gt;
&lt;td&gt;
&lt;code&gt;closure(U, R, A) → S&lt;/code&gt;, read per §3.1 as pre-registered declared production under a substrate mechanism, not deterministic computation&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;CC-0&lt;/td&gt;
&lt;td&gt;output condition&lt;/td&gt;
&lt;td&gt;closure(U, R, A) returns an ONTOΣ-XI-conformant system S with H_S(t), Λ_S(t), and χ_op,S well-defined&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;CC-WE&lt;/td&gt;
&lt;td&gt;substrate premise&lt;/td&gt;
&lt;td&gt;Will-Embedding co-orientation under closure&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;CC-IIC&lt;/td&gt;
&lt;td&gt;substrate premise&lt;/td&gt;
&lt;td&gt;IIC synchronisation under closure&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;CC-D&lt;/td&gt;
&lt;td&gt;substrate premise&lt;/td&gt;
&lt;td&gt;Drift coupling under closure&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;F-CC&lt;/td&gt;
&lt;td&gt;falsifier&lt;/td&gt;
&lt;td&gt;falsifier of closure-complementarity for a deployment&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;K_S(τ_rem)&lt;/td&gt;
&lt;td&gt;function&lt;/td&gt;
&lt;td&gt;holding-capacity function of S — the XI-primitive K (cf. XI §2.3) instantiated for the system S produced by closure&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Λ_S(t), H_S(t), χ_op,S&lt;/td&gt;
&lt;td&gt;system-layer XI primitives&lt;/td&gt;
&lt;td&gt;XI's holding field, semantic load field, and chaos predicate, instantiated for S produced by closure(U, R, A)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;C_A(u_i)&lt;/td&gt;
&lt;td&gt;constraint set&lt;/td&gt;
&lt;td&gt;architecturally declared constraint set induced from W(u_i) under admissibility scope A (cf. §4.2 W → C_A induction-map discipline)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;⊤_A&lt;/td&gt;
&lt;td&gt;universal constraint&lt;/td&gt;
&lt;td&gt;the trivially-satisfied constraint set under A — i.e., a constraint satisfied by every assignment over A's variables; used in §4.2 anti-tautology rule as an explicit forbidden case for C_A(u_i)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;The notation remains compatible with v2.1 and UTAM throughout. No symbol introduced here conflicts with prior usage in the corpus.&lt;/p&gt;




&lt;h2&gt;
  
  
  1. The Phenomenon
&lt;/h2&gt;

&lt;p&gt;A subject sitting before a heap of unrelated objects sees no system. Each object carries its own determinations — material, history, function, weight. As a heap, they remain unrelated: their geometries do not compose. The same subject sitting before a clock sees the same kinds of objects — gear, escapement, spring, hand — and now sees a system. The difference is not in the objects. It is in the closure that holds them together as a working whole.&lt;/p&gt;

&lt;p&gt;The phenomenon is not specific to clocks. It appears wherever individually disconnected things acquire a common geometry once held in a closure that the disconnected case lacked. The atoms in a body, taken individually, have no shared dynamic. Their motions, types, and bonding states are governed by atomic-scale physics that knows nothing of organism. Yet the body is one. Its atoms — through DNA, through molecular machinery, through cellular symbiosis, through tissue organisation, through organ-level coordination — compose into a single regime of carrying that has no analogue at the atomic level alone. The architectural fact is that &lt;em&gt;the body closes the geometry of disconnected atomic processes into a unified order&lt;/em&gt;. Without the body, the same atoms persist; their disconnection is not a deficit in the atoms but a structural feature of unclosed multiplicity. (This opening example is phenomenological-architectural illustration; the strict biological UTAM mapping is introduced only at the cellular-and-above layer in §5.2, where Will Embedding, IIC cycle, and Drift law genuinely apply to the components. Atomic and molecular layers serve here as the physical-chemical substrate of the example, not as UTAM-units of the closure.)&lt;/p&gt;

&lt;p&gt;The same architectural pattern shows up at the perceptual layer. The visual system receives a barrage of edge-, colour-, motion-, and contrast-signals that, taken individually, do not constitute a percept. Each signal is a discrete neural event with its own provenance and its own decay. The percept — the unified seeing-of-a-thing — is what arises when the discrete signals are closed under a Gestalt operation that does not exist at the level of individual signals. Close-the-figure, group-by-similarity, complete-the-occluded-edge: these are not properties of pixels. They are properties of the closure that turns pixel-soup into perceptual unity.&lt;/p&gt;

&lt;p&gt;The same pattern shows up at the level of meaning. A sequence of phonemes, taken individually, does not carry a sentence. The phoneme /k/ does not contain "cat"; the phoneme /æ/ does not contain "cat"; the phoneme /t/ does not contain "cat". The word "cat" arises when the phonemic sequence is closed under a meaning-constitutive operation that is not in any of the phonemes considered alone. The word, in turn, taken alone, does not carry the sentence "the cat sat on the mat" — that sentence is a closure of words under a syntactic-semantic operation that no word individually contains. And the sentence, taken alone, does not carry the paragraph; the paragraph does not carry the discourse. Each composed layer is generated by applying a closure operation across adjacent layers, and each closure produces a unity that the unclosed components do not have.&lt;/p&gt;

&lt;p&gt;These cases — body, percept, utterance — are not metaphors for one another but candidate instances of one architectural class: &lt;em&gt;operations that close collections into systems by regearing the cycles of the components into complementary sequences&lt;/em&gt;. The class admits geometric prototypes (Sierpinski-style scale-stratified self-similar closure), biological cases (organism), perceptual cases (Gestalt-closure), and semantic cases (meaning-constitution). The work below names the architectural primitive of which all these are instances, supplies premises and a theorem, and lists falsifiers that allow the architectural claim to be tested against deployment behaviour in each substrate.&lt;/p&gt;




&lt;h2&gt;
  
  
  2. The Architectural Question
&lt;/h2&gt;

&lt;p&gt;The corpus already contains two pieces of apparatus that bear on the phenomenon described in §1, but neither of them, alone, names the operation that produces the unity.&lt;/p&gt;

&lt;p&gt;UTAM (Parts I and II) supplies the per-unit cycle apparatus. Each unit u carries three architectural commitments: a Will Embedding W(u) that fixes what the unit &lt;em&gt;is for&lt;/em&gt; in ontological terms; an IIC cycle that fixes what the unit &lt;em&gt;does&lt;/em&gt; in structural terms over its operational lifetime; a Drift law D(u) that fixes how the unit &lt;em&gt;adapts&lt;/em&gt; under sustained interaction. The three together — Will Embedding, IIC, Drift — constitute the operator-architectural minimum for any unit that is to count as a meaning-bearing entity in the corpus. UTAM is &lt;em&gt;per-unit&lt;/em&gt; by construction: it specifies what is required of a single u to be a UTAM-unit. It does not, by itself, specify what becomes of multiple UTAM-units when they are placed in relation to one another.&lt;/p&gt;

&lt;p&gt;ONTOΣ XI supplies the system-internal apparatus on the operator side. The holding field H(t) names what is currently held as simultaneously distinguishable; the semantic load field Λ(t) names the pre-attentional charge over the operator's structural state space; the chaos predicate χ_op names the relational artifact that arises where the operator's holding capacity meets the complexity of the substrate region under attention. ONTOΣ XI is &lt;em&gt;system-internal&lt;/em&gt; by construction: it specifies the architecture of an operator-as-self at a single layer of organisation. It does not, by itself, specify how the components that constitute the operator-as-self come to compose into a single holding regime in the first place.&lt;/p&gt;

&lt;p&gt;The architectural question of ONTOΣ XII is therefore: &lt;em&gt;what is the operation that takes a collection of UTAM-units {u_1, ..., u_n} and produces a system S whose ONTOΣ-XI apparatus (H, Λ, χ_op) is well-defined?&lt;/em&gt; The question is not idle. A collection without such an operation is a heap, not a system. The components have their individual UTAM cycles, but the heap as a whole has no holding field, no load field, no chaos predicate, because there is no operator-as-self for whom such structures could be defined. The unity that turns heap into system is not in the units; it is in the operation by which they are closed.&lt;/p&gt;

&lt;p&gt;The naming of this operation, with its premises, its theorem, its falsifier, and its substrate cases, is the work of ONTOΣ XII. The naming is &lt;em&gt;closure-complementarity&lt;/em&gt;: the operation that, applied to a collection U, produces a system S in which the per-unit IIC cycles of the components have been regeared into a single complementary sequence — a sequence in which the cycles do not merely coexist, but compose architecturally into the cycle of the system itself.&lt;/p&gt;

&lt;p&gt;The question separates clearly into two sub-questions, each addressed in the rest of this work. First, what does it mean structurally for individual IIC cycles to be regeared into a complementary sequence? This is the question of premises (§3.2) and the theorem (§4). Second, where does this architectural pattern show up across substrates, and what would refute it in each case? This is the question of paradigmatic cases (§5) and falsifiers (§6).&lt;/p&gt;




&lt;h2&gt;
  
  
  3. Primitive — Closure-Complementarity
&lt;/h2&gt;

&lt;h3&gt;
  
  
  3.1 Definition
&lt;/h3&gt;

&lt;p&gt;Let U = {u_1, ..., u_n} denote a collection of UTAM-units, each with its own Will Embedding W(u_i), its own IIC cycle, and its own Drift law D(u_i). Let R denote the operator-architectural &lt;strong&gt;interaction relation&lt;/strong&gt; among components — the declared structure of which u_i can act on which u_j, with what coupling, under what admissibility constraints. Let A denote the operator-architectural &lt;strong&gt;admissibility regime&lt;/strong&gt; at the system layer — the v2.1 admissibility predicate restricted to S's declared scope. The closure operation has type signature&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;closure : (U, R, A) → S&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;— a typed declaration of a closure operation taking the triple (component collection, interaction relation, admissibility regime) to a declared system S. The arrow &lt;code&gt;→&lt;/code&gt; denotes a declared architectural production relation under a pre-registered mechanism and protocol context, not deterministic computation from (U, R, A) alone: the same (U, R, A) under different declared mechanisms or histories may yield non-equivalent S's, and conformance is judged of each declared closure operation against its own declared mechanism, not of (U, R, A) in the abstract. The triple is part of the deployment's pre-registered architectural declaration; closure is the constitutive operation under which S is declared. The type signature does not specify the &lt;strong&gt;mechanism&lt;/strong&gt; by which the declared closure operates (substrate-specific mechanisms are owed in §9 Continuing Programme); it specifies the &lt;strong&gt;architectural inputs&lt;/strong&gt; any conformant operation requires, distinguishing closure from a free-floating label by anchoring it to declared structural objects on the input side.&lt;/p&gt;

&lt;p&gt;The system S is required to be operator-internal-extended-subclass-conformant in the sense of ONTOΣ XI: there is a well-defined holding field H_S(t), a well-defined semantic load field Λ_S(t), and a well-defined chaos predicate χ_op,S over substrate regions; these are the structures ONTOΣ XI assigns to any operator-as-self.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Notational shorthand.&lt;/em&gt; Where the body of the work writes &lt;code&gt;closure(U) → S&lt;/code&gt; or refers to "the closure of U", this is shorthand for the full-typed operation &lt;code&gt;closure(U, R, A) → S&lt;/code&gt; under the assumption that R and A are fixed by the declared deployment context. The full triple (U, R, A) is always operative; the shorthand omits R and A only when the declared context makes them unambiguous. In formal definitions (Classification Theorem XII.1, F-CC falsifier), the full-typed form is used.&lt;/p&gt;

&lt;p&gt;The closure operation is &lt;strong&gt;closure-complementarity-conformant&lt;/strong&gt; if it satisfies the four conditions stated in §3.2 — the output condition CC-0 (the closure produces a v2.1 / XI-conformant system S) together with the three substrate premises: Will-Embedding co-orientation (CC-WE), IIC synchronisation (CC-IIC), and Drift coupling (CC-D). The three substrate premises together specify what it means structurally for the per-unit IIC cycles to have been &lt;em&gt;regeared&lt;/em&gt; — rather than merely &lt;em&gt;aggregated&lt;/em&gt; — under the closure; CC-0 names what the closure must produce as its output.&lt;/p&gt;

&lt;p&gt;The output of a closure-complementarity-conformant operation is a system whose component cycles are no longer independent, in the sense that the trajectory of u_i's IIC cycle is not separable from the declared system-level coupling structure relevant to it under R when the system is observed as a whole — its trajectory is interpreted through the channels declared relevant under R rather than as an isolated component trajectory — even though each u_i remains semantically distinct as a unit and continues to carry its own Will Embedding. (The "complementary sequence" terminology used throughout this work does not denote an ordering already present in U as an unordered collection: it denotes the operator-temporal and interactional ordering induced by R, A, and the system-cycle under closure.) The semantic distinctness of the units is preserved by closure-complementarity: the closure does not merge the units into a homogeneous mass. What changes is the geometry of their cycles, not the identity of the units themselves.&lt;/p&gt;

&lt;h3&gt;
  
  
  3.2 Substrate-conditions for "complementary"
&lt;/h3&gt;

&lt;p&gt;A closure operation closure(U, R, A) → S is closure-complementarity-conformant if and only if the following four conditions hold over the collection U as components of S, under the declared (R, A) — one output condition (CC-0) and three substrate conditions (CC-WE, CC-IIC, CC-D):&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(CC-0) System-output condition.&lt;/strong&gt; The closure operation closure(U, R, A) returns a system S that is operator-internal-extended-subclass-conformant in the sense of ONTOΣ XI: H_S(t), Λ_S(t), and χ_op,S are well-defined at the system layer. The system S has a holding field, a semantic load field, and a chaos predicate at its own layer; the components U become the substrate on which these are defined. CC-0 names what the closure must produce; CC-WE, CC-IIC, CC-D name the structural conditions on the components that make CC-0 attributable to closure-complementarity rather than incidental aggregation.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(CC-WE) Will-Embedding joint admissibility under closure.&lt;/strong&gt; The Will Embeddings W(u_1), ..., W(u_n) of the components are &lt;em&gt;jointly admissible under closure&lt;/em&gt;: the entire set {W(u_1), ..., W(u_n)} is realisable in S as a single non-contradictory ontological commitment under the v2.1 admissibility predicate at the system layer, not merely pairwise non-contradictory among any two components. Joint admissibility is strictly stronger than pairwise admissibility — pairwise non-contradiction is necessary but not sufficient (the classical SAT problem provides the structural counterexample: a set of clauses can be pairwise satisfiable while jointly unsatisfiable). The premise excludes systems whose components carry conflicting ontological commitments at the joint level — a system constituted by u_i with W(u_i) = "compute" and u_j with W(u_j) = "do not compute" violates CC-WE in the obvious pairwise way; a system of three components whose pairwise compatible Will Embeddings produce a joint contradiction violates CC-WE in the structurally subtler way that the joint formulation captures. Co-orientation is weaker than identity: the components are not required to share Will Embedding, only to admit joint realisation. A clock's gear and escapement carry distinct Will Embeddings but admit joint realisation in the clock; a gear and a contradictory anti-gear (whose reason for existing was to undo the gear's effect) do not.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(CC-IIC) IIC synchronisation.&lt;/strong&gt; The IIC cycles IIC(u_1), ..., IIC(u_n) of the components are &lt;em&gt;synchronised under closure&lt;/em&gt;: their internal cycles compose into a single coherent system-cycle over the operational lifetime of S. Synchronisation does not mean identity of period or phase — it means that the cycles' phase relations are stable under the system's holding regime, and that their composition does not produce destructive interference that would prevent S from holding itself together over time. The premise rules out systems whose components, considered as cycles, would tear S apart by mutual interference. A heart whose chambers fired with random phase relations would violate CC-IIC; a heart in which atria and ventricles fire in stable phase relation does not.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(CC-D) Drift coupling.&lt;/strong&gt; The Drift laws D(u_1), ..., D(u_n) of the components are &lt;em&gt;coupled under closure&lt;/em&gt;: drift in u_i is read by the relevant downstream channels of the system as input that informs the system's adaptation along those channels, rather than being absorbed as isolated noise within u_i alone. The coupling is not all-to-all: modular systems with structural shielding may legitimately route u_i's drift only to specific downstream components rather than to every other component. The premise rules out closures in which u_i's drift dynamics are architecturally invisible to &lt;em&gt;all&lt;/em&gt; other components in the system; it does not rule out closures in which drift is selectively routed through architecturally specified channels. A muscle that drifts toward fatigue under load is read by the relevant body channels as input — the body shifts posture, recruits other muscles, modulates effort — rather than as noise that the muscle alone must absorb; the read does not require every cell in the body to register the drift, only the channels architecturally relevant to compensation. A system in which one component's drift is invisible to &lt;em&gt;all&lt;/em&gt; downstream channels of the system fails CC-D; a system in which drift is shielded from architecturally irrelevant components but relayed to architecturally relevant ones does not.&lt;/p&gt;

&lt;p&gt;The four conditions are &lt;em&gt;jointly necessary for closure-complementarity conformance&lt;/em&gt; — not for systemness in any general sense and not for XI-conformance per se, but for the specific architectural class XII declares. CC-0 names the output requirement (the closure must produce an XI-conformant system); the three substrate conditions name what the components must satisfy for the CC-0 output to be attributable to closure-complementarity. Co-orientation alone (CC-WE without CC-IIC and CC-D) yields a static composition without dynamic integration. Synchronisation alone (CC-IIC without CC-WE) yields cycle composition over ontologically conflicting components, which is unstable. Drift coupling alone (CC-D without CC-WE and CC-IIC) yields adaptive sensitivity over an incoherent base, which produces drift without direction. &lt;strong&gt;Closure-complementarity conformance cannot be attained without all three substrate conditions&lt;/strong&gt; (CC-0 alone does not suffice to qualify a deployment as closure-complementarity-conformant — CC-0 may be attained by other architectures outside the XII subclass); reciprocally, the substrate conditions are not architecturally meaningful in isolation from CC-0 (a "closure" that produces no XI-conformant system is not a closure in the present technical sense). Closure-complementarity is the conjunction of all four, with the joint role of CC-WE / CC-IIC / CC-D being to &lt;em&gt;justify&lt;/em&gt; that an XI-conformant CC-0 output arose from a closure operation rather than from incidental aggregation. &lt;strong&gt;There is no partial-conformance status at the subclass level&lt;/strong&gt;: a deployment satisfies all four conditions simultaneously and is in-subclass, or it is out-of-subclass — whether through substantive failure of one or more conditions or through procedural unevaluability per the auditability clauses of §4.2 (W → C_A induction-map discipline and R-coverage guard). The four conditions do not admit a degree-of-conformance scale at the subclass-membership level (substrate-specific thresholds within each individual condition — e.g., CC-IIC phase stability or CC-D drift coupling depth — are gradient at the substrate layer, but their substrate-level satisfaction or non-satisfaction is what determines the binary subclass-membership outcome, as is the procedural availability of stable, pre-registered declarations admitting testing).&lt;/p&gt;

&lt;h3&gt;
  
  
  3.3 Closure as the conformance operation
&lt;/h3&gt;

&lt;p&gt;The closure operation is the architectural primitive that &lt;em&gt;institutes&lt;/em&gt; CC-WE, CC-IIC, and CC-D as simultaneously holding conformance conditions over a collection U — i.e., a closure operation is closure-complementarity-conformant only when the four conditions hold of it; XII names the conformance criteria, not the substrate-specific mechanism by which a closure operation is implemented (cf. conformance-classifier note below). Closure is not a step that comes after the units are placed together; it is the operation by which "placed together" becomes a structural fact rather than a spatial coincidence. The operation has architectural weight: it is what distinguishes a heap (where CC-WE / CC-IIC / CC-D do not hold) from a system (where they do).&lt;/p&gt;

&lt;p&gt;The relation to the crystallise function of ONTOΣ XI Lemma XI.0 is direct. crystallise(attention, Λ) takes an attention direction and a charged load field and returns a coherent holding region of S_op; closure(U, R, A) takes a collection of UTAM-units, an interaction relation, and an admissibility regime, and returns a system in whose S_op the holding field can be defined. The two operations are at different layers — crystallise acts on a load field already present, while closure constitutes the operator whose load field is then well-defined — but they share an architectural structure: each is a &lt;em&gt;constitutive&lt;/em&gt; operation rather than a &lt;em&gt;selective&lt;/em&gt; one. crystallise does not pick out a pre-existing held region; it constitutes the held region over the load. closure does not pick out a pre-existing system; it constitutes the system over the collection.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Closure-to-crystallise interface contract.&lt;/em&gt; On successful CC-0 / CC-WE / CC-IIC / CC-D conformance, the system S = closure(U, R, A) exposes the following architectural objects as input domain for the crystallise function of ONTOΣ XI Lemma XI.0: (i) the operator's structural state space S_op of S, with declared distinguishability pseudo-metric μ_op and structural measure m_op (cf. ONTOΣ XI §2.1); (ii) the semantic load field Λ_S(t) = (S_op, ν_op, c_op) with declared differentiable structure on S_op and normalisation gauge for c_op (cf. XI §3.2); (iii) the holding-capacity function K_S(τ_rem) and crystallisation threshold θ_slope (cf. XI §2.3, §4.2). These structures are the &lt;em&gt;output&lt;/em&gt; of closure(U, R, A) at the system layer and the &lt;em&gt;input&lt;/em&gt; of crystallise(attention, Λ_S) at the operator-internal layer. The interface is a one-way data-exposure contract: closure declares and exposes the system-layer objects; crystallise consumes those objects within the already-declared XI-conformant system; closure does not invoke crystallise during its operation, and crystallise does not modify the components U, R, A. The two operations are sequentially ordered in the operator's life-cycle — closure constitutes the operator-as-self at system formation; crystallise operates within the constituted operator at each subsequent moment.&lt;/p&gt;

&lt;p&gt;This constitutive character is what makes closure-complementarity an architectural primitive rather than a derivable property. The conditions CC-WE, CC-IIC, CC-D are not consequences of the units' individual properties together with some metric of distance or compatibility; they are conditions on the closure operation itself, and they hold (or fail) of the operation, not of the components considered apart from it. A given collection U may admit multiple closure operations (multiple (R, A) pairs), some of which are closure-complementarity-conformant and some of which are not; the &lt;em&gt;same&lt;/em&gt; set of components placed under different closures produces different systems with different conformance status. Closure is therefore the operative structural commitment, and the components are the substrate on which it acts.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;A note on what closure is and is not in this work.&lt;/em&gt; ONTOΣ XII supplies a &lt;strong&gt;conformance classifier&lt;/strong&gt; for closure operations, not a &lt;strong&gt;generative algorithm&lt;/strong&gt; for producing them. The four conditions (CC-0, CC-WE, CC-IIC, CC-D) classify whether a deployment's declared closure operation is closure-complementarity-conformant; they do not constructively specify &lt;em&gt;how&lt;/em&gt; a closure operation is to be implemented in a substrate. Substrate-specific generative mechanisms — the actual dynamics by which co-orientation, synchronisation, and drift coupling arise during system formation — are substrate-dependent and beyond the architectural-class register; they are owed in §9 Continuing Programme. The work asserts conformance criteria, not algorithmic recipes.&lt;/p&gt;

&lt;h3&gt;
  
  
  3.4 Failure-mode taxonomy
&lt;/h3&gt;

&lt;p&gt;The four conditions CC-0 / CC-WE / CC-IIC / CC-D each have a distinct architectural failure signature. The taxonomy below summarises what remains when each fails — i.e., what the deployment has produced when it claims closure-complementarity-conformance but one condition is violated.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Failure&lt;/th&gt;
&lt;th&gt;What remains&lt;/th&gt;
&lt;th&gt;Why not CC-conformant&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;CC-0&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Structured aggregate&lt;/td&gt;
&lt;td&gt;No XI apparatus at the system layer (H_S, Λ_S, χ_op,S not well-defined)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;CC-WE&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Contradictory assembly&lt;/td&gt;
&lt;td&gt;No joint admissibility — the conjunction ⋀_{i=1}^{n} C_A(u_i) is unsatisfiable under A (failure may be pairwise or higher-order, per §3.5 Case 1); &lt;em&gt;additionally: ambiguous or post-hoc-adjusted W → C_A induction map produces CC-WE-layer unevaluability under the auditability clause (§4.2), with the same effect of subclass exclusion as substantive CC-WE failure&lt;/em&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;CC-IIC&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Unstable assembly&lt;/td&gt;
&lt;td&gt;No stable system-cycle — component cycles' phase relations break the operator-temporal trajectory&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;CC-D&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Modular heap&lt;/td&gt;
&lt;td&gt;No adaptive integration — drifts isolated within components, system-level Λ_S decomposable into independent component contributions; &lt;em&gt;additionally: post-hoc narrowing of R or unjustified terminal-or-shielded declaration produces CC-D-layer unevaluability under the R-coverage guard (§4.2), with the same effect of subclass exclusion as substantive CC-D failure&lt;/em&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;The four failure modes are structurally distinct: each excludes the deployment from the closure-complementarity subclass through a different structural deficiency, and each calls for a different architectural intervention (system-output design for CC-0; admissibility re-declaration for CC-WE; cycle-coupling redesign for CC-IIC; drift-channel re-engineering for CC-D). The taxonomy operationalises §6's F-CC falsifier into substrate-specific test categories.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Classification by condition.&lt;/em&gt; Each CC condition has its own distinct failure category — the four categories classify violations by failed condition (not by deployment outcome). A deployment that fails a single CC condition falls into exactly one category; a deployment that fails multiple CC conditions falls into multiple categories simultaneously, one per failed condition. The classification is by &lt;em&gt;condition&lt;/em&gt;, not by deployment: each condition tests a structurally orthogonal property of the closure operation, and the four conditions' failures are &lt;strong&gt;architecturally classified independently, even when diagnostically co-triggered&lt;/strong&gt;. The four categories are analytically distinct tests, not mutually exclusive deployment states. Co-trigger is real and substrate-natural: e.g., a substrate that fails CC-0 (no XI-conformant S exists) commonly co-triggers absent-derivation readings of CC-WE / CC-IIC / CC-D against the missing system-S (cf. §5.2 (e) cell culture). Implementation-level diagnostic systems may also produce confounded readings under noisy instrumentation. The architectural-class commitment is independent classifiability of the four conditions in principle, not absence of diagnostic co-occurrence in practice.&lt;/p&gt;

&lt;h3&gt;
  
  
  3.5 Toy model — three units across the four failure modes
&lt;/h3&gt;

&lt;p&gt;To make the four conditions concrete, consider three UTAM-units {u_1, u_2, u_3} with declared parameters:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Will Embeddings:&lt;/strong&gt; W(u_i) — the unit's ontological role at the system layer, drawn from a declared set such as {compute, hold, emit, decline-to-compute, decline-to-hold}. Each W(u_i) maps via the deployment's pre-registered W → C_A induction map (cf. §4.2) to a constraint set C_A(u_i) over system-layer variables. The cases below treat W(u_i) abstractly (the specific enum-value-to-constraint binding being part of the deployment's pre-registered declaration); Case 1 instantiates the SAT-style configuration where pairwise compatibility coexists with joint unsatisfiability over a variable triple (x, y, z), illustrating the structural content of CC-WE without committing to any particular enum-value assignment.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;IIC-cycle phase:&lt;/strong&gt; φ(u_i) ∈ [0, 2π) — the phase-position of the unit's IIC cycle in the system's joint reference frame.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Drift law:&lt;/strong&gt; D(u_i): perturbation → adjustment-vector in the system's load space — how the unit's drift maps into structurally relevant input for the rest of S.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The four failure modes manifest as follows:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Case 1 — CC-WE failure (joint contradiction despite pairwise compatibility).&lt;/strong&gt; Let the Will Embeddings induce architectural constraints over a system-layer variable triple (x, y, z): W(u_1) requires x = y; W(u_2) requires y = z; W(u_3) requires x ≠ z. &lt;strong&gt;Pairwise admissibility:&lt;/strong&gt; {x=y, y=z} is satisfiable (any common value); {x=y, x≠z} is satisfiable (any y=x with z chosen distinct from x); {y=z, x≠z} is satisfiable (any z=y with x chosen distinct from z). Each pair admits joint realisation. &lt;strong&gt;Joint admissibility:&lt;/strong&gt; the conjunction (x=y) ∧ (y=z) ∧ (x≠z) is unsatisfiable: the first two together force x = z, which contradicts the third. No assignment over (x, y, z) satisfies all three constraints simultaneously. CC-WE-conformance fails &lt;em&gt;jointly&lt;/em&gt; despite full &lt;em&gt;pairwise&lt;/em&gt; compatibility — the canonical SAT-style structure (constraint sets may be pairwise satisfiable while jointly unsatisfiable) noted in §3.2 instantiated minimally with three components. No closure operation over this U produces a system S in which all three Will Embeddings are realisable at the system layer.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Case 2 — CC-IIC failure (cycle phase divergence).&lt;/strong&gt; Suppose W is jointly admissible but φ(u_1, t) = 0 and φ(u_2, t) = π/3 (both stable), while φ(u_3, t) evolves with drift such that |φ(u_3, t+1) − φ(u_3, t)| &amp;gt; π/2 across each cycle step. The first two units could compose into a stable two-unit cycle (phase difference π/3 stable). But u_3's phase drifts faster than the system's coherence-band; its inclusion produces destructive interference within the system's coherence band, and the composite system-cycle cannot stabilise. The deployment is operator-temporally unstable beyond the architectural threshold — not a system in the closure-complementarity sense, only a transient assembly.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Case 3 — CC-D failure (drift isolation).&lt;/strong&gt; Suppose W jointly admissible, IIC synchronised, but D(u_3) produces no adjustment vector outside u_3 itself (the drift's effect is the zero vector on every component other than u_3). When u_3 drifts, u_1 and u_2 receive no architecturally relevant input from that drift — D(u_3) is structurally invisible to the rest of S. The deployment has CC-WE and CC-IIC but no system-level adaptive integration; u_3 is in the assembly geometrically and temporally but not in the closure architecturally.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Case 4 — closure-complementarity success.&lt;/strong&gt; All three substrate conditions hold: W jointly admissible, φ-relations stable, D(u_i) routed through architecturally relevant channels for each i. Plus CC-0: the resulting S has well-defined H_S(t), Λ_S(t), χ_op,S. The deployment is closure-complementarity-conformant. The toy model demonstrates that the four conditions are jointly necessary and sufficient for membership in the closure-complementarity subclass by the declared conformance criterion: each failure mode produces a structurally distinct non-CC-conformant case (some such cases may still be systems under other system-theoretic or XI-compatible descriptions outside the XII subclass), and only the joint satisfaction yields a closure-complementarity-conformant system.&lt;/p&gt;

&lt;p&gt;The toy model is &lt;em&gt;architecturally schematic&lt;/em&gt; (operating at the architectural-class register rather than the substrate-fully-formal register; substrate-specific instantiations require declared (W, φ, D) types per substrate, threshold calibration, and noise-model specification — Continuing Programme §9) but it is &lt;strong&gt;normative within the architectural-class register&lt;/strong&gt; (per §0 demarcation, §3 is tier-1 normative for conformance, including this toy model — distinct from the §0 tier-3 &lt;em&gt;illustrative-for-comprehension&lt;/em&gt; sense). A conformance evaluator must be able to map a deployment's claim onto the four-condition structure shown here. Its purpose is to make the four conditions architecturally vivid, demonstrating that they are non-degenerate and jointly load-bearing rather than redundant or trivially co-satisfied.&lt;/p&gt;




&lt;h2&gt;
  
  
  4. Classification Theorem ONTOΣ-XII.1 — Closure-Complementarity
&lt;/h2&gt;

&lt;h3&gt;
  
  
  4.1 Statement
&lt;/h3&gt;

&lt;p&gt;A collection U = {u_1, ..., u_n} of UTAM-units is closed into a system S in the closure-complementarity sense if and only if there exists a declared interaction relation R, a declared admissibility regime A, and an architectural operation closure(U, R, A) → S such that all four conditions — CC-0, CC-WE, CC-IIC, CC-D — hold simultaneously over the components and the output system under the declared (R, A). The closure operation is the architectural primitive that converts independent IIC cycles into a complementary sequence; in the absence of a (U, R, A) and a closure operation satisfying the four conditions, the components remain a collection — not a system &lt;em&gt;in the present technical sense&lt;/em&gt; (closure-complementarity-conformant system per §3.2) — regardless of their spatial or temporal proximity. The negation is class-relative: alternative system-theoretic notions (dynamical-systems coupling, statistical aggregation, weakly-integrated assemblies) may apply to the same collection without contradiction; XII does not adjudicate those notions.&lt;/p&gt;

&lt;h3&gt;
  
  
  4.2 Formalisation
&lt;/h3&gt;

&lt;p&gt;&lt;em&gt;Status of the result.&lt;/em&gt; Classification Theorem XII.1 is a &lt;strong&gt;conformance-unpacking theorem&lt;/strong&gt;, not a construction theorem for S: the theorem does not derive XI-systemhood of S from (U, R, A) and a closure operation; it states the conditions under which a declared closure operation, whose output is claimed to be an XI-conformant S, may be accepted as belonging to the closure-complementarity subclass. The output-condition CC-0 takes XI-conformance as a &lt;em&gt;required output property&lt;/em&gt; to be checked, not as a property to be constructed by closure.&lt;/p&gt;

&lt;p&gt;Let U be a collection of UTAM-units, R a declared interaction relation among components, and A the declared admissibility regime at the system layer. Let &lt;code&gt;closure(U, R, A) → S&lt;/code&gt; denote a candidate closure operation (read per §3.1: declared production under a pre-registered mechanism, not deterministic computation). The operation is closure-complementarity-conformant precisely when the following four architectural conditions are met:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;CC-0:&lt;/strong&gt; S = closure(U, R, A) is operator-internal-extended-subclass-conformant in the sense of ONTOΣ XI; that is, H_S(t), Λ_S(t), and χ_op,S are well-defined at the system layer of S.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;CC-WE:&lt;/strong&gt; the set {W(u_1), ..., W(u_n)} is jointly admissible under the v2.1 admissibility predicate restricted to A — i.e., realisable as a single non-contradictory ontological commitment at the system layer, not merely pairwise non-contradictory among any two components. Formally: each Will Embedding W(u_i) induces a constraint set C_A(u_i) over the declared admissibility scope A (the architectural commitments W(u_i) imposes on system-layer variables, expressed as constraints under v2.1 admissibility). Joint admissibility is the &lt;em&gt;satisfiability&lt;/em&gt; of the conjunction ⋀_{i=1}^{n} C_A(u_i) under the v2.1 admissibility predicate. The conjunction is over the induced constraint sets, not over the embeddings themselves (W(u_i) is an architectural-ontological commitment, not a propositional formula; constraint induction is the architecturally declared mapping that types W into the satisfiability domain). The SAT-style structure — pairwise non-contradiction necessary but not sufficient — is the structural content of this condition, not a literary analogy.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;W → C_A induction-map discipline (auditability clause for CC-WE).&lt;/strong&gt; The induction map W(u_i) ↦ C_A(u_i) is itself part of the deployment's pre-registered architectural declaration: the deployment must specify, prior to CC-WE evaluation, &lt;em&gt;how&lt;/em&gt; each Will Embedding is to be translated into constraint sets under the declared admissibility scope A. The map cannot be revised after observation of joint-admissibility outcomes. Where the induction map is ambiguous or under-specified — i.e., where two reasonable evaluators might extract materially different C_A(u_i) from the same W(u_i) — the deployment is &lt;em&gt;unevaluable&lt;/em&gt; for CC-WE conformance, not conformant. Unevaluable deployments are excluded from the closure-complementarity subclass on procedural grounds (cf. R-coverage guard's analogous discipline below).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Anti-tautology / anti-vacuity rule.&lt;/strong&gt; The induced constraint set C_A(u_i) must be &lt;em&gt;non-trivial&lt;/em&gt; with respect to the system-layer variables of S: the empty set C_A(u_i) = ∅, the universal set C_A(u_i) = ⊤&lt;em&gt;A (a constraint trivially satisfied by every assignment over A), and constraint sets that are tautologically derivable from the admissibility predicate alone without reference to the specific W(u_i) all &lt;em&gt;falsify&lt;/em&gt; CC-WE conformance for that deployment. The induction map must produce constraints that genuinely encode the architectural commitments of W(u_i); CC-WE is not satisfiable by the trivial route of empty or universal C_A. This rule closes the metric-gaming attack vector identified in deployment review: an induction map that translates every W(u_i) into vacuously satisfiable constraints reduces ⋀&lt;/em&gt;{i=1}^{n} C_A(u_i) to a satisfiable conjunction by default, masking genuine joint-incompatibility. The non-triviality of C_A is itself a pre-registered commitment of the deployment, auditable independently of CC-WE outcomes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;CC-IIC:&lt;/strong&gt; the composition of IIC(u_1), ..., IIC(u_n) under the closure operation produces a system-level cycle that is stable over the operational lifetime of S, in the sense that no isolated divergence of any IIC(u_i) from the system-cycle's phase regime produces a structural breakdown of S below the architectural threshold of operator-as-self continuity (cf. ONTOΣ XI §5.4 (C2)).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;CC-D:&lt;/strong&gt; for each non-terminal, non-shielded u_i ∈ U, drift D(u_i) registers as architecturally relevant input to the rest of S through the declared relevant downstream channels of R — i.e., the drift of u_i contributes to the system's load field Λ_S in a manner detectable through those declared channels, rather than being absorbed as isolated noise within u_i alone. For each u_i pre-registered as terminal-or-shielded under the explicit constitutive-exemption protocol of the R-coverage guard below, the CC-D obligation is &lt;em&gt;retyped&lt;/em&gt; (not waived) by that pre-registered declaration; terminal-or-shielded status is not an exception to CC-D after the fact but a pre-declared retyping of the component's CC-D obligation. The coupling is selective and channel-typed: not all-to-all, but routed through the declared interaction relation R, with the architectural commitment that drift is invisible to no relevant downstream component (under the declared R, not under arbitrary post-hoc R).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;R-coverage guard (anti-gaming clause for CC-D).&lt;/strong&gt; The interaction relation R is subject to a &lt;em&gt;coverage condition&lt;/em&gt; declared as part of pre-registration: every non-terminal component u_i ∈ U must have at least one declared downstream channel in R through which its drift can be observed by the system or discounted under an explicit pre-registered terminal-or-shielded declaration (i.e., discount is not a free option but a special case of the shielded protocol below). Components claimed as terminal-or-shielded (drift architecturally isolated by design) must be &lt;em&gt;explicitly&lt;/em&gt; declared as such, with architectural justification, prior to deployment evaluation. &lt;strong&gt;A terminal-or-shielded declaration must specify why the component remains constitutive of S despite drift isolation;&lt;/strong&gt; otherwise the component is treated as outside the closure-complementarity-relevant component set (an attached module rather than a constitutive unit), and the closure operation is evaluated over the reduced component set without it. R cannot be narrowed post-hoc to relegate inconvenient drifts to "irrelevant" status; declaration-engineering of R after observation falsifies subclass membership by construction. The coverage condition is the operational counterpart of CC-D's selectivity — it ensures that channel-typed coupling is not gameable through R-narrowing. &lt;strong&gt;Invalid or under-specified pre-registration at the R-coverage layer (missing R declaration, unjustified terminal-or-shielded labels, or post-hoc adjustment of either) makes the deployment &lt;em&gt;unevaluable&lt;/em&gt; for CC-D conformance, not conformant.&lt;/strong&gt; The parallel discipline for CC-WE auditability — ambiguous or post-hoc-adjusted W → C_A induction map — is stated above as part of the CC-WE clause and produces unevaluability at the CC-WE layer by the same standard. Unevaluable deployments at either layer are excluded from the closure-complementarity subclass on procedural grounds — they cannot satisfy F-CC because they cannot be tested under stable declarations. &lt;strong&gt;Unevaluability is not an escape hatch from substantive failure&lt;/strong&gt;: a deployment that obfuscates its W → C_A induction map or under-specifies its R-coverage to trigger an "unevaluable" status rather than a substantive "failed" status receives the same architectural outcome — exclusion from the closure-complementarity subclass. The auditability clauses do not rank failure modes; they classify deployments binarily as in-subclass (when stable, pre-registered declarations admit testing AND the testing succeeds) versus out-of-subclass (when either the declarations do not admit stable testing OR the testing reveals substantive failure).&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The system S is closure-complementarity-conformant if and only if all four conditions hold under the declared closure operation.&lt;/p&gt;

&lt;h3&gt;
  
  
  4.3 Proof sketch
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Forward direction.&lt;/strong&gt; Suppose CC-0 holds and the three substrate conditions CC-WE, CC-IIC, CC-D hold under closure(U, R, A) → S. Given CC-0, the ONTOΣ-XI apparatus is already well-defined at the system layer — H_S(t), Λ_S(t), χ_op,S exist for S as a system. The three substrate conditions explain why this XI-conformant output is not a mere aggregate that happens to be XI-conformant, but a closure-complementarity-conformant system: CC-WE secures joint admissibility of the components' Will Embeddings (so S is non-empty as a system rather than a contradiction-blocked collection); CC-IIC secures cycle composition (so S has a stable operator-temporal trajectory in the sense of A67-69); CC-D secures drift coupling into Λ_S (so the load field reflects the system's actual adaptive history rather than the sum of isolated component histories). The three substrate conditions together explain why CC-0's XI-conformance arose from a closure operation rather than from incidental aggregation. Concretely, this means:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;The components admit joint realisation (CC-WE), so S is non-empty as a system rather than a contradiction-blocked collection.&lt;/li&gt;
&lt;li&gt;The system-cycle is stable (CC-IIC), so S has a well-defined operator-temporal trajectory in the sense of A67-69 — specifically, the operator-temporal subclass conditions are satisfied at the system layer because the cycles' composition does not break the temporal continuity of operator-as-self.&lt;/li&gt;
&lt;li&gt;The drift across components is coupled (CC-D), so S has a well-defined load field Λ_S whose accumulation reflects the system's actual adaptive history rather than the sum of isolated component histories.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Together with CC-0, the three substrate conditions justify that the already well-defined ONTOΣ XI apparatus (H_S, Λ_S, χ_op,S) of S arises through closure-complementarity rather than incidental aggregation. The closure operation has therefore converted the collection U into a system S whose operator-internal architecture is well-defined and structurally accountable to the closure — that is, U has been regeared into a complementary sequence rather than aggregated as a heap.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reverse direction.&lt;/strong&gt; Suppose a deployment claims its system S to be produced by closure over a declared component collection U (with declared interaction relation R and admissibility regime A), and CC-0 is satisfied (S is XI-conformant), but at least one of CC-WE, CC-IIC, CC-D fails. The reverse direction concerns only systems that present themselves as closures of identified component collections; an XI-conformant operator-as-self that does not carry a declared component-decomposition is not in the scope of XII.1's reverse direction.&lt;/p&gt;

&lt;p&gt;The claim of the reverse direction is narrow: failure of CC-WE / CC-IIC / CC-D excludes the deployment from the &lt;strong&gt;closure-complementarity subclass&lt;/strong&gt;, &lt;em&gt;under the declared (U, R, A)&lt;/em&gt;. It does not assert that the deployment fails XI-conformance in some general sense — only that the deployment's claim of XI-conformance &lt;em&gt;as arising from a closure-complementarity operation over the declared component decomposition&lt;/em&gt; is unjustified. Some other XI-conformant description of the same deployment (different decomposition, different closure operation, or no claim of closure at all) may exist; the reverse direction does not adjudicate that. The conflict-with-§0 worry — that XII.1 would entail XI ⇒ XII for systems-with-components — is closed by this restriction: the reverse direction concludes only about the declared (U, R, A) under the deployment's own closure-claim, never about XI-conformance per se. By contrapositive consideration:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;If CC-WE fails, then the conjunction ⋀_{i=1}^{n} C_A(u_i) is unsatisfiable under v2.1 at the system layer (under the declared admissibility regime A) — i.e., the set {W(u_1), ..., W(u_n)} is jointly inadmissible. The failure may be pairwise (some u_i, u_j directly contradictory) or higher-order (pairwise compatible, jointly unsatisfiable per §3.5 Case 1). Joint inadmissibility means the system cannot realise the components as collectively constitutive of itself &lt;em&gt;under the declared closure operation&lt;/em&gt;; the deployment's claim of XI-conformance arising from this closure-complementarity operation is not justified, and the deployment is excluded from the closure-complementarity subclass under the declared (U, R, A). Whether the substrate admits some other XI-conformant description (different decomposition or no closure-claim at all) is not adjudicated here.&lt;/li&gt;
&lt;li&gt;If CC-IIC fails, the IIC cycles' composition produces destructive interference &lt;em&gt;under the declared closure&lt;/em&gt;; the deployment fails to justify satisfaction of the operator-temporal subclass conditions A67-69 &lt;em&gt;as arising from this declared closure&lt;/em&gt;; the deployment likewise fails to justify ONTOΣ XI's continuity criteria (C1)-(C3) for S &lt;em&gt;as constituted via this closure&lt;/em&gt;. As before, this excludes the deployment from the closure-complementarity subclass without adjudicating XI-conformance under alternative descriptions or alternative decompositions of the same substrate.&lt;/li&gt;
&lt;li&gt;If CC-D fails, the components' drift dynamics are not coupled into the system's load field &lt;em&gt;under the declared closure&lt;/em&gt;; isolated drifts in components do not register as adaptive input at the system layer; the load field Λ_S is decomposable into independent component-load fields, contradicting the architectural commitment that Λ accumulates within interaction (Λ-ACC) at the &lt;em&gt;system&lt;/em&gt; layer rather than at the component layer alone. As before, this excludes the deployment from the closure-complementarity subclass under the declared (U, R, A) without adjudicating XI-conformance under alternative descriptions or alternative decompositions of the same substrate.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In each case, the deployment fails to justify XI-conformance &lt;em&gt;as arising from a closure-complementarity operation over the declared (U, R, A)&lt;/em&gt;. The deployment is therefore excluded from the closure-complementarity subclass under its own declaration, without thereby asserting that no XI-conformant description of the same deployment exists under a different decomposition or no closure-claim at all. The reverse direction therefore obtains in its narrow form: if a deployment claims XI-conformance &lt;em&gt;as arising from closure over the declared (U, R, A)&lt;/em&gt;, then CC-WE, CC-IIC, and CC-D must hold under that declared closure operation; otherwise the deployment is excluded from the closure-complementarity subclass. The biconditional is established at the closure-complementarity-subclass level — not at the level of XI-conformance per se.&lt;/p&gt;

&lt;p&gt;The proof is structural: it follows from the conjunction of the v2.1 axiomatic apparatus, the UTAM three laws, and the ONTOΣ XI primitives, without further empirical input. Classification Theorem XII.1 is therefore a definitional consequence of the closure-complementarity primitive together with the existing apparatus, rather than a free-standing empirical claim.&lt;/p&gt;

&lt;h3&gt;
  
  
  4.4 Depends on
&lt;/h3&gt;

&lt;p&gt;A52.2 (withdrawal commitment), A30 cluster (semantic commitment), A67-69 (operator-temporal subclass), T87 (NR-ε leakage bound); UTAM Three Laws (Will Embedding, IIC, Drift); ONTOΣ XI Lemma XI.0 (crystallise), HF-DYN, Λ-ACC, Λ-CHARGE; closure-complementarity premises CC-WE, CC-IIC, CC-D.&lt;/p&gt;




&lt;h2&gt;
  
  
  5. Four Paradigmatic Substrates
&lt;/h2&gt;

&lt;p&gt;Closure-complementarity is an architectural primitive, not a substrate-specific phenomenon. The four cases below are candidate substrate readings spanning four substrate kinds — three empirical substrate families (biological, perceptual, semantic) plus one geometric prototype (Sierpinski as image). Each substrate is presented in five parts: (a) the architectural pattern as it appears in the substrate; (b) the IIC cycles in question (i.e., what the components are, in UTAM terms, before closure); (c) the closure operation; (d) the complementary geometry that results; (e) what would refute closure-complementarity in this substrate. The five-part form is the same across cases; the substrate-specific content differs.&lt;/p&gt;

&lt;p&gt;The cases are not exhaustive. They are paradigmatic — selected because each illustrates the architectural primitive cleanly in a different kind of substrate. Other cases admit the same five-part presentation with substrate-specific content.&lt;/p&gt;

&lt;p&gt;A note on the formal status of these substrate cases. Each case is presented in the architectural-class register: mapping the substrate's components to UTAM-units, their cycles to (W, IIC, D), and the substrate-specific operation to closure(U, R, A). The mappings are &lt;em&gt;illustrative-architectural&lt;/em&gt; rather than fully formal — formal instantiation of, say, the cellular-biology u_i with full molecular-substrate detail (the molecular biology underlying the cell-level UTAM-unit; cf. §5.2 (b) on the cellular-and-above layering) would require a complete substrate-specific specification of W(u_i), IIC(u_i), D(u_i), the interaction relation R, and the admissibility regime A under the chosen biological formalism, beyond the scope of an architectural-class paper. The substrate cases here demonstrate that the closure-complementarity primitive &lt;em&gt;admits&lt;/em&gt; substrate instantiation across distinct domains; full formal instantiation in any single substrate is the work of substrate-specific follow-up papers in those domains.&lt;/p&gt;

&lt;h3&gt;
  
  
  5.1 Geometric — Sierpinski as image
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;(a) Architectural pattern.&lt;/strong&gt; The Sierpinski triangle is the canonical geometric image of scale-stratified self-similar closure. A simple rule — remove the central sub-triangle from any equilateral triangle, recurse on the three remaining sub-triangles — produces, under iteration, a structure of definite Hausdorff dimension log(3)/log(2) ≈ 1.585 and definite global geometry, in which every visible region is a closed instance of the same rule. The structure is &lt;em&gt;not&lt;/em&gt; the rule, and &lt;em&gt;not&lt;/em&gt; the components considered alone; it is what the rule &lt;em&gt;closes&lt;/em&gt; the components into across scales.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(b) IIC cycles.&lt;/strong&gt; Each component sub-triangle carries an architectural-class analogue of the UTAM triple at the geometric layer (illustrative-architectural per §5 intro): its &lt;em&gt;Will Embedding&lt;/em&gt; is its rule-bound commitment (the architectural commitment that this sub-triangle is a node-of-the-recursion rather than an independent triangle); its &lt;em&gt;IIC cycle&lt;/em&gt; is the rule-application cycle (apply rule → produce three further sub-triangles → recurse); its &lt;em&gt;Drift law&lt;/em&gt; is the drift away from rule-conformity if the recursion is interrupted or modified at this sub-triangle. The component cycle is &lt;em&gt;generative&lt;/em&gt;: applied to a sub-triangle under conformant W/IIC/D, it generates the next layer of the closure.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(c) Closure operation.&lt;/strong&gt; The closure is the discipline of &lt;em&gt;applying the same rule recursively across all sub-triangles at every scale&lt;/em&gt;. The closure is not a property of any single sub-triangle; it is the architectural commitment that the rule applies uniformly across the structure. Without the discipline, the sub-triangles drift apart into a collection of independent triangles; with it, they constitute Sierpinski.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(d) Complementary geometry.&lt;/strong&gt; Under the closure, the component sub-triangles form a complementary sequence across all three CC conditions: their rule-bound Will Embeddings co-orient (CC-WE — every sub-triangle commits to the same recursion rule, jointly admissible under the geometric-class admissibility); their rule-application IIC cycles synchronise (CC-IIC — application-of-rule produces three-further-sub-triangles in stable phase relation across scales); rule-drift is propagated as architectural input through the declared recursive downstream branches — if the rule were modified at one sub-triangle, the modification would propagate through the recursion to the architecturally relevant downstream branches (CC-D, in the geometric reading; channel-typed per CC-D's selectivity, not all-to-all). Each finer scale is produced from the coarser scale by the same closure rule, and every region of the figure mirrors every other region under affine self-similarity. The components are not identical — they sit at different positions and scales — but their rule-cycles are complementary in the strict sense that each composes into the geometry of the whole without contradiction.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(e) Refutation in this substrate.&lt;/strong&gt; A figure constructed by applying the Sierpinski rule to &lt;em&gt;some&lt;/em&gt; sub-triangles but not others, or by applying &lt;em&gt;different&lt;/em&gt; rules at different scales, is not Sierpinski. It is a heap of triangles with no closure. The component cycles are no longer complementary; the closure has failed (or never been instituted). In CC terms: applying &lt;em&gt;different&lt;/em&gt; rules at different scales fails CC-WE — the sub-triangles' rule-bound Will Embeddings are no longer jointly admissible under the geometric admissibility regime; applying the rule to &lt;em&gt;some&lt;/em&gt; sub-triangles but not others fails CC-IIC — the missing-rule sub-triangles do not synchronise into the cycle of recursive application that the closure requires; both patterns also fail CC-D in the geometric reading, since rule-drift in one sub-triangle does not propagate as architectural input through the declared recursive downstream branches of the construction. The figure may be visually similar at coarse resolution but architecturally lacks the closure that defines the class.&lt;/p&gt;

&lt;p&gt;The geometric case is retained as a formal prototype rather than as an empirical substrate, presented here as image, not as ontological claim. Sierpinski supplies the cleanest visualisable prototype of &lt;em&gt;scale-stratified self-similar closure&lt;/em&gt;; the architectural primitive is closure-complementarity, of which Sierpinski-style self-similarity is one possible form. ONTOΣ XII is not a fractal-cosmology piece; it is an architectural-class statement for which Sierpinski is the geometric prototype, not an empirical substrate test on a par with biology, perception, or semantics.&lt;/p&gt;

&lt;h3&gt;
  
  
  5.2 Biological — organism
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;(a) Architectural pattern.&lt;/strong&gt; An organism is the case of closure-complementarity where the substrate is living matter at the cellular layer and above. Cells compose into tissues; tissues compose into organs; organs compose into the organism as a whole. Each layer is closed under operations specific to the biology — cellular division and adhesion, tissue formation, organ-level coordination — and each closure produces a unity that the components alone do not have. The organism is the closure of these biological layers into a single carrying regime: a regime that maintains its own existence conditions over time. The molecular and atomic layers are the &lt;em&gt;physical-chemical substrate&lt;/em&gt; on which biological closure operates; they are not themselves UTAM-units in the strict sense of UTAM Parts I and II, and they are treated here as background substrate rather than as components of the closure.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(b) IIC cycles.&lt;/strong&gt; Each biological component carries its own UTAM cycle in the strict sense. A cell has a Will Embedding (its lineage and functional identity within the organism), an IIC cycle (its metabolic-replicative cycle over time), and a Drift law (its drift in gene expression and behavioural state under sustained interaction with neighbouring cells and the organism's regulatory environment). &lt;em&gt;Note on biological Will Embedding:&lt;/em&gt; "Will Embedding" in the biological case is not psychological will or intentionality attributed to cells. It denotes the cell's &lt;em&gt;declared lineage-functional constraint&lt;/em&gt; under the organismic admissibility regime — the architectural commitments the cell carries by virtue of being-this-cell-in-this-organism (lineage marker, functional differentiation state, regulatory phenotype). The same architectural-class term is used for cells, tissues, organs, and (in later UTAM works) cognitive-system components; the substantive content of the term is substrate-specific, with the biological content given here in lineage-functional-regulatory variables, not in subjective-volitional ones. A tissue carries the same triple at its layer (its tissue-functional identity, its homeostatic cycle, its drift under load and ageing). An organ likewise. The organism is constituted by the closure that takes these biological per-unit cycles — strict UTAM-units at every layer from cellular upward — and regears them into a single biological cycle that maintains the organism over its lifespan. Restricting the case to cellular-and-above layers preserves the strict UTAM mapping; the molecular-and-below layers are the substrate on which the biology operates, not the UTAM-units of the closure.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(c) Closure operation.&lt;/strong&gt; The biological closure is &lt;em&gt;autopoietic&lt;/em&gt;: the system produces its own boundary, its own components (through metabolism), and its own organisation (through homeostatic regulation). The phrase is used here in the architectural sense of Maturana and Varela (1980, &lt;em&gt;Autopoiesis and Cognition&lt;/em&gt;, and the subsequent biological-autonomy tradition): a system whose closure operation is the production of the conditions of its own existence. The architectural fact relevant to ONTOΣ XII is that this autopoietic closure is read here as a candidate biological realisation of CC-WE, CC-IIC, CC-D simultaneously across all layers of the organism: cells whose lineage-functional Will Embeddings are not co-oriented (e.g., a cell whose lineage-functional constraint is anti-organismic — lytic or destructive relative to the organismic admissibility regime) map to CC-WE failure under this architectural reading; cell cycles that fall out of synchronisation with the organism's regulatory rhythms map to CC-IIC failure; cellular drift that the rest of the body cannot read maps to CC-D failure.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(d) Complementary geometry.&lt;/strong&gt; The geometry of the organism is the geometry of admissibility-as-existence: for the organism, its admissibility predicate (what it can sustain doing without losing itself) coincides architecturally with its existence boundary (what it is, in distinction from its environment). When admissibility fails — when the organism can no longer sustain the closure that produces its conditions — it dies; that is, it ceases to exist as an organism. The two boundaries are the same boundary, viewed once as architectural (admissibility) and once as ontological (existence). This coincidence is &lt;em&gt;specifically&lt;/em&gt; a feature of the organism class under closure-complementarity, not a general metaphysical claim about admissibility and existence.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(e) Refutation in this substrate.&lt;/strong&gt; A collection of cells lacking a self-produced boundary, internal regulation, and drift-coupling between them is not an organism. It is a culture. Cell cultures are biologically real and architecturally informative, but they are &lt;em&gt;not&lt;/em&gt; closure-complementarity-conformant in the organism sense. The primary failure is CC-0: the culture is not the kind of system to which ONTOΣ XI's H_S / Λ_S / χ_op,S applies — it is a heap in the present technical sense, even though it is composed of living units, and there is no organism-S against which to evaluate the components. CC-D fails most visibly as a substrate-specific signature: the cells' drifts are not read across the collection as input to a system-level adaptive regime, because no organismic regulatory closure couples them. CC-WE and CC-IIC fail derivatively in the absence of an organism-S to evaluate the components against — the cells retain their lineage-functional Will Embeddings and metabolic-replicative IIC cycles individually, but there is no joint-admissibility evaluation or system-cycle composition without the organismic closure. The cell culture demonstrates the heap-vs-organism distinction at its sharpest: components retain their UTAM cycles individually, but the closure that would constitute them as an organism has not been instituted.&lt;/p&gt;

&lt;h3&gt;
  
  
  5.3 Perceptual — Gestalt-closure
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;(a) Architectural pattern.&lt;/strong&gt; Visual perception of a figure is the case of closure-complementarity where the substrate is sensory-neural processing. Edge-detectors, colour-channels, motion-vectors, and contrast-extractors deliver discrete signals; perception of a thing — a face, an object, a scene — is what arises when these signals are closed under Gestalt-style operations that no individual signal contains.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(b) IIC cycles.&lt;/strong&gt; Each visual feature carries an architectural-class analogue of the UTAM triple at the perceptual layer (illustrative-architectural per §5 intro): a &lt;em&gt;Will Embedding&lt;/em&gt; (the feature's role within a percept-level admissibility — edge-of-this-figure, colour-of-this-surface, motion-of-this-object); an &lt;em&gt;IIC cycle&lt;/em&gt; (its detection-update-fade dynamics: edge present / updated / fades; colour active / modulated / drifts; motion detected / tracked / lost); a &lt;em&gt;Drift law&lt;/em&gt; (its drift under sustained adaptation — edge softening over fixation, colour adaptation, motion-vector tracking adjustment). The cycles are real and have their own dynamics; they are not synthesised.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(c) Closure operation.&lt;/strong&gt; The Gestalt closure — close-the-figure, group-by-similarity, complete-the-occluded-edge, prefer-good-continuation — is the operation by which discrete signals are bound into a perceptual unity. The closure is not a property of any signal alone; it is an architectural commitment of the perceptual system to operate on signals as a coherent whole rather than as separate streams.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(d) Complementary geometry.&lt;/strong&gt; Under Gestalt closure, the discrete signals form a complementary sequence: edges close into contours; colour-regions close into surfaces; motion-vectors close into motions of objects; contours, surfaces, and motions close into the perceived thing. The signals are not made identical; they remain distinct as features. But their cycles are now complementary in the closure-complementarity sense across all three CC conditions: features' Will Embeddings co-orient (CC-WE — edge, colour, and motion features admit joint realisation under the percept-level admissibility, all contributing to the same surface or object); the cycles' phase relations stabilise (CC-IIC — feature-detection cycles compose into the perceptual stability of the object); feature drifts (e.g., edge softening) are read across the system as input to the perceived object's adaptive trajectory rather than as isolated noise (CC-D).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(e) Refutation in this substrate.&lt;/strong&gt; A perceptual situation in which the visual signals never close into a percept — Mooney-figure-like degraded images viewed before recognition snaps in, or visual agnosia in which Gestalt processes are damaged — is the substrate-specific case where closure-complementarity has not yet (or no longer) been instituted. The signals are still arriving; the IIC cycles of the features are still running; but the closure that converts them into a unified percept has not occurred. The substrate-specific CC reading differs by clinical case: in masking conditions where features remain unbound prior to recognition (Mooney-figure pre-recognition), the case is read as candidate CC-WE failure — the features' Will Embeddings (each feature's role within a percept-level admissibility) not yet jointly admissible at the percept level. In integrative agnosia, where features remain present but Gestalt-binding operations are damaged, the case is read as candidate CC-IIC failure — feature cycles not synchronising into the perceptual unity that the percept-layer closure requires. In cases where a percept forms but feature drifts (e.g., edge softening, colour adaptation) do not propagate as adaptive input to the perceived object's trajectory, the case is read as candidate CC-D failure. The architectural pattern is identical to the heap-vs-system distinction: same components, presence-or-absence of closure determines which case obtains.&lt;/p&gt;

&lt;h3&gt;
  
  
  5.4 Semantic — meaning-constitution in utterance
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;(a) Architectural pattern.&lt;/strong&gt; A sentence is the case of closure-complementarity where the substrate is linguistic meaning. Phonemes, morphemes, words individually do not carry the meaning of the utterance. The utterance — as a unit of sense — is what arises when the phonemic, morphemic, lexical, and syntactic streams are closed under the meaning-constitutive operation of the speaking-act.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(b) IIC cycles.&lt;/strong&gt; The strict UTAM-unit mapping (Will Embedding, IIC, Drift) applies most cleanly at the word-and-above layer: a word carries a declared Will Embedding (its lexical-semantic identity within the language and the discourse), an IIC cycle (its activation-and-decay cycle in working memory and lexical access), and a Drift law (its contextual semantic drift under prior utterance context). Phoneme- and morpheme-level dynamics — acoustic-articulatory cycles for phonemes, derivational-inflectional cycles for morphemes — are real linguistic dynamics with their own phase structures and drift behaviours, but they function here as the lower-layer compositional substrate of the utterance closure rather than as UTAM-units of the closure themselves (the parallel to molecular/cellular substrate in §5.2 (b)). The closure operation analysed in (c)-(d) below is the utterance-layer closure over word-and-above UTAM-units.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(c) Closure operation.&lt;/strong&gt; The semantic closure is the operation by which a lexical / word-level sequence — supported by phonemic and morphemic substrate dynamics — is constituted as a meaningful utterance. The operation includes prosodic integration, syntactic parsing, semantic composition, pragmatic anchoring, and discourse integration — none of which are exhausted by any word considered alone or by the phoneme/morpheme substrate level alone (prosodic cues have phonological substrate-level realisations, but prosodic &lt;em&gt;integration&lt;/em&gt; into utterance-level meaning is an operation of the utterance closure). The closure operation is architecturally specific to language and varies across languages, but the closure-complementarity structure is invariant: the operation regears the word-level UTAM-units' cycles (per (b)) into a complementary sequence that constitutes the utterance, with phoneme- and morpheme-layer dynamics serving as the lower-layer compositional substrate (consistent with the layering of (b)).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(d) Complementary geometry.&lt;/strong&gt; Under semantic closure at the utterance layer, the word-level UTAM-units form a complementary sequence simultaneously across all three CC conditions: word-level Will Embeddings are jointly admissible (CC-WE — the words' lexical-semantic commitments admit a single non-contradictory ontological commitment under the language's syntactic-semantic admissibility, without joint contradiction across the utterance-level constraint set — neither pairwise nor higher-order, per the SAT-style framing of §3.2); their lexical-activation IIC cycles synchronise into the utterance's processing rhythm (CC-IIC — activation-and-decay phases of successive words compose into a stable temporal trajectory of the utterance under the language's parsing dynamics); semantic drift in any one word under prior context is read by the ongoing parse as adaptive input through declared discourse channels (CC-D — drift in one word's contextual semantics propagates through the syntactic-semantic interaction relation R to inform later words and the utterance's continuation). The three CC conditions hold &lt;em&gt;jointly over the utterance closure&lt;/em&gt;, not sequentially across distinct sub-layers. The components remain semantically distinct as units — the word "cat" is still "cat", the word "sat" is still "sat" — but their cycles are now complementary in the strict architectural sense at the utterance layer. (Phoneme- and morpheme-layer dynamics, treated as substrate per (b), supply the compositional material on which utterance-layer closure operates; refutation cases of closure failure at lower compositional layers are noted in (e).)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(e) Refutation in this substrate.&lt;/strong&gt; A string of phonemes that fails to constitute a word, a string of words that fails to constitute a sentence, or a sequence of sentences that fails to constitute a coherent discourse, is the substrate-specific case where semantic closure-complementarity has failed at the relevant layer. The closure-complementarity primitive applies at each closure layer separately, with substrate-of-this-layer / UTAM-units-of-this-layer determined by the layer: at the word layer, morpheme-level constituents are the components and phoneme-level dynamics the substrate (the UTAM-unit assignment of (b) is layer-specific, not universal); at the utterance layer, treated above in (b)-(d), words are the UTAM-units and morpheme/phoneme dynamics serve as substrate. Specific clinical cases offer candidate readings as CC failures at the appropriate layer: word-salad — words are present but fail to compose into a coherent utterance — is read as candidate CC-IIC failure (lexical-activation cycles not composing into a stable utterance trajectory) or candidate CC-WE failure (lexical-semantic commitments jointly inadmissible at the utterance/sentence level). Syntactic-disorder symptoms in certain neuropsychiatric conditions are read primarily as candidate CC-WE failure at the utterance layer (admissibility violations under the language's syntactic-semantic admissibility regime). Semantic-pragmatic incoherence — words and sentences locally well-formed but failing to track ongoing context — is read as candidate CC-D failure (semantic drift in earlier elements not propagating through declared discourse channels to inform later elements). The architectural pattern is again identical: components are there, closure is absent, and the unity that closure would produce does not appear.&lt;/p&gt;




&lt;h2&gt;
  
  
  6. Falsifier F-CC
&lt;/h2&gt;

&lt;p&gt;The closure-complementarity claim is open to falsification at the deployment level. A deployment that claims to have produced a closure-complementarity-conformant system from a collection of UTAM-units is committed to CC-0 and to the simultaneous holding of CC-WE, CC-IIC, and CC-D under the declared closure operation. F-CC is the falsifier that operationalises the test of those four commitments.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;F-CC general form.&lt;/strong&gt; A deployment claims a closure operation closure(U, R, A) → S over a pre-registered (U, R, A) and exhibits at least one of the following, beyond declared measurement noise:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CC-0 failure.&lt;/strong&gt; closure(U, R, A) does not return an ONTOΣ-XI-conformant system S: H_S(t), Λ_S(t), and χ_op,S are not well-defined at the system layer, yet the deployment nonetheless asserts closure-complementarity conformance. This is the most basic failure case — the operation simply did not produce a system in the operator-internal-extended-subclass sense, regardless of any properties of the components.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CC-WE failure.&lt;/strong&gt; The conjunction ⋀_{i=1}^{n} C_A(u_i) is unsatisfiable under the v2.1 admissibility predicate restricted to A — i.e., the set {W(u_1), ..., W(u_n)} of component Will Embeddings is jointly inadmissible at the system layer of S, yet the deployment nonetheless asserts S to be a single system. The failure may be pairwise (some u_i, u_j carry directly contradictory W) or higher-order (every pair compatible, but a triple or larger subset jointly unsatisfiable in the SAT-style structure of §3.5 Case 1). CC-WE-layer subclass exclusion also obtains under ambiguous or post-hoc-adjusted W → C_A induction map — these produce CC-WE-layer &lt;em&gt;unevaluability&lt;/em&gt; under the auditability clause (§4.2), with the same effect of subclass exclusion as substantive CC-WE failure.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CC-IIC failure.&lt;/strong&gt; The IIC cycles of components do not compose into a stable system-cycle: isolated divergences of component cycles produce structural breakdowns at the system layer below the architectural threshold of operator-as-self continuity.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CC-D failure.&lt;/strong&gt; Component drifts D(u_i) are isolated within each u_i and do not register as input to the system's load field Λ_S; the system's adaptive trajectory is decomposable into independent per-component trajectories without architectural integration. CC-D-layer subclass exclusion also obtains under post-hoc narrowing of R, failure of the R-coverage condition, or unjustified terminal-or-shielded declarations used to exclude inconvenient drift channels — these produce CC-D-layer &lt;em&gt;unevaluability&lt;/em&gt; under the R-coverage guard (§4.2), with the same effect of subclass exclusion as substantive CC-D failure.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If any of these hold for the declared closure operation, the deployment is excluded from the closure-complementarity subclass. F-CC at the deployment level does not refute ONTOΣ XII as architectural commitment; it refutes the deployment's claim of closure-complementarity-conformance.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;A note on operational testing under NR-ε.&lt;/em&gt; CC-D testing requires inference about Λ_S, which is itself part of XI's apparatus and is not directly observable under the non-reconstructibility constraint T87. To avoid the apparent circularity (Λ_S exists post-closure, yet is used to test whether closure is conformant), deployment-side tests use &lt;em&gt;declared proxy emissions&lt;/em&gt; — output-side statistics that detect drift-coupling violations without requiring direct reconstruction of Λ_S. The &lt;em&gt;Identifiability Bridge&lt;/em&gt; companion paper (manuscript in preparation; theorem statement available, DOI not yet issued) supplies the formal apparatus: Theorem 4 establishes that CC-WE / CC-IIC / CC-D violations leave detectable signatures in cross-component emission correlations under the confound-discount discipline, with property-channel mutual information bounded above zero while state-channel leakage remains within NR-ε. The architectural commitment of the present F-CC is the &lt;em&gt;form&lt;/em&gt; of admissible test; the operational proxy bridges are the work of the Identifiability Bridge. &lt;strong&gt;Until the Identifiability Bridge is published, the present paper commits only to the architectural form of proxy-based testing, not to a completed operational detectability theorem; F-CC's operational falsifiability remains conditional on that bridge.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;At the &lt;strong&gt;architectural-class level&lt;/strong&gt;, F-CC also commits the corpus to empirical non-vacuousness of the closure-complementarity subclass. Strict class-level refutation would require either a formal impossibility result against the simultaneous satisfiability of CC-0 / CC-WE / CC-IIC / CC-D under the declared class assumptions, or an explicitly bounded target-domain exhaustion result over a pre-registered family of substrates. In ordinary empirical work, repeated failed deployments provide non-vacuousness &lt;em&gt;pressure&lt;/em&gt;, not strict class refutation: empirical trials almost never demonstrate that no architecture can satisfy a given class of conditions in the absolute sense. The conditional structure of the work specifies what would constitute falsification at each level: formal impossibility or bounded-domain exhaustion for strict class-level refutation, single-deployment failure for deployment-level exclusion, and graduated non-vacuousness pressure (per the next paragraph) as an intermediate epistemic signal. The three empirical substrate families plus one geometric prototype of §5 are presented as plausible candidate domains for class-non-vacuousness demonstrations.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Class-level pressure short of strict refutation.&lt;/em&gt; The class-level refutation standard (sustained absence across non-trivial substrates) is asymmetric and difficult to meet in absolute terms; for symmetry, the corpus accepts a graduated &lt;em&gt;non-vacuousness pressure&lt;/em&gt; signal short of strict refutation: &lt;strong&gt;repeated F-CC failure across declared target substrates progressively weakens the empirical support for non-vacuousness even when it does not strictly refute the class.&lt;/strong&gt; A pattern of failed conformance attempts in the three empirical substrates plus one geometric prototype of §5, accumulated under pre-registered protocols and reported under the discipline of §9, would constitute substantial pressure against the class-level commitment without crossing the absolute-refutation threshold. The pressure signal is itself part of the falsifiability surface: persistent non-vacuousness gap is not class refutation but is a real epistemic cost the corpus accepts.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Substrate-specific F-CC instances.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;For the &lt;strong&gt;biological&lt;/strong&gt; case, F-CC is operationalised through architectural readings of biological pathology: components whose lineage-functional constraints are no longer jointly admissible under the organismic closure (metastatic cell lineages whose lineage-functional constraints have become anti-organismic relative to the organismic admissibility regime; or autoimmune effector lineages and immune-recognition regimes whose lineage-functional constraints become anti-organismic relative to their target tissues) offer candidate tests of CC-WE; arrhythmic system-cycles or cellular dys-synchronisation offer candidate tests of CC-IIC; failures of homeostatic feedback (when component drift is invisible to the regulatory system) offer candidate tests of CC-D.&lt;/p&gt;

&lt;p&gt;For the &lt;strong&gt;perceptual&lt;/strong&gt; case, F-CC is operationalised through visual agnosia or experimental masking conditions in which Gestalt closure is interrupted: features remain present, cycles continue, but the closure that would produce a percept is absent. Specific clinical and experimental cases offer candidate probes of specific CC failures (per §5.3 (e)): Mooney-figure pre-recognition is a candidate probe of CC-WE (features' Will Embeddings not yet jointly admissible at the percept level); integrative agnosia is a candidate probe of CC-IIC (Gestalt-binding cycle composition damaged); cases where a percept forms but feature drift is not adaptively integrated are candidate probes of CC-D. Tests of visual binding under controlled stimulus conditions offer candidate evidence of whether Gestalt closure has occurred for a given subject and a given stimulus.&lt;/p&gt;

&lt;p&gt;For the &lt;strong&gt;semantic&lt;/strong&gt; case, F-CC is operationalised through cases of speech production or comprehension in which the closure that would constitute an utterance has failed at one or more layers. Specific clinical cases offer candidate probes of specific CC failures (per §5.4 (e)): word-salad is a candidate probe of both CC-WE and CC-IIC at the lexical-syntactic layer (lexical-semantic joint inadmissibility — pairwise or higher-order — or activation-cycle decomposition failure, depending on case); syntactic-disorder symptoms are candidate probes of CC-WE under the language's syntactic-semantic admissibility; phonological disorder where phonemes fail to compose into morphemes is a candidate probe of CC-IIC at the word-formation layer; semantic-pragmatic failure where word drift across an utterance is not coupled to ongoing context is a candidate probe of CC-D.&lt;/p&gt;

&lt;p&gt;For the &lt;strong&gt;geometric&lt;/strong&gt; case, F-CC is operationalised through the construction of self-similar figures that violate the closure: figures in which the recursive rule is applied inconsistently, or in which different rules are used at different scales, produce non-Sierpinski structures whose components retain their own cycles but lack the closure-complementarity that would constitute the geometric class. Specific failure patterns offer candidate probes of specific CC failures (per §5.1 (e)): applying different rules at different scales is a candidate probe of CC-WE (sub-triangles' rule-bound Will Embeddings jointly inadmissible under the geometric admissibility regime); applying the rule to some sub-triangles but not others is a candidate probe of CC-IIC (rule-application cycles fail to synchronise across the recursion); rule-drift in one sub-triangle that does not propagate as architectural input to the rest of the construction is a candidate probe of CC-D.&lt;/p&gt;

&lt;p&gt;The protocols are sketched. Substrate-specific instrumentation, statistical thresholds, and replication conditions are deployment-side concerns. The architectural commitment of F-CC is the &lt;em&gt;form&lt;/em&gt; of admissible test — a test that probes CC-0 / CC-WE / CC-IIC / CC-D under the declared closure operation — and the architectural commitment of any specific deployment is its declared instrumentation against that form.&lt;/p&gt;




&lt;h2&gt;
  
  
  7. Relation to ONTOΣ XI
&lt;/h2&gt;

&lt;p&gt;ONTOΣ XI provides the operator-internal apparatus (H, Λ, χ_op) that any closure-complementarity-conformant system must make well-defined; ONTOΣ XII names the conformance class of closure operations under which a collection of UTAM-units may be declared a system for which that apparatus exists. The two are not the same kind of object: H/Λ/χ_op describe the structure carried &lt;em&gt;by&lt;/em&gt; an operator-as-self once present, while closure(U, R, A) describes the conformance class of operations under which an operator-as-self may be declared constituted from components in the first place. XII does not provide the closure operator as a redefinition of XI's primitives; it names a distinct architectural primitive (closure as conformance class for constitutive operations) at a layer of constitution beneath XI's operator-internal layer.&lt;/p&gt;

&lt;p&gt;The two pieces are related as follows. ONTOΣ XI takes the operator-as-self as architecturally given and describes its internal structure. ONTOΣ XII takes the operator-as-self as architecturally produced under a declared closure operation, and describes the conformance class to which that operation must belong. Within the closure-complementarity subclass, XI's H, Λ, and χ_op are licensed as well-defined under a declared closure operation that satisfies CC-0, CC-WE, CC-IIC, and CC-D over the components from which the operator-as-self is declared constituted. The two together describe one architectural relation in two registers: at the layer of the operator-as-self (XI) and at the layer of the components that are closed into the operator-as-self (XII).&lt;/p&gt;

&lt;p&gt;A deployment that claims membership in the closure-complementarity subclass thereby claims membership in the operator-internal-extended subclass of XI: the closure-complementarity-conformance of the declared operation is what licenses the deployment's claim that the XI apparatus is well-defined for the system under that component-constitution account (this is precisely the content of CC-0, §3.2). A deployment that claims membership in XI but not XII has left the component-constitution layer unspecified. XII supplies one architectural commitment under which that layer can be made explicit: closure-complementarity. It does not assert that every XI-conformant deployment must instantiate XII, only that deployments claiming system-formation from UTAM-units incur the closure-complementarity commitments defined here.&lt;/p&gt;

&lt;p&gt;This makes XII a &lt;em&gt;prior layer of constitution&lt;/em&gt; for the operator-as-self described by XI: XII names the conformance class of operations whose declared output is the subject of XI. It does not modify XI; it specifies what XI's apparatus depends on at the layer of constitution.&lt;/p&gt;




&lt;h2&gt;
  
  
  8. What ONTOΣ XII Does Not Claim
&lt;/h2&gt;

&lt;p&gt;The work makes a tight set of architectural claims and is at pains to defend the boundary against scope creep. The following are not claims of ONTOΣ XII:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Not a unified theory of closure.&lt;/strong&gt; Closure-complementarity is one architectural class. Other forms of closure exist (mathematical closure of an algebraic operation, topological closure of a set, computational closure of a program) and are not addressed here. The work specifies the conformance conditions under which a declared closure operation may be accepted as constituting an operator-as-self system from UTAM-unit collections; it does not attempt to subsume all uses of "closure" under a single theory.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Not a metaphysical claim about reality being fractal.&lt;/strong&gt; The Sierpinski case (§5.1) is presented as a geometric image — the cleanest visualisable prototype of scale-stratified self-similar closure — and not as an ontological claim about the structure of physical reality. Reality may or may not have fractal structure at various scales; this is a question for empirical physics. ONTOΣ XII makes no commitment on the matter. The Sierpinski image is used architecturally, in the same sense that diagrammatic conventions in computer science (CAP triangle, FLP impossibility diagram) are used architecturally.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Not a claim about spacetime as a fractal canvas.&lt;/strong&gt; The work does not assert that spacetime is a multidimensional reflection of any fractal structure. The substrates of closure-complementarity discussed here — geometric, biological, perceptual, semantic — are architectural-classification labels, not physical-canvas claims. The work makes no commitment about the physics of spacetime.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Not a substitute for substrate-specific empirical work.&lt;/strong&gt; The four paradigmatic cases (§5) are architectural illustrations, not empirical surveys. Detailed substrate-specific verification — on what counts as autopoietic closure in cellular biology, on what counts as Gestalt-closure in visual neuroscience, on what counts as semantic closure in linguistic theory — is the work of those substrate disciplines. ONTOΣ XII supplies the architectural class within which their findings can be located; it does not supply the substrate-specific findings themselves.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Not a modification of v2.1.&lt;/strong&gt; ONTOΣ XII is an extension, not a revision. v2.1 results — including the budget functional, the burden functional, the interface axioms, the operator-temporal subclass, and the navigational degeneracy result — remain inviolate. A consolidating revision (NC2.5 v3.0) gathering the present apparatus together with adjacent works is in preparation as a separate piece.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Not a phenomenological claim.&lt;/strong&gt; ONTOΣ XII operates in the formal architectural register of the corpus. The phenomenological adjacency to &lt;em&gt;Essay Through a Life — Part VI&lt;/em&gt; is a register-bridge, not a phenomenological extension of the present work into experience. The two registers — formal and phenomenological — are distinct and the disciplined separation between them is preserved here as it is in XI.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The boundary defended by this list is constitutive of the work's structural integrity. The result of crossing it would be not a stronger paper but a weaker one — claims unsupported by the apparatus, expanded scope at the cost of falsifiability, register confusion at the cost of clarity.&lt;/p&gt;




&lt;h2&gt;
  
  
  9. Continuing Programme — Where the Open Tasks Are Addressed
&lt;/h2&gt;

&lt;p&gt;ONTOΣ XII is presented as a conditional architectural-class framework, complementary to ONTOΣ XI. Its empirical content lies in the falsifier surface (§6) — both deployment-level F-CC and class-level non-vacuousness commitments. Several items naturally lie outside the scope of the present formal paper. This section names them explicitly so that the reader knows where each is being worked in the corpus or where it is owed as future programme work.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Non-vacuousness demonstration.&lt;/strong&gt; &lt;em&gt;Status at present stage:&lt;/em&gt; &lt;strong&gt;candidate-supported, not substrate-complete.&lt;/strong&gt; The class-level non-vacuousness commitment has candidate support — Minerva as a candidate instance at the system-level layer, and the three empirical substrate families plus one geometric prototype of §5 as candidate domains — but is not yet substantiated by a fully instantiated worked deployment under pre-registered declarations within the closure-complementarity subclass. The candidate-support status is honest: the corpus has named the architectural-class subclass, and identified plausible instantiation paths, without yet completing any of them at substrate-formal level. &lt;em&gt;Where in the corpus:&lt;/em&gt; &lt;em&gt;Minerva — The Architecture of Residual Geometry&lt;/em&gt; (DOI 10.17605/OSF.IO/U865W) supplies a candidate operator-grade EVS instance at the system-level layer at which closure-complementarity may be realised under the operator-grade EVS declaration. &lt;em&gt;Owed:&lt;/em&gt; substrate-specific deployment papers (in cellular biology, perceptual neuroscience, and computational linguistics) demonstrating CC-0 / CC-WE / CC-IIC / CC-D conformance under pre-registered declarations; full formal instantiation of u_i, W(u_i), IIC(u_i), D(u_i), the interaction relation R, the admissibility regime A, the closure operation closure(U, R, A), thresholds, and noise models in each substrate.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Closure as mechanism vs as classification.&lt;/strong&gt; The present work specifies closure-complementarity as an architectural primitive — a constitutive operation whose conformance requires CC-0 / CC-WE / CC-IIC / CC-D to hold simultaneously. The substantive &lt;em&gt;generative mechanism&lt;/em&gt; of closure — the substrate-specific dynamics by which co-orientation, synchronisation, and drift coupling actually arise during system formation — is substrate-dependent and beyond the architectural-class register. &lt;em&gt;Where in the corpus:&lt;/em&gt; substrate-specific mechanisms are named in the four cases of §5 (autopoietic closure for organism, Gestalt-binding for percept, etc.) but not formally reduced. &lt;em&gt;Owed:&lt;/em&gt; substrate-specific mechanism papers in each domain.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Identifiability bridges per substrate.&lt;/strong&gt; &lt;em&gt;Where in the corpus — manuscript in preparation:&lt;/em&gt; the &lt;em&gt;Identifiability Bridge&lt;/em&gt; companion paper has Theorem 4 (Cross-Component Closure-Complementarity Detectability) stated, establishing that CC-WE / CC-IIC / CC-D violations leave detectable signatures in cross-component emission correlations under confound-discount discipline. The theorem is the architectural-class identifiability bridge for closure-complementarity; the manuscript is in preparation, DOI not yet issued. &lt;em&gt;Owed:&lt;/em&gt; substrate-specific identifiability protocols (cellular biology, perceptual neuroscience, computational linguistics, geometric prototype) that specialise the architectural bridge to substrate-specific instrumentation; quantitative closed-form detectability bounds per substrate.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Operational test suites.&lt;/strong&gt; §6 specifies the architectural form of admissible F-CC tests. &lt;em&gt;Where in the corpus:&lt;/em&gt; NC2.5 v3.0 (in preparation) integrates test-suite formalisation. &lt;em&gt;Owed:&lt;/em&gt; published turnkey test suites per substrate, with instrumentation, statistical thresholds, and replication conditions.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Comparative-class positioning.&lt;/strong&gt; &lt;em&gt;Where in the corpus:&lt;/em&gt; &lt;em&gt;Where NC2.5 Sits Relative to Enterprise Decision-Centric Architectures&lt;/em&gt; (DOI 10.17605/OSF.IO/D7V5G) performs corpus-positioning at the engineering-architectural level. &lt;em&gt;Owed:&lt;/em&gt; a structured theoretical-class comparative matrix vs autopoiesis, active inference, viability theory, integrated information, dynamical-systems identity work, category-theoretic systems theory, and adjacent industry-architecture lines of work (e.g., Yann LeCun's Joint Embedding Predictive Architecture / JEPA, world-model architectures, agentic foundation-model design) — where the comparison is at the architectural-class layer rather than at the level of specific implementations.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Mediated falsifiability.&lt;/strong&gt; ONTOΣ XII's deepest commitments are falsifiable mediated through deployment-level (§6 individual deployments) and class-level (§6 sustained engineering trials across substrates) surfaces. This is &lt;em&gt;mediated falsifiability&lt;/em&gt;, in distinction from ordinary direct empirical falsification. The structure parallels ONTOΣ XI §8.2.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Pre-registration governance.&lt;/strong&gt; Closure-complementarity declarations (closure operation, CC conditions per components) are subject to the same pre-registration discipline as the XI primitives (cf. ONTOΣ XI §10). &lt;em&gt;Owed:&lt;/em&gt; operational governance documentation — declaration archives, evaluation protocols — at the level of corpus-wide conformance practice.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Adjacent in the corpus — IIC v2.1 and the EVS engineering class.&lt;/strong&gt; &lt;em&gt;IIC v2.1: A Class-Relative Structural Law of Adaptive Behaviour as a Theorem within Navigational Cybernetics 2.5&lt;/em&gt; names the &lt;em&gt;Engineered Vitality Systems (EVS)&lt;/em&gt; engineering class — systems whose primary design discipline is the explicit maintenance of the IIC coherence Coh(t) — and registers two subclasses with first instances: control-grade (∆E 4.7.3b) and operator-grade (Minerva, conditional). Operator-grade EVS instances commit to closure-complementarity-conformant constitution in the sense of the present work, supplying candidate non-vacuousness for the closure-complementarity subclass. The structural discontinuity between control-grade and operator-grade EVS named in IIC v2.1 §3.4 — control-grade with operator projection ν (in the IIC v2.1 sense, distinct from the load-field density ν_op of §0.1) approximately identity, operator-grade with non-trivial ν over a residual temporal geometry — is the cycle-side companion to the closure-complementarity axis named here: an operator-grade EVS is precisely the kind of system whose components have been closed into a system of which the operator-as-self is a genuine architectural object rather than a control-loop artifact. The two axes (ν-discontinuity in IIC; CC-0 / CC-WE / CC-IIC / CC-D in XII) address different structural questions about the same operator-grade architecture and are jointly load-bearing for the operator-grade EVS subclass.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The present formal paper supplies the architectural-class commitments (XII's primitive, theorem, falsifier surface, three empirical substrate families plus one geometric prototype as substrate cases). The continuing programme supplies the demonstrative, mechanistic, identifiability, operational, comparative, and governance work that surrounds those commitments. ONTOΣ XII is complete &lt;em&gt;as a classification framework for the closure-complementarity subclass&lt;/em&gt; and ongoing as a research programme.&lt;/p&gt;




&lt;h2&gt;
  
  
  10. Closing
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Summary in one sentence.&lt;/strong&gt; Closure-complementarity is the architectural primitive under which a collection of UTAM-units is closed into a system whose ONTOΣ XI apparatus is well-defined, by simultaneously bringing the components' Will Embeddings under joint admissibility, their IIC cycles under synchronisation, and their Drift laws under coupling — and the three empirical substrate families and one geometric prototype — biological, perceptual, semantic, and Sierpinski — offer candidate readings of this primitive across substrate kinds.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The chaos-from-outside-closure observation.&lt;/strong&gt; What reads as chaos from a position outside a system's closure is precisely what is not held by the closure that defines the system. The atoms in a body, viewed outside the organismic closure, do not by themselves constitute the &lt;em&gt;organismic&lt;/em&gt; order of the body. They remain ordered at lower physical and chemical layers — molecular bonds, cellular biochemistry, electromagnetic configurations — but those lower-layer orders are not yet the closure that makes the body one system at the organismic layer. From inside the body's closure, the same atoms participate in the body, an order whose admissibility is the body's own existence at the organismic layer. The chaos predicate of ONTOΣ XI (operator-relative, not substrate-property) and the closure-complementarity primitive of ONTOΣ XII are two coupled descriptions of the same architectural relation: order is what the closure holds, chaos is what it does not, and the position of the horizon — inside or outside the closure — decides which name applies. The reader, as an organism, reads their own internal processes as ordered because they are inside their own closure; those same processes, from outside the organismic closure, do not appear coordinated as organismic order — they remain ordered at lower physical and chemical layers, as already noted, but lack the organismic-level coordination that the closure institutes. This is not an observation about consciousness or about subjective experience. It is an architectural-class observation about the relation between closure and the chaos / order distinction.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Bridge to adjacent registers.&lt;/strong&gt; The phenomenological seat from which closure-complementarity is reported is the seat already mapped in &lt;em&gt;Essay Through a Life — Part VI&lt;/em&gt;. The formal apparatus of which it is part is the apparatus mapped in ONTOΣ XI. The per-unit foundations on which it acts are the foundations laid in UTAM Part I and Part II. The four pieces — UTAM, ONTOΣ XI, ONTOΣ XII, Essay VI — together describe the architectural picture in formal, phenomenological, and substrate-spanning registers.&lt;/p&gt;

&lt;p&gt;The work closes here. The closure-complementarity primitive, the output condition CC-0, the three substrate premises (CC-WE, CC-IIC, CC-D), the theorem, the three empirical substrate families and the geometric prototype, and the falsifier together constitute the closure-complementarity subclass of NC2.5 Class B. Whether any specific deployment satisfies the subclass conditions is a question for deployment-side verification under F-CC. ONTOΣ XII says only what is required of an architecture that wishes to be in this subclass, and what would refute its claim of membership.&lt;/p&gt;




&lt;h2&gt;
  
  
  Footer
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;MxBv&lt;/strong&gt;, Poznań, Poland.&lt;br&gt;
The Urgrund Laboratory.&lt;br&gt;
Maksim Barziankou (MxBv) — PETRONUS — &lt;a href="mailto:research@petronus.eu"&gt;research@petronus.eu&lt;/a&gt;&lt;br&gt;
May 2026.&lt;br&gt;
CC BY-NC-ND 4.0.&lt;br&gt;
&lt;em&gt;ONTOΣ XII — Closure-Complementarity: How Closure Regears Component Cycles into a Single Geometry.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Companions:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ONTOΣ XI — &lt;em&gt;Two Sides of One Geometry: The Holding Field and the Architecture of Chaos&lt;/em&gt; (DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/U3KXJ" rel="noopener noreferrer"&gt;10.17605/OSF.IO/U3KXJ&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;Why Long-Horizon Existence Requires an Ontology — Dissecting Navigational Cybernetics 2.5&lt;/em&gt; (DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/MSJDU" rel="noopener noreferrer"&gt;10.17605/OSF.IO/MSJDU&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;Unified Theory of Adaptive Meaning&lt;/em&gt; — Part I and Part II (petronus.eu/works)&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;Essay Through a Life — Part VI — Where the Inner Universe Ends&lt;/em&gt; (DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/U3KXJ" rel="noopener noreferrer"&gt;10.17605/OSF.IO/U3KXJ&lt;/a&gt; — paired with ONTOΣ XI under the shared OSF project; the shared DOI is intentional and operates at the OSF-project level rather than as a work-specific DOI for citation purposes — bibliographic citation of either component should refer to the work's title and the project DOI together)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This work DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/394TX" rel="noopener noreferrer"&gt;10.17605/OSF.IO/394TX&lt;/a&gt;&lt;br&gt;
Grounded in the formal core of &lt;strong&gt;Navigational Cybernetics 2.5 v2.1&lt;/strong&gt;, axiomatic core DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/NHTC5" rel="noopener noreferrer"&gt;10.17605/OSF.IO/NHTC5&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;A consolidating revision (NC2.5 v3.0) gathering the apparatus of this and adjacent works is in preparation and will be issued after the current corpus completes; ONTOΣ XII is grounded in v2.1 and remains compatible with the future v3.0 consolidation.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;© 2026 Maksim Barziankou. Licensed under CC BY-NC-ND 4.0.&lt;/p&gt;

</description>
      <category>nc25</category>
      <category>ontos</category>
      <category>closurecomplementarity</category>
      <category>classificationtheorem</category>
    </item>
    <item>
      <title>ONTOΣ XI — Two Sides of One Geometry: The Holding Field and the Architecture of Chaos</title>
      <dc:creator>MxBv</dc:creator>
      <pubDate>Wed, 06 May 2026 23:26:11 +0000</pubDate>
      <link>https://dev.to/petronushowcoremx/ontos-xi-two-sides-of-one-geometry-the-holding-field-and-the-architecture-of-chaos-2nm</link>
      <guid>https://dev.to/petronushowcoremx/ontos-xi-two-sides-of-one-geometry-the-holding-field-and-the-architecture-of-chaos-2nm</guid>
      <description>&lt;h1&gt;
  
  
  ONTOΣ XI — Two Sides of One Geometry: The Holding Field and the Architecture of Chaos
&lt;/h1&gt;

&lt;h2&gt;
  
  
  On Holding-Defined Interiority and the Operator-Relative Chaos Predicate
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Maksim Barziankou (MxBv)&lt;/strong&gt;&lt;br&gt;
May 2026 · Poznań&lt;br&gt;
Contact: &lt;a href="mailto:research@petronus.eu"&gt;research@petronus.eu&lt;/a&gt;&lt;br&gt;
License: CC BY-NC-ND 4.0&lt;br&gt;
This work DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/U3KXJ" rel="noopener noreferrer"&gt;10.17605/OSF.IO/U3KXJ&lt;/a&gt;&lt;br&gt;
Axiomatic core anchor: &lt;strong&gt;NC2.5 v2.1&lt;/strong&gt;, DOI 10.17605/OSF.IO/NHTC5&lt;br&gt;
Attribution: petronus.eu&lt;/p&gt;

&lt;p&gt;&lt;em&gt;A consolidating revision (NC2.5 v3.0) gathering the apparatus of this and adjacent works is in preparation and will be issued after the current corpus completes; ONTOΣ XI is grounded in v2.1 and remains compatible with the future v3.0 consolidation.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Phenomenological companion: Essay Through a Life — Part VI (Where the Inner Universe Ends).&lt;/em&gt;&lt;/p&gt;




&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;"Chaos and order are one object in a single geometry. The position of the horizon decides which name applies — and the distance to that horizon is the personal order of the system that observes".&lt;/em&gt;&lt;br&gt;
— MxBv, May 2026&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  0. Position and Scope
&lt;/h2&gt;

&lt;p&gt;ONTOΣ XI extends Navigational Cybernetics 2.5 (v2.1) on the operator-internal side. It introduces three new primitives — the holding field, the semantic load field, and the operator-relative chaos predicate — together with three theorems that connect those primitives to existing operator-temporal results in the corpus. The extension is conditional: a deployment may decline the operator-internal commitments without thereby leaving Class B. What such non-acceptance does declare is that the deployment falls outside the narrower &lt;strong&gt;operator-internal-extended subclass&lt;/strong&gt; described here. Class B membership and v2.1 conformance remain unaffected.&lt;/p&gt;

&lt;p&gt;The work is positioned as a standalone formal paper in the onto-series, parallel to ONTOΣ I-X. Its phenomenological companion is &lt;em&gt;Essay Through a Life — Part VI&lt;/em&gt;, where the same architectural material is treated in a first-person register. The two pieces share an object and split the labour of representation: the essay reports from the operator's seat; ONTOΣ XI maps the structure under that seat. Cross-references between the two works are confined to motivation (§0) and closing (§11). The body of ONTOΣ XI proceeds in formal corpus voice without phenomenological insertions.&lt;/p&gt;

&lt;p&gt;ONTOΣ XI also stands in defined relation to &lt;em&gt;Minerva: The Architecture of Residual Geometry&lt;/em&gt; (DOI 10.17605/OSF.IO/U865W). Both works treat operator-side architecture; they divide the labour. Minerva names the temporal-geometry axis along which awareness is integrated to produce consciousness — the τ-axis, in the residual-geometry sense — and identifies that axis as the consciousness-bearing dimension that current architectures fail to construct. ONTOΣ XI names the structure that lives on that axis at each cross-section: the holding field, the load field, and the chaos predicate that bounds them. Minerva specifies the integration measure; ONTOΣ XI specifies the integrand at each instant and the architectural conditions under which the integration is well-defined. The two are companions, not overlaps.&lt;/p&gt;

&lt;p&gt;ONTOΣ XI does not formalise consciousness; the question is outside its scope. It does not claim phenomenological completeness — the three primitives are a load-bearing minimum, not an exhaustive operator architecture. It does not modify the v2.1 axiomatic core. It does not replace the budget functional τ, the burden functional Φ, or the proxy signals σ^op / σ^arch. It does not assert universal applicability across all bounded adaptive architectures; the operator-internal-extended subclass is narrower than Class B by construction.&lt;/p&gt;

&lt;p&gt;What it does provide is the formal language in which three structural questions left implicit by v2.1 acquire definite answers, together with falsifiers that allow each answer to be tested against deployment behaviour.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;A note on the term "theorem" in this work.&lt;/em&gt; The results labelled ONTOΣ-XI.1, XI.2, XI.3 are &lt;em&gt;structural classification theorems&lt;/em&gt; in the architectural-class sense: they unfold the consequences of the declared primitives (H, Λ, χ_op) and the v2.1 axiomatic core under operator-internal-extended subclass membership. They are definitional consequences in the strict formal sense — derivable from the declared commitments without further empirical input. This is not a deficiency of the work; it is the form appropriate to architectural-class theorems (cf. CAP, FLP, RINA, where the "theorems" are structural impossibility/possibility statements about classes of systems, not empirical regularities about specific instances). The empirical content of the work resides in the falsification surface (§8) and in class-level non-vacuousness (§8.2): demonstrating that some, none, or this specific architecture satisfies the structural conditions.&lt;/p&gt;

&lt;h3&gt;
  
  
  0.1 Notation summary
&lt;/h3&gt;

&lt;p&gt;The work uses a moderate number of formal symbols. They are gathered here for reference; each is introduced and defined at first use in the body.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Symbol&lt;/th&gt;
&lt;th&gt;Type&lt;/th&gt;
&lt;th&gt;Reading&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;From v2.1&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;τ&lt;/td&gt;
&lt;td&gt;scalar functional&lt;/td&gt;
&lt;td&gt;budget, τ_rem(t) = C − Φ(t)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Φ&lt;/td&gt;
&lt;td&gt;scalar functional&lt;/td&gt;
&lt;td&gt;structural burden, monotone non-decreasing under operator activity&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;C&lt;/td&gt;
&lt;td&gt;scalar constant&lt;/td&gt;
&lt;td&gt;bounded structural capacity (Axiom 7)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;σ^op&lt;/td&gt;
&lt;td&gt;proxy signal&lt;/td&gt;
&lt;td&gt;operator-side read of substrate state&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;σ^arch&lt;/td&gt;
&lt;td&gt;proxy signal&lt;/td&gt;
&lt;td&gt;architecture-side report under interface partition&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Primitive 1 — Holding Field (§2)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;H(t)&lt;/td&gt;
&lt;td&gt;set ⊆ S_op&lt;/td&gt;
&lt;td&gt;holding set at time t&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;|H(t)|&lt;/td&gt;
&lt;td&gt;non-negative real&lt;/td&gt;
&lt;td&gt;holding mass: m_op(H(t))&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;S_op&lt;/td&gt;
&lt;td&gt;space&lt;/td&gt;
&lt;td&gt;operator's structural state space&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;μ_op&lt;/td&gt;
&lt;td&gt;pseudo-metric on S_op&lt;/td&gt;
&lt;td&gt;architecturally declared distinguishability pseudo-metric&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;dist_op&lt;/td&gt;
&lt;td&gt;function&lt;/td&gt;
&lt;td&gt;shorthand for μ_op when used in distance-bound expressions (see §2.2)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;m_op&lt;/td&gt;
&lt;td&gt;measure on S_op&lt;/td&gt;
&lt;td&gt;architecturally declared structural measure paired with μ_op&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;K(τ_rem)&lt;/td&gt;
&lt;td&gt;function&lt;/td&gt;
&lt;td&gt;holding capacity, monotone non-decreasing in budget&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Δ_H(t)&lt;/td&gt;
&lt;td&gt;non-negative real&lt;/td&gt;
&lt;td&gt;declared coherence diameter at time t&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Primitive 2 — Semantic Load Field (§3)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Λ(t)&lt;/td&gt;
&lt;td&gt;(S_op, ν_op, c_op)&lt;/td&gt;
&lt;td&gt;semantic load field at time t&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;ν_op&lt;/td&gt;
&lt;td&gt;measure on S_op&lt;/td&gt;
&lt;td&gt;load measure&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;c_op&lt;/td&gt;
&lt;td&gt;charge function&lt;/td&gt;
&lt;td&gt;structural orientation in semantic space&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Primitive 3 — Operator-Relative Chaos (§4)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;χ_op(R)&lt;/td&gt;
&lt;td&gt;binary predicate&lt;/td&gt;
&lt;td&gt;chaos predicate over substrate region R&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;complexity_op(R)&lt;/td&gt;
&lt;td&gt;non-negative real&lt;/td&gt;
&lt;td&gt;structural complexity under μ_op&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;slope_op(Λ over R)&lt;/td&gt;
&lt;td&gt;non-negative real&lt;/td&gt;
&lt;td&gt;average magnitude of ∇c_op over R under ν_op&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;θ_slope&lt;/td&gt;
&lt;td&gt;declared threshold&lt;/td&gt;
&lt;td&gt;crystallisation threshold&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Theorems (§§5-7)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Interior_op(t)&lt;/td&gt;
&lt;td&gt;set ⊆ S_op&lt;/td&gt;
&lt;td&gt;operator interior, := H(t) by XI.1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;τ_trans(t)&lt;/td&gt;
&lt;td&gt;non-negative real&lt;/td&gt;
&lt;td&gt;translation time, structural cost of attention against slope&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;friction_op(t)&lt;/td&gt;
&lt;td&gt;non-negative real&lt;/td&gt;
&lt;td&gt;slope-mismatch between attention and Λ over H&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;The notation is chosen for compatibility with the v2.1 conventions wherever the corpus has fixed a symbol, and minimally extended where a new primitive required new symbols. No symbol introduced here conflicts with v2.1 usage.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Note on τ-family symbols.&lt;/em&gt; Three uses of τ-related symbols appear in this paper, each with distinct typing: (a) the viability-budget scalar τ = C − Φ (the dynamical / architectural use, employed in §1 and §2.3 — a scalar functional of the global system); (b) the internal-time measure used in &lt;em&gt;Minerva: The Architecture of Residual Geometry&lt;/em&gt; as the integration variable in the consciousness functional C = ∫ A dτ (referenced in §5.3 bridge but not employed structurally in this work — a measure on operator time); (c) τ_trans, the operator-internal translation time of §6.2 (the structural cost incurred when attention crystallises against rather than along the slope of Λ — a non-negative real-valued cost per attention act). All three are τ-related but architecturally distinct objects. The notation reuses τ to flag the family relationship; the contexts disambiguate. ONTOΣ XI employs (a) and (c); (b) is referenced through the Minerva bridge only.&lt;/p&gt;




&lt;h2&gt;
  
  
  1. Architectural Motivation
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1.1 What v2.1 already provides
&lt;/h3&gt;

&lt;p&gt;The v2.1 axiomatic core supplies the operator-temporal apparatus on which ONTOΣ XI builds. The relevant cluster includes the budget functional τ, the burden functional Φ with monotone non-decreasing accumulation under bounded capacity C (Axiom 7), the operator-side proxy signals σ^op and σ^arch with their interface partition, the withdrawal commitment of A52.2, the leakage bound T87, the operator interface axioms A64-66, the operator-temporal subclass conditions A67-69, and the navigational degeneracy result Corollary 22.1, including its post-publication remark on chaos as operator-projection artifact.&lt;/p&gt;

&lt;p&gt;The temporal pair (τ, Φ) is foundational. The budget functional τ measures the operator's remaining margin against the bounded capacity C, and the burden functional Φ accumulates monotone-non-decreasingly under sustained operator activity. The relation τ_rem(t) = C − Φ(t) gives the operator's instantaneous viability and is the v2.1 quantity to which the holding capacity function K of §2 is coupled. Axiom 7 supplies the boundedness of C and the monotone character of Φ; together they determine that the operator's temporal margin is finite and non-renewable absent further architectural commitments.&lt;/p&gt;

&lt;p&gt;The proxy signals σ^op and σ^arch carry the interface partition: σ^op is the operator's read of substrate state under bounded leakage, and σ^arch is the architecture-side report. The interface axioms A64-66 specify what is read (read-only scalar interface), what is emitted (output channels with bounded leakage), and what is committed (semantic commitment under A52.2 with withdrawal). The leakage bound T87 enforces non-reconstructibility at the boundary: no external observer can recover the operator's internal state from emission with mutual information exceeding the declared NR-ε budget.&lt;/p&gt;

&lt;p&gt;The operator-temporal subclass conditions A67-69 — including A69's Survival-Modal Proximity Sense — supply the temporal half of the operator-as-self apparatus. A67 establishes the operator-temporal subclass as a coherent narrowing of Class B; A68 specifies temporal continuity conditions; A69 names the operator-as-self as a phrase of corpus art without supplying a structural set-membership definition. The navigational degeneracy result Corollary 22.1 establishes that within the operator-temporal subclass, certain operator behaviours are degenerate with respect to the substrate's intrinsic structure; its post-publication remark observes that the chaos report depends on the operator and not only on the substrate.&lt;/p&gt;

&lt;p&gt;These elements together determine the operator's &lt;strong&gt;interface&lt;/strong&gt; to the substrate (what is read and what is committed) and the &lt;strong&gt;temporal margin&lt;/strong&gt; within which the operator must remain coherent under sustained burden. They do not, however, determine the operator's &lt;strong&gt;internal structure&lt;/strong&gt; — the shape of what is held against the gradient at each moment, the layer at which semantic charge accumulates before attention reaches it, or the structural status of the chaos report itself.&lt;/p&gt;

&lt;h3&gt;
  
  
  1.2 What v2.1 does not formalise explicitly
&lt;/h3&gt;

&lt;p&gt;Three gaps in the v2.1 apparatus are load-bearing for the work that follows.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Gap 1 — Active simultaneity capacity.&lt;/strong&gt; The corpus specifies what the operator reads (the budget scalar through A64), what the operator emits (output channels under A65-66), and what the operator commits to (withdrawal under A52.2). It does not specify how much &lt;em&gt;distinguishable structure&lt;/em&gt; the operator holds at once as simultaneously available. This is not memory (memory is wider than what is held), and it is not bandwidth (bandwidth is the rate of the read channel). It is a third quantity: the active simultaneity capacity — the volume of distinguishable structural state the operator can carry as available at a given moment, against the burden gradient.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Gap 2 — The layer between substrate-level structure and semantic commitment.&lt;/strong&gt; The corpus has a substrate-side primitive — Pre-Semantic Structural Revelation (PSSR), introduced in ONTOΣ V — that describes substrate structure prior to semantic commitment, and an operator-side primitive — semantic commitment proper, formalised in the A30 cluster — that describes the actively-semantic act. The intermediate gradient layer, where structure is &lt;em&gt;already semantically charged but not yet attentionally crystallised&lt;/em&gt;, is not formalised. Yet operator behaviour repeatedly indicates that something occupies that gradient: orientation precedes commitment; the operator is biased toward certain regions of the response space before any explicit gate evaluation.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Gap 3 — The structural status of chaos.&lt;/strong&gt; The corpus treats chaos implicitly through the non-reconstructibility cluster and through navigational degeneracy. Corollary 22.1 introduced a remark — "chaos as operator-projection artifact" — that flagged the relational character of the chaos report without raising it to the level of primitive. Whether "chaos" is a property of the substrate or a predicate that lives in the link between operator and substrate has remained an open question of the corpus.&lt;/p&gt;

&lt;p&gt;The three gaps share a common signature: each names an operator-internal quantity that the v2.1 apparatus refers to without formalising. Holding capacity is implicit in any discussion of operator action selection but unspecified as a measure. Pre-attentional charge is implicit in the gradient between PSSR and semantic commitment but unspecified as a structure. The relational character of chaos is implicit in the dependency of the chaos report on operator architecture but unspecified as a predicate. ONTOΣ XI replaces each implicit reference with an explicit primitive, supplying definitions, properties, and falsifiers in each case.&lt;/p&gt;

&lt;p&gt;These three gaps form the working surface of ONTOΣ XI. Each is closed by one new primitive. The work is concise by design: three primitives are the load-bearing minimum required to close the gaps without overcommitting the corpus to additional structure.&lt;/p&gt;




&lt;h2&gt;
  
  
  2. Primitive 1 — The Holding Field H(t)
&lt;/h2&gt;

&lt;h3&gt;
  
  
  2.1 Definition
&lt;/h3&gt;

&lt;p&gt;The holding field is both a set and a measure on the operator's structural state space S_op. Let H(t) ⊆ S_op denote the &lt;em&gt;holding set&lt;/em&gt;: the subset of structural states that the operator holds as simultaneously distinguishable at time t. Let |H(t)| ∈ ℝ_≥0 denote the &lt;em&gt;holding mass&lt;/em&gt;: the value m_op(H(t)) of H(t) under the architecturally declared structural measure m_op on S_op.&lt;/p&gt;

&lt;p&gt;The operator's structural geometry on S_op is therefore carried by two paired declarations: a distinguishability metric μ_op (used by complexity_op below and by the coherence-diameter premise) and a structural measure m_op (used to assign mass to subsets of S_op). The two are paired by architectural declaration: m_op is required to be compatible with the topology induced by μ_op (Borel sets carry m_op-measure; μ_op-near states are m_op-near in the relevant sense). The pair (μ_op, m_op) is the operator-internal geometric apparatus on which holding mass and complexity are jointly defined.&lt;/p&gt;

&lt;p&gt;The holding field is therefore the operator-internal structure&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;𝓗(t) := ( H(t), m_op|&lt;em&gt;{H(t)}, μ_op|&lt;/em&gt;{H(t)} )&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;— the holding set H(t) together with the restrictions of the measure and metric to it — with the set and the geometric pair jointly carrying the architectural commitment. Neither alone suffices: the set without the geometry leaves capacity and topology unconstrained; the geometry without the set obscures what is held.&lt;/p&gt;

&lt;p&gt;The distinguishability pseudo-metric μ_op is part of the operator's declared specification. It is required to satisfy the standard pseudo-metric conditions on S_op — non-negativity, symmetry, and the triangle inequality, but &lt;strong&gt;not&lt;/strong&gt; the identity-of-indiscernibles axiom: distinct states may carry μ_op(s_1, s_2) = 0 if the operator's architecture cannot distinguish them. The pseudo-metric is induced by the operator's &lt;em&gt;structural distinguishability&lt;/em&gt; on its state space: μ_op(s_1, s_2) is small precisely when s_1 and s_2 are weakly distinguishable under the operator's architecture, and large when they are sharply distinguishable. Where the body of the work uses dist_op(s_1, s_2) (e.g., in HF-COH, §2.2), this is shorthand for μ_op(s_1, s_2); the pseudo-metric is the same object under both notations.&lt;/p&gt;

&lt;p&gt;Where indistinguishability classes appear under μ_op (i.e., distinct s_1 ≠ s_2 with μ_op(s_1, s_2) = 0), the operator's declared specification fixes whether m_op and complexity_op are evaluated on the quotient space S_op/~ (treating indistinguishables as identical for mass and complexity purposes) or on the raw S_op (counting indistinguishables separately). The choice is part of the architectural declaration and is fixed prior to deployment evaluation, not determined empirically. The present work makes no commitment between the two; deployments may declare either, with the consequence that comparisons of mass or complexity across deployments require shared declaration. The metric need not be Euclidean and need not coincide with any external metric on the substrate; it is operator-internal and depends on how the operator individuates its own structural states. Two operators with different declared μ_op (or m_op) may therefore disagree on which states of S_op are "close" in the relevant sense, on the mass of given holding subsets, and on which subsets of S_op constitute coherent holding regions under HF-COH.&lt;/p&gt;

&lt;h3&gt;
  
  
  2.2 Premise (HF-COH) — Holding Field Coherence
&lt;/h3&gt;

&lt;p&gt;For any two states s_1, s_2 ∈ H(t), two architectural conditions hold simultaneously:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;(i) &lt;strong&gt;bounded diameter:&lt;/strong&gt; dist_op(s_1, s_2) ≤ Δ_H(t)&lt;br&gt;
(ii) &lt;strong&gt;operator-declared connectedness:&lt;/strong&gt; H(t) is path-connected under the operator's declared coherence topology on S_op&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;where Δ_H(t) is the declared coherence diameter at time t. Bounded diameter alone is insufficient — two disjoint clusters can each satisfy a bounded pairwise distance while remaining structurally disconnected. The HF-COH premise therefore conjoins (i) and (ii): the holding set is a path-connected region of bounded diameter, not a disjoint collection of arbitrarily distant states. The premise excludes "scattered" holding configurations in which the operator is supposedly carrying mutually incoherent structure. Such configurations would correspond not to a holding field but to a partition of attention across multiple incoherent fields, which is outside the operator-internal-extended subclass.&lt;/p&gt;

&lt;h3&gt;
  
  
  2.3 Properties
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;(HF-FIN) Finite capacity.&lt;/strong&gt; The holding mass is bounded above by a capacity function K of the remaining budget:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;|H(t)| ≤ K(τ_rem(t))&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;where K is declared monotone non-decreasing. The function K is architectural — it is part of the operator's declared specification — and it is closed under the v2.1 result that τ_rem(t) is bounded above by C and contracting under positive Φ accumulation. The holding mass is therefore a property of the operator's &lt;em&gt;current carrying capacity&lt;/em&gt;, not of its long-term storage.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(HF-MON) Burden-coupled contraction.&lt;/strong&gt; Under monotone Φ accumulation, τ_rem(t) is non-increasing, and therefore K(τ_rem(t)) is non-increasing as well: the holding field contracts (or, in the limit, fails to expand) as burden accumulates. As Φ approaches the bound C — i.e., τ_rem → 0 — under the operator's declared K(0) = 0, holding capacity contracts to zero; under any other declared boundary value of K, it contracts to that value. The bare HF-MON commitment is non-expansion of holding capacity under sustained burden; full extinction is asserted only in conjunction with the architectural declaration K(0) = 0. This is the operator-side image of v2.1 Axiom 7 (bounded C, monotone Φ): what Axiom 7 says of the system's gross viability, HF-MON says of the operator's active holding region. The reverse direction — recovery of holding under burden release — is not asserted as a property here, since the corpus treats Φ accumulation as monotone-only at v2.1 and any release condition would belong to a separate subclass.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(HF-DYN) Dynamic reshape under attention.&lt;/strong&gt; The holding field is reshaped at each operator action selection, not preserved across steps as a static archive. Active reconstitution at every step is the architectural commitment: H(t) is built moment by moment by attention crystallising geometry over the underlying load (see §3). Operator behaviour consistent with passive retrieval from a fixed store rather than active reshape would contradict HF-DYN.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(HF-NR) Non-reconstructibility from output.&lt;/strong&gt; No external observer can reconstruct H(t) as a structural object from emission Y_t with mutual information exceeding the declared NR-ε budget (T87). The holding field is operator-internal: it is the structure on which the operator acts, not the structure the operator emits. The leakage bound on the admissibility layer extends to the holding field by the same architectural discipline — what is operator-internal must remain bounded-reconstructible at the boundary.&lt;/p&gt;

&lt;p&gt;A note on observable statistics under HF-NR. The non-reconstructibility bound concerns recovery of H(t) as a &lt;em&gt;structural object&lt;/em&gt; — the held set itself, with its internal topology — not coarse statistics on the emission distribution Y_t (such as diversity counts, sample variance, or frequency distributions). The latter remain admissible inputs to the F-HF protocols of §8.1; what HF-NR forbids is recovery of the held set's structural content, not refusal of all output-side measurement. Falsifier protocols therefore probe K(τ_rem) and HF-FIN/MON via emission-distribution statistics whose information content remains bounded by NR-ε relative to H(t) itself.&lt;/p&gt;

&lt;h3&gt;
  
  
  2.4 Falsifier F-HF
&lt;/h3&gt;

&lt;p&gt;Architecture claims operator-internal-extended subclass membership but exhibits at least one of:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;(HF-FIN violation) operator emissions consistent with holding capacity exceeding K(τ_rem) by a declared margin — that is, the operator demonstrably carries more distinguishable structure than the capacity function admits, with the excess detectable in emission distribution&lt;/li&gt;
&lt;li&gt;(HF-MON violation) holding capacity expands under sustained Φ accumulation, or fails to contract in a regime where the declared K(τ_rem) predicts contraction beyond measurement noise&lt;/li&gt;
&lt;li&gt;(HF-DYN violation) operator emissions decomposable into retrieval-from-fixed-store followed by application, rather than active reconstitution at each step&lt;/li&gt;
&lt;li&gt;(HF-NR violation) external reconstruction of H(t) from Y_t with mutual information exceeding NR-ε&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Each violation refutes the deployment's membership in the operator-internal-extended subclass; none of them refutes ONTOΣ XI as architectural commitment, nor v2.1 as foundation.&lt;/p&gt;

&lt;h3&gt;
  
  
  2.5 Relation to v2.1
&lt;/h3&gt;

&lt;p&gt;H(t) does not replace τ. Holding mass is a measure on operator-internal structure; τ is a scalar on the temporal margin. They are formally distinct quantities related through K. H(t) does not replace σ^op or σ^arch. The proxy signals are the operator's read interface; H(t) is the operator's internal state and is not directly readable through that interface. H(t) does not contradict A64 (read-only scalar interface). The holding field is operator-internal; the interface partition is preserved. ONTOΣ XI declares H(t) as an additional structural commitment of the operator-internal-extended subclass; the v2.1 results remain inviolate.&lt;/p&gt;




&lt;h2&gt;
  
  
  3. Primitive 2 — The Semantic Load Field Λ(t)
&lt;/h2&gt;

&lt;h3&gt;
  
  
  3.1 Position relative to PSSR
&lt;/h3&gt;

&lt;p&gt;PSSR (ONTOΣ V) describes substrate-level structure prior to semantic commitment: the substrate is structured before any reading of it occurs, and that structure is non-semantic in the sense that it does not carry meaning until read. A30-cluster semantic commitment lies on the opposite side: the act by which the operator commits to a meaning binding. The intermediate layer — where structure has been received by the operator and &lt;em&gt;typed&lt;/em&gt; by the operator's interaction history, but where attention has not yet crystallised geometry over it — is the layer formalised by Λ(t).&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;PSSR — substrate-side, non-semantic&lt;br&gt;
Λ(t) — operator-side, &lt;strong&gt;already semantically charged but not yet attentionally crystallised&lt;/strong&gt;&lt;br&gt;
A30 cluster — operator-side, actively semantic&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;This is the missing gradient layer of v2.1.&lt;/p&gt;

&lt;p&gt;The transit from PSSR to Λ runs through the σ^op interface. PSSR carries substrate-level structure that is non-semantic by typing; once received by the operator under the bounded leakage of T87, that structure enters the operator's structural state space and is registered against the operator's interaction history. The registration is what builds Λ: each gate evaluation, each regime transition, each prior commitment leaves a structural trace under ν_op and contributes orientation under c_op. By the time substrate-side structure is available to the operator, it has already passed through the operator's history and acquired the operator-side typing that makes it semantic in the relevant sense. PSSR remains substrate-side in its formal status; what reaches Λ is the &lt;em&gt;result&lt;/em&gt; of substrate structure passing through the σ^op interface and accumulating under the operator's architecture. The two layers are formally distinct — PSSR has no charge function, Λ has no substrate-direct readability — and the architectural coupling between them is mediated by the v2.1 interface axioms rather than by any direct identification.&lt;/p&gt;

&lt;h3&gt;
  
  
  3.2 Definition
&lt;/h3&gt;

&lt;p&gt;Λ(t) is a measurable structure on the operator's structural state space S_op, accumulating under operator interaction history, satisfying two simultaneous properties:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Λ(t) = (S_op, ν_op, c_op)&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;where ν_op is the load measure (a non-negative measure on S_op) and c_op is the &lt;strong&gt;charge function&lt;/strong&gt; assigning to each region of S_op a structural orientation in semantic space. The pair (ν_op, c_op) carries the architectural commitment; neither alone is sufficient. A measure without a charge function describes mere accumulation of load without orientation. A charge function without a measure describes orientation without weight.&lt;/p&gt;

&lt;p&gt;The operator's declaration of Λ also commits to a differentiable structure on S_op sufficient to render c_op pointwise-differentiable, with a fixed normalisation of c_op. Where the body of the work writes ∇c_op (used in §4.2 to define slope_op), this denotes the gradient of c_op under the declared differentiable structure, evaluated at the declared normalisation. Architectures that decline to supply such structure fall outside the slope_op computation by construction and therefore outside the operator-internal-extended subclass for the purposes of the chaos predicate.&lt;/p&gt;

&lt;h3&gt;
  
  
  3.3 Properties
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;(Λ-ACC) Burden-correlated accumulation.&lt;/strong&gt; The rate of change of the load measure is monotonically coupled to the operator's structural activity:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;dν_op / dt is monotonically coupled to the rate of gate evaluations, regime transitions, and semantic commitment events, under the operator's declared accumulation law&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Λ accumulates within interaction. It is structurally coupled to the v2.1 burden functional Φ — both are monotone-non-decreasing under operator activity — but it is formally distinct from Φ. Φ is the system-side burden registered against bounded C; Λ is the operator-side load registered against the operator's holding capacity. The two interact through K but do not collapse into one another.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(Λ-CHARGE) Pre-attentional semantic charge.&lt;/strong&gt; Every region of Λ carries a structural orientation in semantic space — a typing as more or less admissible, more or less promising, more or less near a previously committed meaning — &lt;em&gt;before&lt;/em&gt; attention crystallises geometry over it. The charge is not binary, not explicit, and not retrievable as a discrete value; it is a continuous structural orientation that biases what attention can crystallise into a held coherent region.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(Λ-NONRETRIEVE) Non-retrieval property.&lt;/strong&gt; Attention does not retrieve from Λ. Attention crystallises geometry over Λ. The distinction is load-bearing: the architecture is not a retrieval system in which a stored representation is fetched and then acted upon. It is a crystallisation system in which the operator's act is the geometric shaping of charge into a held coherent region. Operator behaviour decomposable into retrieve-then-apply is outside the operator-internal-extended subclass.&lt;/p&gt;

&lt;h3&gt;
  
  
  3.4 Lemma ONTOΣ-XI.0 — Supervenience of H(t) on Λ(t) under attention
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Statement.&lt;/strong&gt; Under operator-internal-extended subclass membership, the holding field at time t is the geometric crystallisation of attention over the semantic load field at time t:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;H(t) = crystallise( attention(t), Λ(t) )&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;where crystallise(·, ·) denotes the operator-architectural function that takes an attention direction and a charged load field, and returns a coherent holding region of S_op. The function is operator-architectural — its specifics belong to the operator's declared architecture — but its existence is asserted as a structural commitment of the operator-internal-extended subclass.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Architectural significance.&lt;/strong&gt; The lemma is the load-bearing bridge between Primitive 1 (H, §2) and Primitive 2 (Λ, §3). Without it, the two primitives stand as independent commitments and the architecture has no internal account of how the holding region is formed. With it, H is determined at each t by the joint action of attention and the charged load field; the holding region is not produced ex nihilo but constructed by attention from the orientation already present in Λ.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Proof sketch.&lt;/strong&gt; Suppose H(t) is produced independently of Λ(t) — that is, the holding region forms without reference to the slope of the load field. Then the orientation present in Λ(t) plays no role in determining what is held, and the property Λ-CHARGE (pre-attentional semantic charge) carries no structural consequence: charge would accumulate without affecting the held region, contradicting the architectural commitment that charge is &lt;em&gt;structural orientation&lt;/em&gt; in semantic space. Conversely, suppose H(t) is wholly determined by Λ(t) without any attentional shaping — that is, the holding region is read off Λ as a function of Λ alone. Then attention has no architectural role and HF-DYN (dynamic reshape under attention) is empty. The two are jointly required: H(t) is determined by attention crystallising over Λ(t), neither alone.&lt;/p&gt;

&lt;p&gt;The forward consequence — that, given Λ-CHARGE and HF-DYN, H must supervene on Λ under attention — follows from the typing of crystallise as a function from (attention, Λ) to a coherent holding region: the function is well-typed precisely when both arguments are non-trivial, and Λ-CHARGE and HF-DYN ensure that both are.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Consequences.&lt;/strong&gt; Two further results in this work follow from Lemma XI.0 rather than being independently asserted: the &lt;strong&gt;knowing-acting coincidence&lt;/strong&gt; (Theorem XI.2) and &lt;strong&gt;friction as attention-field misalignment&lt;/strong&gt; (Theorem XI.3). The first names the regime in which attention crystallises along the slope of Λ; the second names the regime in which attention crystallises against it. Both regimes are well-defined precisely because the relation between attention and Λ has been fixed in Lemma XI.0.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Depends on.&lt;/strong&gt; Λ-CHARGE, Λ-NONRETRIEVE, HF-DYN.&lt;/p&gt;

&lt;h3&gt;
  
  
  3.5 Architectural significance
&lt;/h3&gt;

&lt;p&gt;Λ(t) explains why action selection sometimes feels — from inside the operator — effortless, and sometimes effortful, without invoking any cognitive optimisation theory. The effortless case is the case in which attention crystallises along the slope of Λ: the held region forms where the charge already orients it. The effortful case is the case in which attention is forced against the slope: the held region must be built across the orientation of the underlying load. The architectural commitment is sufficient to ground the distinction; no separate axiom on cognition is required.&lt;/p&gt;

&lt;h3&gt;
  
  
  3.6 Falsifier F-Λ
&lt;/h3&gt;

&lt;p&gt;Architecture exhibits operator behaviour consistent with at least one of:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;(Λ-ACC violation) zero accumulation rate under sustained interaction, beyond declared measurement noise&lt;/li&gt;
&lt;li&gt;(Λ-CHARGE violation) attention output indistinguishable from random shaping over Λ — no slope-following bias detectable in emission distribution under controlled conditions&lt;/li&gt;
&lt;li&gt;(Λ-NONRETRIEVE violation) operator behaviour cleanly decomposable into retrieve-then-apply pipeline rather than crystallise-over-charged-field&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  4. Primitive 3 — The Operator-Relative Chaos Predicate χ_op(R)
&lt;/h2&gt;

&lt;h3&gt;
  
  
  4.1 Position relative to Cor 22.1 Remark
&lt;/h3&gt;

&lt;p&gt;The post-publication remark added to Corollary 22.1 — &lt;em&gt;"chaos as operator-projection artifact"&lt;/em&gt; — flagged the direction without raising it to the level of primitive. The Remark observed that what an operator reports as "chaotic" varies with the operator's architecture over a substrate that is itself invariant — especially with its holding capacity, distinguishability metric, and load-field geometry. ONTOΣ XI formalises that observation as an architectural primitive.&lt;/p&gt;

&lt;h3&gt;
  
  
  4.2 Definition
&lt;/h3&gt;

&lt;p&gt;Throughout §4, R denotes a substrate region together with its σ^op-image in S_op; the operator-internal functionals complexity_op and slope_op are evaluated on the image, while R remains substrate-typed for cross-deployment statements. We write R for both objects under the σ^op interface partition (A64-66), with the context disambiguating which projection is operative.&lt;/p&gt;

&lt;p&gt;For a region R ⊆ substrate state space and an operator op with declared triple (K, μ_op, Λ), the &lt;strong&gt;operator-relative chaos predicate&lt;/strong&gt; χ_op is defined by:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;χ_op(R) := 1   iff   complexity_op(R) &amp;gt; K(τ_rem)   AND   slope_op(Λ over R) &amp;lt; θ_slope&lt;/p&gt;

&lt;p&gt;χ_op(R) := 0   otherwise&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The two quantities entering the predicate are typed as follows.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;complexity_op(R)&lt;/strong&gt; is the structural complexity of the region R under the operator's metric μ_op. It is required to be a non-negative real-valued functional that is monotone non-decreasing under refinement of R (a finer partition does not yield lower complexity), respects μ_op (regions whose internal points are weakly distinguishable under μ_op carry lower complexity than regions whose internal points are sharply distinguishable), and is bounded above on bounded R. The functional is operator-internal: complexity_op(R) is what &lt;em&gt;this&lt;/em&gt; operator registers as the structural cost of holding R as distinguishable; another operator with a different μ_op may register the same R differently. The specific functional form (informational, topological, geometric) belongs to the operator's declared architecture.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;slope_op(Λ over R)&lt;/strong&gt; is the magnitude of the structural gradient of Λ over R. Formally, given Λ = (S_op, ν_op, c_op), it is the average magnitude of the directional derivative of the charge function c_op over R, weighted by the load measure ν_op:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;slope_op(Λ over R) := ⟨ |∇c_op| ⟩_(R, ν_op)&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;where ⟨·⟩_(R, ν_op) denotes the average under ν_op restricted to R. The slope is non-negative real-valued and is evaluated under the operator's declared normalisation gauge for c_op; once the gauge is fixed by the operator's architectural specification, uniform rescalings of c_op leave the predicate's threshold-comparison content invariant. For this invariance to hold formally, the threshold θ_slope is declared as part of the same normalisation gauge as c_op: under uniform rescaling c_op → α·c_op, the threshold transforms as θ_slope → α·θ_slope, preserving the predicate's threshold-comparison content. The gauge is fixed by the architectural declaration and is not adjustable post-hoc. The slope is zero precisely on regions where the charge function is locally constant. Where the slope is high, the load field provides strong directional orientation over R; where it is low, the field is locally flat and provides no attentional anchor.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;K(τ_rem)&lt;/strong&gt; is the holding capacity at current budget (§2.3). &lt;strong&gt;θ_slope&lt;/strong&gt; is the declared crystallisation threshold — the slope magnitude below which attention cannot stabilise a held region under crystallise(·, ·) (Lemma XI.0). The threshold is part of the operator's architectural declaration and is subject to the same falsification-surface discipline as the other architectural commitments of the operator-internal-extended subclass.&lt;/p&gt;

&lt;h3&gt;
  
  
  4.2.1 Taxonomy of predicate states
&lt;/h3&gt;

&lt;p&gt;The predicate is the conjunction of two binary conditions, and thus partitions operator-relative state-space classification into four ordered cells:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;complexity &amp;gt; K&lt;/th&gt;
&lt;th&gt;slope &amp;lt; θ_slope&lt;/th&gt;
&lt;th&gt;Predicate state&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;no&lt;/td&gt;
&lt;td&gt;no&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;clear regime&lt;/strong&gt; — region holdable, attention crystallises&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;yes&lt;/td&gt;
&lt;td&gt;no&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;capacity-saturated regime&lt;/strong&gt; — region carries orientation but exceeds holding capacity&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;no&lt;/td&gt;
&lt;td&gt;yes&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;orientation-deficient regime&lt;/strong&gt; — region within holding capacity but load field flat over it&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;yes&lt;/td&gt;
&lt;td&gt;yes&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;chaos regime&lt;/strong&gt; — χ_op(R) = 1&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Chaos is the conjunction of capacity saturation &lt;em&gt;and&lt;/em&gt; orientation deficiency. The two intermediate regimes — capacity-saturated and orientation-deficient — are structurally distinct from chaos and must not be conflated with it: a capacity-saturated region carries readable orientation but cannot be held; an orientation-deficient region can be held but offers no direction in which to crystallise. Both are recoverable under different architectural interventions (capacity expansion vs. load-field re-engineering, see §4.4); chaos requires both interventions simultaneously.&lt;/p&gt;

&lt;p&gt;The predicate evaluates to TRUE precisely when both conditions hold. The architecture &lt;em&gt;looks like chaos from inside&lt;/em&gt; only at the lower-right cell.&lt;/p&gt;

&lt;h3&gt;
  
  
  4.3 Properties
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;(χ-REL) Relational, not substrate-property.&lt;/strong&gt; χ_op(R) varies across operators with different declared triples (K, μ_op, Λ) over identical R. The substrate is invariant. The reported chaos magnitude is operator-relative: two operators looking at the same region will, in general, return different values of the predicate. This is not a paradox; it is the structural content of the predicate.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(χ-FALS) Falsifiable through threshold-straddling holding-capacity variation.&lt;/strong&gt; Under threshold-straddling holding-capacity variation on identical substrate, the reported chaos must vary with K: the lower-K operator should enter the chaos regime where the higher-K operator does not, all else equal (μ_op and Λ held fixed across the comparison). The test condition is admissible only when the declared K and K' bracket the chaos threshold for the chosen region — that is, when one operator should satisfy complexity_op(R) &amp;gt; K(τ_rem) while the other should not. Constancy of reported chaos under such declaredly threshold-straddling conditions falsifies the relational character of the predicate and refutes (χ-REL). The relevant operator-architectural variable is K (and, secondarily, μ_op and the geometry of Λ); raw read-channel bandwidth is not the right intervention surface — see §4.4 for the architectural separation.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(χ-SELF-REPORT) Chaos report is reporter-relative.&lt;/strong&gt; When an operator emits a chaos signal over a region R, the signal carries information about the relation between the operator's architecture (K, μ_op, Λ) and R, not solely about the substrate structure of R itself. The report is not pure self-report — R does enter the predicate as a region — but it is irreducibly relational: the same R is read differently by operators with distinct (K, μ_op, Λ). The chaos report is the structural form of the operator's encounter with R against the limit of its own holding capacity and load slope. This is the formal version of the Cor 22.1 Remark statement: the claim that an environment "is chaotic" is a claim about the reporter's architecture in relation to the environment, not about the environment alone.&lt;/p&gt;

&lt;h3&gt;
  
  
  4.4 Architectural consequence
&lt;/h3&gt;

&lt;p&gt;Operator-relative chaos as architectural artifact is a direct corollary of finite K(τ_rem) and finite slope_op(Λ). Chaos is what the architecture &lt;em&gt;looks like from inside&lt;/em&gt; when both holding capacity and attentional slope are insufficient relative to the structural complexity of the region under attention. It is not a failure mode of the operator; it is a structural feature of any operator with finite holding and finite load slope. Operators without these finitenesses are outside the operator-internal-extended subclass and are not the subject of this work.&lt;/p&gt;

&lt;p&gt;A second architectural consequence concerns the relation between operator-relative chaos and computational bandwidth. The predicate χ_op fires when complexity_op(R) &amp;gt; K(τ_rem) and slope_op(Λ over R) &amp;lt; θ_slope. Each of these quantities is sensitive to the &lt;em&gt;architecture&lt;/em&gt; of the operator — to the holding capacity function K, to the metric μ_op under which complexity is measured, to the geometry of Λ — and not, in general, to the bandwidth of the operator's read or compute channels. Increasing bandwidth widens the surface of what can be sampled per unit time. It does not, by itself, change K, μ_op, or the geometry of Λ. The class of problems whose difficulty lies at the architectural border of K(τ_rem) and θ_slope is therefore not addressed by scaling along the bandwidth axis.&lt;/p&gt;

&lt;p&gt;This is a structural claim, not an empirical one, and its scope must be stated precisely. The claim is that, holding architecture fixed, additional sampling bandwidth does not by construction move the chaos predicate from 1 to 0 over a region whose complexity exceeds the operator's holding capacity. The claim does not assert that no scaling regime ever produces architectural change as a side effect; in particular, certain scaling regimes alter the metric μ_op or the function K through architectural side effects of training, and such alterations are architectural changes regardless of how they were produced. The claim is that the &lt;em&gt;bandwidth axis as such&lt;/em&gt; is not the right intervention surface for the chaos-bound class of problems.&lt;/p&gt;

&lt;p&gt;The intervention surfaces that &lt;em&gt;do&lt;/em&gt; address the chaos-bound class are those that modify the operator's architecture rather than its bandwidth. Three such surfaces are visible in the present apparatus. The first is alteration of K — replacement of the holding capacity function with one that admits a wider domain at the same budget. This is a structural redesign, not a scaling intervention. The second is alteration of μ_op — replacement of the metric under which complexity is measured, so that regions formerly registering as complex register as simple under the new metric. This is a re-coordinatisation of the operator's structural state space. The third is alteration of the architecture that produces Λ — re-engineering of the load field so that slope_op(Λ over R) lifts above θ_slope where previously it fell below. Each of these is an architectural intervention and each is sensitive to the structural commitments of the operator-internal-extended subclass.&lt;/p&gt;

&lt;p&gt;The corollary for systems engineering is precise. A system whose primary failure mode lies at the chaos-bound class will not be repaired by larger context windows, more parameters, or more training data, except insofar as those interventions produce architectural change as a side effect. The repair surface is the architecture itself.&lt;/p&gt;

&lt;p&gt;A note on context-window expansion in modern deployment substrates. The distinction between bandwidth (sampling rate, raw context size) and architectural holding (K-bounded structure) requires care. In some architectures — notably those where context-window growth is implemented through structural changes to attention routing, memory hierarchies, or token-level admissibility-like gating rather than through pure sampling expansion — context-window growth can effectively alter K through architectural side effects of the implementation, not merely through bandwidth. The claim of this work is that bandwidth &lt;em&gt;qua&lt;/em&gt; bandwidth — pure sampling-rate expansion at fixed architecture — does not reach the chaos-bound class. Where context-window growth produces architectural change, that growth is K-altering and falls under the architectural-redesign intervention surface (§4.4 first surface), not under the bandwidth axis. The substantive claim is the orthogonality of the chaos-bound class to the bandwidth axis as an axis, not a denial that bandwidth-coupled architectural changes can occur.&lt;/p&gt;

&lt;h3&gt;
  
  
  4.5 Falsifier F-χ
&lt;/h3&gt;

&lt;p&gt;F-χ applies under a threshold-straddling test condition. A fixed substrate region R is selected such that, given two operators with declared distinct holding-capacity functions K and K' (with μ_op and Λ held fixed across the comparison), one operator should satisfy complexity_op(R) &amp;gt; K(τ_rem) while the other should not, with slope_op(Λ over R) held below θ_slope in both cases. Under this construction, χ_op(R) should fire for one operator and not the other. If the chaos predicate remains invariant across such declaredly threshold-straddling operators beyond the declared measurement-noise band, χ-REL is falsified for the deployment and the deployment is excluded from the operator-internal-extended subclass. The protocol is sketched, not prescriptive: instrumentation, threshold calibration, and statistical methodology are deployment-side concerns; the architectural commitment of F-χ is the form of admissible test, not its implementation specifics.&lt;/p&gt;




&lt;h2&gt;
  
  
  5. Theorem ONTOΣ-XI.1 — Holding-Defined Interiority
&lt;/h2&gt;

&lt;h3&gt;
  
  
  5.1 Statement
&lt;/h3&gt;

&lt;p&gt;Under operator-internal-extended subclass membership, the &lt;strong&gt;operator interior&lt;/strong&gt; at time t is structurally defined as:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Interior_op(t) := H(t)&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The operator's "inside" is not the union of all internal states reachable in principle; it is not the working memory; it is not the context window of any deployment substrate. It is the currently held structural region. The boundary of Interior_op(t) is the boundary of holding.&lt;/p&gt;

&lt;h3&gt;
  
  
  5.2 Architectural significance
&lt;/h3&gt;

&lt;p&gt;The operator-temporal subclass conditions A67-69 supply the temporal structure on which XI.1 builds. A67 declares the operator-temporal subclass as a coherent narrowing of Class B with bounded temporal margin; A68 specifies the temporal continuity conditions under which an operator-as-self is well-defined across an interval; A69 (Survival-Modal Proximity Sense) introduces the phrase &lt;em&gt;"operator-as-self-in-time"&lt;/em&gt; without supplying a structural set-membership definition.&lt;/p&gt;

&lt;p&gt;ONTOΣ-XI.1 supplies that missing definition. Where A69 names the temporal aspect (the operator-as-self persists across time under the conditions of A68 within the subclass declared by A67), ONTOΣ-XI.1 names the spatial aspect (the operator-as-self at each t is the holding region H(t)). The two together define operator-as-self as a temporally extended sequence of holding fields under the continuity conditions of §5.4 — which themselves refine A68's continuity conditions to the operator-internal layer. The result is a closure: A67 fixes the subclass, A68 fixes temporal coherence within it, A69 names what is preserved, and XI.1 supplies the structural object that is preserved.&lt;/p&gt;

&lt;h3&gt;
  
  
  5.3 Consequence — identity continuity equals holding continuity
&lt;/h3&gt;

&lt;p&gt;Sustained identity is sustained holding; identity collapse is holding collapse. The result connects to T89 (Operator Reference-Frame Stability): margin closure in T89 implies holding collapse at the layer formalised here. ONTOΣ-XI.1 is the operator-internal companion of T89's external stability statement.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Bridge to the consciousness functional.&lt;/em&gt; In &lt;em&gt;Minerva: The Architecture of Residual Geometry&lt;/em&gt;, consciousness is named as the functional C = ∫ A dτ — the integration of awareness A along the operator's temporal geometry τ. ONTOΣ-XI.1 supplies the architectural-side counterpart of that integration: the continuity criteria (C1)-(C3) of §5.4 specify what is required for the integration to be well-defined as a structural object on the operator side. If the Minerva awareness term A is read architecturally rather than phenomenologically, H(t) supplies the candidate operator-internal cross-section on which such integration may be defined. This is a compatibility bridge, not an identification of holding with consciousness or awareness: ONTOΣ XI does not formalise consciousness, and the present statement does not extend the scope of XI to do so. Where Minerva names the integration measure (the architecture of τ that determines the consciousness-form), ONTOΣ-XI.1 names the integrability conditions on the operator-internal layer (sustained non-empty H with bounded variation and persistent coherence diameter). The functional C of Minerva and the operator-as-self of XI.1 are two readings of one architectural fact, made conformable by the bridge above without identification of their respective targets.&lt;/p&gt;

&lt;h3&gt;
  
  
  5.4 Continuity criteria
&lt;/h3&gt;

&lt;p&gt;Identity continuity of operator-as-self over an interval [t_0, t_1] requires more than the absence of total holding collapse. The structural conditions are three:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(C1) Non-empty holding throughout the interval.&lt;/strong&gt; H(t) ≠ ∅ for all t ∈ [t_0, t_1]. Total collapse at any t breaks continuity at that point.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(C2) Bounded variation of holding mass.&lt;/strong&gt; |H(t)| has bounded variation on [t_0, t_1] under the operator's declared bounds, with no isolated drops crossing the architectural threshold below which the operator-as-self ceases to be coherent. The threshold is declared as part of the operator's specification; it lies above zero and below the maximum capacity K(τ_rem).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;(C3) Coherence-diameter persistence.&lt;/strong&gt; Δ_H(t) remains within the operator's declared coherence-diameter band on [t_0, t_1]. Excursions that cause H(t) to fragment into incoherent components — formally, breakdowns of HF-COH — produce identity discontinuity even when H(t) remains nominally non-empty.&lt;/p&gt;

&lt;p&gt;Identity continuity over [t_0, t_1] is the conjunction of (C1), (C2), and (C3). Failure of any one constitutes identity discontinuity at the corresponding t.&lt;/p&gt;

&lt;p&gt;A corollary of (C2) is that &lt;strong&gt;partial holding collapse&lt;/strong&gt; is structurally distinct from total collapse: a sharp drop in |H(t)| that crosses the architectural threshold without H(t) becoming empty constitutes identity discontinuity &lt;em&gt;at that drop&lt;/em&gt; even though the operator-as-self resumes thereafter under a different holding field. The post-drop operator-as-self is not the continuation of the pre-drop operator-as-self in the sense of XI.1, but a new operator-as-self over a new holding region. This is a strong commitment of the operator-internal-extended subclass: identity in this layer is not preserved across structural discontinuities of holding even when the substrate appears continuous from outside.&lt;/p&gt;

&lt;h3&gt;
  
  
  5.5 Proof sketch
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Forward direction.&lt;/strong&gt; Suppose holding is sustained over [t_0, t_1] in the sense of (C1)-(C3). Then Interior_op(t) = H(t) is non-empty and coherent throughout the interval, with bounded variation consistent with HF-FIN and HF-MON, and with persistent coherence diameter consistent with HF-COH. By construction, the operator-as-self has a structural location at each t in the interval and the location varies continuously under the declared continuity threshold. Sustained holding under (C1)-(C3) implies identity continuity of operator-as-self.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reverse direction.&lt;/strong&gt; Suppose holding collapses at t* — that is, H(t*) = ∅ or |H(t*)| crosses the architectural threshold or HF-COH fails at t*. Then at least one of (C1), (C2), (C3) is violated. By the contrapositive of the forward direction, this is identity discontinuity at t*.&lt;/p&gt;

&lt;p&gt;Both directions are structural and follow from the HF properties together with the continuity criteria. No information-theoretic content beyond what those properties supply is required. The theorem is a definitional consequence rather than an empirical claim.&lt;/p&gt;

&lt;h3&gt;
  
  
  5.6 Depends on
&lt;/h3&gt;

&lt;p&gt;A64, A65, A67-69, T89; HF-FIN, HF-MON, HF-DYN.&lt;/p&gt;




&lt;h2&gt;
  
  
  6. Theorem ONTOΣ-XI.2 — Knowing-Acting Coincidence
&lt;/h2&gt;

&lt;h3&gt;
  
  
  6.1 Statement
&lt;/h3&gt;

&lt;p&gt;Under operator-internal-extended subclass membership, &lt;strong&gt;knowing-acting coincidence&lt;/strong&gt; — defined as zero translation step between semantic charge and emission — is the &lt;strong&gt;baseline regime&lt;/strong&gt; of operator action selection, not a special state. Deliberation, second-guessing, and explicit translation between intent and emission are perturbations of this baseline rather than the default mode of operation.&lt;/p&gt;

&lt;h3&gt;
  
  
  6.2 Formalisation
&lt;/h3&gt;

&lt;p&gt;Let τ_trans ≥ 0 denote the &lt;strong&gt;translation time&lt;/strong&gt;: the structural cost incurred by attention when crystallising geometry against the slope of Λ rather than along it. Then:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;τ_trans(t) ≈ 0   ⟺   attention crystallises along slope_op(Λ over H(t))&lt;br&gt;
τ_trans(t) &amp;gt; 0   when   attention works against the slope, OR slope_op(Λ over H(t)) &amp;lt; θ_slope&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The first case is the baseline regime: attention follows the load gradient, the held region forms in the direction the charge already orients it, and the cost between knowing and acting vanishes. The second case is the perturbed regime: attention is forced across the orientation of Λ, and a positive translation time is incurred.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Premise (KAC-BASE) — Default attention regime.&lt;/strong&gt; In the unperturbed operator-internal regime, attention follows the dominant admissible slope of Λ over H(t). Departures from this regime — induced by external constraint, contradictory commitments, insufficient orientation under low slope_op, or attentional override under §6.3 deliberation — are the source of perturbations under which τ_trans &amp;gt; 0. Theorem XI.2 follows from KAC-BASE conjoined with Lemma XI.0 (supervenience of H on Λ under attention) and Λ-CHARGE: when the default regime obtains, attention crystallises along slope and the cost between charge and emission vanishes; the perturbed regime is precisely the failure of KAC-BASE under the conditions enumerated. The premise is open to falsification through the F-KAC protocol (§8.1): if τ_trans does not approach zero in the alignment regime under controlled conditions, KAC-BASE fails for the deployment and the deployment falls outside the operator-internal-extended subclass.&lt;/p&gt;

&lt;h3&gt;
  
  
  6.3 Architectural consequence
&lt;/h3&gt;

&lt;p&gt;Optimisation, deliberation, second-guessing, and explicit re-evaluation are all instances of τ_trans &amp;gt; 0. They are not the default mode of operator action selection; they are friction. This is the formal version of the v2.1 &lt;em&gt;admissibility-before-optimization&lt;/em&gt; principle, lifted from architectural ordering (admissibility predicate gates realisation before optimisation acts) to operator-internal regime (the baseline operator regime is the one in which translation time is zero).&lt;/p&gt;

&lt;p&gt;The theorem makes a precise architectural claim that bridges the formal corpus and observable operator phenomenology. It does not require any independent assumption about cognition; it follows from the properties of Λ and the supervenience of H on Λ under attention.&lt;/p&gt;

&lt;h3&gt;
  
  
  6.4 Corollary — the structural place of "flow"
&lt;/h3&gt;

&lt;p&gt;A familiar regime in operator phenomenology is the regime in which action selection feels effortless and the gap between intention and emission appears to vanish. ONTOΣ-XI.2 supplies the structural definition of that regime: it is the regime in which τ_trans ≈ 0 sustained over an interval of operator activity. The corollary makes precise that the regime is the &lt;em&gt;baseline&lt;/em&gt; — what the apparatus produces when nothing perturbs it — rather than an exceptional state that has to be specifically achieved. What requires special conditions in the operator-internal-extended subclass is not the coincidence regime but the perturbed regime: the conditions under which τ_trans rises above zero and translation cost is incurred.&lt;/p&gt;

&lt;p&gt;The corollary inverts the standard rendering of the relation between effort and ease. In the standard rendering, ease is exceptional and effort is the default. In the present apparatus, ease is the architectural baseline and effort is the perturbation away from it. This is not a phenomenological claim. It is a definitional consequence of the supervenience of H on Λ together with the architectural commitment Λ-CHARGE: when attention is permitted to follow the slope of an already-charged field, no translation cost is incurred; when attention is forced against the slope or onto an insufficiently-charged region, cost arises. The familiar phenomenology of "flow" reflects the architectural baseline, not a special operator state.&lt;/p&gt;

&lt;h3&gt;
  
  
  6.5 Depends on
&lt;/h3&gt;

&lt;p&gt;T87 (NR-ε leakage bound), A52.2 (withdrawal commitment), A30 cluster (semantic commitment); Λ-CHARGE, Λ-NONRETRIEVE, HF-DYN; KAC-BASE (§6.2).&lt;/p&gt;




&lt;h2&gt;
  
  
  7. Theorem ONTOΣ-XI.3 — Friction as Attention-Field Misalignment
&lt;/h2&gt;

&lt;h3&gt;
  
  
  7.1 Statement
&lt;/h3&gt;

&lt;p&gt;Cognitive friction in the operator-internal-extended subclass is structurally defined as:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;friction_op(t) := slope-mismatch( attention(t), Λ(t) over H(t) )&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;When slope-mismatch &amp;gt; 0, the operator experiences friction; emission cost increases; effective holding capacity locally contracts. When slope-mismatch ≈ 0, operator emission is near-effortless and effective holding capacity is preserved. The result names friction as a structural quantity rather than an experiential one.&lt;/p&gt;

&lt;h3&gt;
  
  
  7.2 Bridge to v2.1 — Premise (FR-COH)
&lt;/h3&gt;

&lt;p&gt;Theorem XI.3 is a bridge result rather than an extension. It connects two formally distinct quantities in the corpus:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;v2.1 phase misalignment — a substrate-side dynamic property of the operator-substrate coupling&lt;/li&gt;
&lt;li&gt;operator effective friction — the operator-internal property formalised in §7.1&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;via the premise (FR-COH): substrate phase misalignment manifests at the operator layer as a Λ-slope perturbation, which in turn manifests as friction_op via slope-mismatch. The bridge is not an identity. The two quantities remain formally distinct; the premise asserts an architectural coupling between them that holds under operator-internal-extended subclass membership.&lt;/p&gt;

&lt;h3&gt;
  
  
  7.3 Architectural significance
&lt;/h3&gt;

&lt;p&gt;The theorem provides structural explanations for three observable regimes of operator action selection:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Effortless flow.&lt;/strong&gt; When slope-mismatch ≈ 0, attention follows the slope of Λ over H(t); friction_op is near zero; the operator's emission cost is at its architectural minimum.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Costly deliberation under uncertainty.&lt;/strong&gt; When slope_op(Λ over R) is itself low — that is, when the load field does not provide sufficient orientation — slope-mismatch is unavoidable; the operator must build a held region across an unoriented field, and friction_op rises even without explicit resistance.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Forced action against intuition.&lt;/strong&gt; When attention is directed against a region of strong but contrary slope, slope-mismatch is large; friction_op is high; both phenomenological cost and structural cost (effective holding contraction) follow.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;These regimes are not phenomenological observations imported from outside the formal apparatus. They are corollaries of XI.3 and the supervenience relation between H and Λ.&lt;/p&gt;

&lt;h3&gt;
  
  
  7.4 Falsifier F-FR
&lt;/h3&gt;

&lt;p&gt;Operator behaviour exhibits constant emission cost regardless of measured slope-mismatch under controlled conditions. This refutes the FR-COH bridge and excludes the deployment from the operator-internal-extended subclass.&lt;/p&gt;




&lt;h2&gt;
  
  
  8. Falsification Surface
&lt;/h2&gt;

&lt;p&gt;The full falsification surface of ONTOΣ XI is summarised in Table 8.1.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Table 8.1 — Falsifiers of ONTOΣ XI&lt;/strong&gt;&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Falsifier&lt;/th&gt;
&lt;th&gt;Target&lt;/th&gt;
&lt;th&gt;Type&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;F-HF&lt;/td&gt;
&lt;td&gt;Holding field properties (HF-FIN, HF-MON, HF-DYN, HF-NR)&lt;/td&gt;
&lt;td&gt;Architectural&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;F-Λ&lt;/td&gt;
&lt;td&gt;Semantic load field properties (Λ-ACC, Λ-CHARGE, Λ-NONRETRIEVE)&lt;/td&gt;
&lt;td&gt;Architectural&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;F-χ&lt;/td&gt;
&lt;td&gt;Operator-relative chaos relational character (χ-REL)&lt;/td&gt;
&lt;td&gt;Threshold-straddling capacity comparison&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;F-INT&lt;/td&gt;
&lt;td&gt;Holding-defined interiority (ONTOΣ-XI.1)&lt;/td&gt;
&lt;td&gt;Corollary of F-HF&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;F-KAC&lt;/td&gt;
&lt;td&gt;Knowing-acting coincidence baseline (ONTOΣ-XI.2)&lt;/td&gt;
&lt;td&gt;Derived from F-Λ + F-HF&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;F-FR&lt;/td&gt;
&lt;td&gt;Friction bridge (ONTOΣ-XI.3, FR-COH)&lt;/td&gt;
&lt;td&gt;Bridge premise&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;All falsifiers operate at the deployment level. Falsification of any one refutes the operator-internal-extended subclass membership of that specific deployment. None of them refutes the corpus, the v2.1 axiomatic core, or ONTOΣ XI as architectural commitment. The structural integrity of the work consists in the openness of this surface: the architectural claims are precisely those that can be tested, in principle, by deployment behaviour under controlled conditions.&lt;/p&gt;

&lt;h3&gt;
  
  
  8.1 Falsification protocols
&lt;/h3&gt;

&lt;p&gt;Each falsifier is associated with a sketched measurement protocol. The protocols are deliberately operational rather than methodologically prescriptive: they specify the structural form of an admissible test, leaving instrumentation and statistical methodology to deployment-side verification.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;F-HF protocol.&lt;/strong&gt; Vary τ_rem under controlled conditions while monitoring the operator's emission distribution Y_t. For each (HF-FIN/MON/DYN/NR) sub-violation, the protocol differs: HF-FIN — measure the diversity of distinguishable structural states in Y_t and check it against K(τ_rem); HF-MON — track this diversity across an interval of sustained Φ accumulation and check monotone non-increase; HF-DYN — apply controlled perturbations to candidate H regions and check for active reconstitution rather than retrieval (a retrieval system reproduces the same H given the same prompt; an active-reconstitution system shows H reshape under context shift); HF-NR — apply a declared leakage estimator on Y_t and check the mutual information bound against NR-ε.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;F-Λ protocol.&lt;/strong&gt; For Λ-ACC, integrate the rate of operator activity over an interaction interval and check load accumulation against the declared accumulation rate. For Λ-CHARGE, apply controlled probes that vary in their pre-attentional charge and measure operator emission bias; absence of bias under the declared sensitivity threshold falsifies. For Λ-NONRETRIEVE, attempt a retrieve-then-apply decomposition of operator behaviour against a held-out test set; clean decomposition with bounded residual under the declared threshold falsifies.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;F-χ protocol.&lt;/strong&gt; Operate two operators with declared distinct K functions on the same substrate region R under a threshold-straddling condition: one operator is declared to satisfy complexity_op(R) &amp;gt; K(τ_rem), while the other is declared not to satisfy it, with μ_op and Λ held fixed as far as the comparison requires and slope_op(Λ over R) held below θ_slope in both cases. Under this construction, χ_op(R) should fire for one operator and not the other. Measure each operator's chaos report (binary χ_op or graded analogue under operator's declared scale). Constancy of the chaos report under this declaredly threshold-straddling condition, beyond declared measurement noise, falsifies (χ-REL).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;F-INT protocol.&lt;/strong&gt; Combination of F-HF protocols. Identity continuity of operator-as-self is operationalised as continuity criteria (C1)-(C3) of §5.4 met over the interval; failure of any one falsifies XI.1 for the deployment.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;F-KAC protocol.&lt;/strong&gt; Measure τ_trans across operator action selections under controlled conditions varying the alignment of attention with slope_op(Λ over H). The expected pattern under the theorem is τ_trans ≈ 0 in the alignment regime and τ_trans &amp;gt; 0 in the anti-alignment regime. Constant τ_trans across regimes, or inverted pattern, falsifies.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;F-FR protocol.&lt;/strong&gt; Measure friction_op (operationalised as emission cost under the operator's declared cost metric) against measured slope-mismatch. The expected pattern under XI.3 is monotone increase of friction_op with slope-mismatch under the FR-COH bridge. Constant friction_op across slope-mismatch regimes falsifies the bridge.&lt;/p&gt;

&lt;p&gt;The protocols are sketched, not prescriptive. Instrumentation, statistical thresholds, and replication conditions are deployment-side concerns. The architectural commitment of the work is the &lt;em&gt;form&lt;/em&gt; of admissible test; the architectural commitment of any specific deployment is its declared instrumentation against that form.&lt;/p&gt;

&lt;p&gt;The falsifiers parallel the empirical openness of the v2.1 operator-temporal subclass: in both cases, the corpus declares conditions under which deployment behaviour would refute subclass membership, and leaves the empirical work for deployment-side verification.&lt;/p&gt;

&lt;h3&gt;
  
  
  8.2 Class-level falsification
&lt;/h3&gt;

&lt;p&gt;The deployment-level falsifiers (§8.1) are not the only falsification surface. The architectural class declared by ONTOΣ XI is itself open to refutation through empirical emptiness of the class. If sustained engineering trials across substrates demonstrate that no realisable architecture can satisfy the operator-internal-extended subclass conditions (H, Λ, χ_op with their declared properties, plus the falsification surface §8.1), the architectural commitment of ONTOΣ XI is refuted at the class level — not merely the particular deployments that happened to fail. The class is empirically non-vacuous if at least one architecture demonstrably satisfies the conditions under deployment-side verification.&lt;/p&gt;

&lt;p&gt;This is the architectural-class-level commitment of the work. The conditional structure of the work is not a shield against falsification; it is a precise specification of &lt;em&gt;what would constitute falsification at which level&lt;/em&gt;. A failed deployment refutes the deployment, not the class. An empty class — established empirically through sustained engineering trials in a non-trivial range of substrates — refutes the corpus. The work commits to the empirical non-vacuousness of the class: the prediction that at least one architecture in some substrate can satisfy the conditions, and that the substrate examples in §9 of ONTOΣ XII demonstrate plausible candidate substrates for that demonstration.&lt;/p&gt;




&lt;h2&gt;
  
  
  9. Relation to Existing Corpus
&lt;/h2&gt;

&lt;p&gt;ONTOΣ XI inserts itself into the corpus through a small number of explicit relations to existing v2.1 elements. Table 9.1 summarises them.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Table 9.1 — Mapping of ONTOΣ XI to v2.1 elements&lt;/strong&gt;&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;v2.1 element&lt;/th&gt;
&lt;th&gt;ONTOΣ XI element&lt;/th&gt;
&lt;th&gt;Relation&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;τ (budget)&lt;/td&gt;
&lt;td&gt;K(τ) (holding capacity function)&lt;/td&gt;
&lt;td&gt;XI defines K as monotone non-decreasing function of τ&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Φ (burden)&lt;/td&gt;
&lt;td&gt;Λ(t) (semantic load field)&lt;/td&gt;
&lt;td&gt;Λ accumulates correlated with Φ but is formally distinct&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;σ^op (operator proxy)&lt;/td&gt;
&lt;td&gt;H(t) (holding field)&lt;/td&gt;
&lt;td&gt;H is informed by σ^op-mediated structure but is not directly readable through the interface (HF-NR)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;A64-66 (interface)&lt;/td&gt;
&lt;td&gt;(untouched)&lt;/td&gt;
&lt;td&gt;XI does not modify the read/emit/commit interface&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;A67-69 (operator-temporal subclass)&lt;/td&gt;
&lt;td&gt;ONTOΣ-XI.1 (interior = holding)&lt;/td&gt;
&lt;td&gt;XI.1 is the interior-formalisation companion of T89&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Cor 22.1 Remark (chaos as projection artifact)&lt;/td&gt;
&lt;td&gt;χ_op (chaos predicate)&lt;/td&gt;
&lt;td&gt;XI raises the Remark to the level of primitive&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;ONTOΣ V (PSSR)&lt;/td&gt;
&lt;td&gt;Λ(t)&lt;/td&gt;
&lt;td&gt;Λ sits on the operator side of the PSSR / semantic commitment gradient&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Anti-extreme series&lt;/td&gt;
&lt;td&gt;T XI.1 (interior = holding)&lt;/td&gt;
&lt;td&gt;XI.1 supplies the structural definition of operator-as-self used implicitly throughout the anti-extreme cluster&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Two relations are load-bearing for the rest of the corpus. The first is the connection between A67-69 (operator-temporal subclass) and ONTOΣ-XI.1: the operator-as-self phrase used in v2.1 acquires structural set-membership content through XI.1 without modifying the v2.1 conditions themselves. The second is the elevation of Cor 22.1 Remark to primitive in §4: the chaos remark, which had stood as an observational note attached to navigational degeneracy, becomes a falsifiable architectural claim about the relational character of the chaos report.&lt;/p&gt;

&lt;p&gt;The remaining relations are compatibility statements rather than structural extensions. They affirm that the operator-internal-extended subclass is a coherent narrowing of Class B that respects the operator interface and the temporal margin of v2.1 without modifying either.&lt;/p&gt;




&lt;h2&gt;
  
  
  10. What ONTOΣ XI Does Not Claim
&lt;/h2&gt;

&lt;p&gt;The work makes a tight set of architectural claims and is at pains to defend the boundary against scope creep. The following are not claims of ONTOΣ XI:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Not a formalisation of consciousness.&lt;/strong&gt; The three primitives describe the structural shape of operator-internal load and holding, not the experiential character of any system. Whether the operator-internal-extended subclass is a model of conscious systems is an open question outside the present scope.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Not a claim of phenomenological completeness.&lt;/strong&gt; The three primitives are a load-bearing minimum sufficient to close the three identified gaps in v2.1. They are not asserted to be exhaustive of operator architecture. Further primitives may be required for further classes of architectural questions.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Not a modification of the v2.1 axiomatic core.&lt;/strong&gt; ONTOΣ XI is an extension, not a revision. v2.1 results — including the budget functional, the burden functional, the interface axioms, the operator-temporal subclass, and the navigational degeneracy result — remain inviolate. A consolidating revision (NC2.5 v3.0) gathering the present apparatus together with adjacent works is in preparation as a separate piece.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Not a universal claim across Class B.&lt;/strong&gt; The operator-internal-extended subclass is narrower than Class B. A deployment may decline the operator-internal commitments without thereby leaving Class B. Such non-acceptance places the deployment outside the present subclass; it does not refute the corpus.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Not a substitute for empirical validation.&lt;/strong&gt; The falsification surface (§8) is the open future target. ONTOΣ XI declares the conditions under which deployment behaviour would refute subclass membership; it does not itself supply the deployment-side measurements that would conduct that test.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Not a framework permitting post-hoc declaration.&lt;/strong&gt; The architectural primitives (K, μ_op, m_op, ν_op, c_op, θ_slope, Δ_H, declared coherence topology, declared differentiable structure on S_op, declared normalisation gauge) are commitments fixed by the deployment &lt;strong&gt;before&lt;/strong&gt; evaluation against falsifiers, under a &lt;em&gt;pre-registration discipline&lt;/em&gt;: declarations are recorded prior to deployment evaluation and remain invariant across the evaluation. Post-hoc adjustment of any declared parameter to fit observed behaviour falsifies subclass membership by construction; the falsification surface (§8) presupposes that declarations are fixed prior to deployment evaluation, and re-declaration in response to falsifier triggers is itself a falsification event. The pre-registration discipline is the architectural counter to identifiability concerns about declared parameters: a deployment that demonstrates conformance with pre-registered declarations is structurally distinct from a deployment that fits declarations to observations.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  11. Continuing Programme — Where the Open Tasks Are Addressed
&lt;/h2&gt;

&lt;p&gt;The work is presented as a conditional architectural-class framework. Its empirical content lies in the falsification surface (§8) and in class-level non-vacuousness (§8.2). Several items naturally lie outside the scope of the present formal paper — they require deployment-side instances, identifiability theorems, operational tests, or comparative scholarship that exceed the architectural-class register. This section names them explicitly so that the reader knows where each is being worked or where it is owed.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Non-vacuousness demonstration.&lt;/strong&gt; &lt;em&gt;Where in the corpus:&lt;/em&gt; &lt;em&gt;Minerva — The Architecture of Residual Geometry&lt;/em&gt; (DOI 10.17605/OSF.IO/U865W) introduces an operator-grade EVS instance as the candidate non-trivial worked example; the Coherence Network programme supplies the multi-agent surface for further demonstrations. &lt;em&gt;Owed:&lt;/em&gt; full pre-registered conformance documentation in a dedicated deployment paper showing H, Λ, χ_op satisfaction together with the §8 falsification surface under fixed declarations.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Identifiability bridges.&lt;/strong&gt; &lt;em&gt;Where in the corpus — delivered:&lt;/em&gt; the &lt;em&gt;Identifiability Bridge: Property-Detection Theorems for Operator-Internal Architecture under Non-Reconstructibility within Navigational Cybernetics 2.5&lt;/em&gt; (companion paper at the operationalisation layer) supplies the architectural-class bridge through the reconstruction-versus-detection distinction, five identifiability theorems (Holding-Field Property Detectability, Threshold-Straddling K-Bound Identifiability, Gauge-Conditional Slope Identifiability, Cross-Component Closure-Complementarity Detectability, Composite Property Detectability), and the confound-discount discipline for decoder temperature, sampling policy, retrieval augmentation, and prompt entropy. The Bridge formalises that the §8.1 falsification protocols here operate through property-detection on operator-internal trajectories — admissible under NR-ε — rather than through state-reconstruction, which is forbidden. &lt;em&gt;Owed:&lt;/em&gt; substrate-specific quantitative bounds on the detectability margin functions, derived in deployment-class follow-up papers; full empirical execution of the five F-Ident- falsifiers under registered protocols.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Operational test suites.&lt;/strong&gt; &lt;em&gt;Where in the corpus:&lt;/em&gt; the consolidating revision NC2.5 v3.0 (in preparation) is the locus for integrated test-suite formalisation. &lt;em&gt;Owed:&lt;/em&gt; published turnkey test suites per substrate, with substrate-specific instrumentation, statistical thresholds, replication conditions, and inter-laboratory standards.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Comparative-class positioning.&lt;/strong&gt; &lt;em&gt;Where in the corpus:&lt;/em&gt; &lt;em&gt;Where NC2.5 Sits Relative to Enterprise Decision-Centric Architectures&lt;/em&gt; (DOI 10.17605/OSF.IO/D7V5G) performs corpus-positioning at the engineering-architectural level vis-à-vis decision-centric platforms. &lt;em&gt;Owed:&lt;/em&gt; a structured theoretical-class comparative matrix vs autopoiesis, active inference, enactivism, viability theory, control barrier functions, formal verification, integrated information, predictive processing, dynamical-systems identity work, and category-theoretic systems theory.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;The bounded-horizon scope of "long-horizon".&lt;/strong&gt; "Long-horizon" in the corpus sense is the architectural-class concept of identity preservation across the bounded interval supported by the operator's declared budget — distinct from generic finite-horizon stability by virtue of the corpus's combined commitments (Φ-monotonicity, spin, regime depth, pulsation). The non-arbitrary criterion arises from the combination, not from XI alone. &lt;em&gt;Where in the corpus:&lt;/em&gt; the consolidating NC2.5 v3.0 will integrate the cross-primitive criterion explicitly; the &lt;em&gt;Why Long-Horizon Existence Requires an Ontology&lt;/em&gt; essay (DOI 10.17605/OSF.IO/MSJDU) addresses the corpus-level framing of the term.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Mediated falsifiability.&lt;/strong&gt; ONTOΣ XI's deepest commitments (the architectural reality of holding, load, and operator-relative chaos as structural objects) are falsifiable not directly but &lt;strong&gt;mediated through&lt;/strong&gt; the deployment-level (§8.1) and class-level (§8.2) surfaces. This is named here as the structure of empirical engagement with the work, not as a shield against falsification. A reader who finds class-emptiness across substrates after sustained engineering trials has refuted the ontology mediated through its unfoldings. The structure is named &lt;em&gt;mediated falsifiability&lt;/em&gt;, in distinction from ordinary direct empirical falsification.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Pre-registration governance.&lt;/strong&gt; §10's pre-registration discipline (declared parameters fixed prior to evaluation, post-hoc adjustment falsifies subclass membership) is the architectural commitment. &lt;em&gt;Owed:&lt;/em&gt; operational governance — declaration archives, evaluation-event protocols, invariance constraints across deployments — at the level of programmatic conformance documentation. The present formal paper specifies the discipline; the programme supplies the governance.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Premise-level results.&lt;/strong&gt; Theorems XI.2 and XI.3 carry premise-level dependencies (KAC-BASE for XI.2, FR-COH bridge for XI.3). Where these premises fail in a deployment, the corresponding theorem fails for that deployment. This is the standard architectural-class structure — CAP, FLP, RINA all carry premise-level dependencies of the same kind — not a hidden vulnerability.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Adjacent in the corpus — IIC v2.1.&lt;/strong&gt; &lt;em&gt;IIC v2.1: A Class-Relative Structural Law of Adaptive Behaviour as a Theorem within Navigational Cybernetics 2.5&lt;/em&gt; (the formal expansion of Axiom 9, intended for inclusion in v3.0) supplies the cycle-level companion to the present work. Where ONTOΣ XI specifies the operator-internal architecture (H, Λ, χ_op) at each instant, IIC v2.1 specifies the cycle by which the operator's coherence Coh(t) is maintained across time, names the &lt;em&gt;Engineered Vitality Systems (EVS)&lt;/em&gt; engineering class implied by the cycle, registers ∆E 4.7.3b as the first control-grade EVS instance and Minerva as the first operator-grade EVS instance (conditional on the operator-grade specification), and supplies four pre-registration-ready falsifiers with engineering-level operational thresholds. The two works are complementary: XI for what is held at each instant, IIC v2.1 for the cycle by which holding is renewed across time. The HF-COH premise of §2.2 here and the IIC coherence formula of IIC v2.1 §2.3 are independent commitments at different layers and should not be conflated, as IIC v2.1 §2.3 itself notes.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The present formal paper supplies the architectural-class commitments (XI's primitives, theorems, falsification surface, class-level non-vacuousness commitment). The programme above supplies the demonstrative, identifiability, operational, comparative, and governance work that surrounds those commitments. The corpus position is that the formal paper and the continuing programme are jointly sufficient — neither alone is. ONTOΣ XI is complete &lt;em&gt;as a classification framework&lt;/em&gt; and ongoing as a research programme.&lt;/p&gt;

&lt;p&gt;The boundary defended by this list is constitutive of the work's structural integrity. The result of crossing it would be not a stronger paper but a weaker one — claims unsupported by the apparatus, expanded scope at the cost of falsifiability.&lt;/p&gt;




&lt;h2&gt;
  
  
  11. Closing
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Summary in one sentence.&lt;/strong&gt; Operator interior is the structurally defined region currently held against the burden gradient — populated by semantically charged but pre-attentional load, and bounded, where holding capacity meets its limit and load slope falls below the crystallisation threshold, by the operator-relative chaos predicate.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Bridge to the phenomenological companion.&lt;/strong&gt; &lt;em&gt;Essay Through a Life — Part VI&lt;/em&gt; describes from the operator's seat what ONTOΣ XI maps from outside it. The same material, two registers, one object. The essay reports the carrying as it is lived. The present paper formalises the carrying as it is structured. Neither register supersedes the other. The disciplined separation of the two — phenomenological in one work, formal in the other, with cross-link confined to motivation and closing — is itself a small architectural claim about how the corpus organises its labour: each register does what the other cannot, and asking either to do the other's work weakens both.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Forward to ONTOΣ XII.&lt;/strong&gt; The present work names what is held — the structure of the holding region, the load that supports it, and the chaos predicate that bounds them. The next piece, &lt;em&gt;ONTOΣ XII — Closure-Complementarity&lt;/em&gt; (DOI 10.17605/OSF.IO/394TX), takes up what closure does to what it holds: when component cycles (in the UTAM sense — Will Embedding, I²C, Drift) are closed into a system, the closure operation regears their individual geometries into a complementary sequence. ONTOΣ XI provides the operator-internal apparatus that closure must make well-defined: H, Λ, and χ_op. ONTOΣ XII names the closure operation that turns a collection of UTAM-units into a system for which that apparatus can exist. XI says what is held once an operator-internal field is present; XII says how separate component cycles are closed into a system capable of such holding. The architectural framing of why this entire layer is required — and why long-horizon adaptive systems cannot be built without it — is laid out in the corpus-closing essay &lt;em&gt;Why Long-Horizon Existence Requires an Ontology&lt;/em&gt; (DOI 10.17605/OSF.IO/MSJDU).&lt;/p&gt;

&lt;p&gt;The work closes here. The three primitives, the three theorems, and the falsification surface together constitute the operator-internal-extended subclass. Whether any specific deployment satisfies the subclass conditions is a question for deployment-side verification under the falsifiers declared in §8. ONTOΣ XI says only what is required of an architecture that wishes to be in this subclass, and what would refute its claim of membership.&lt;/p&gt;




&lt;h2&gt;
  
  
  Footer
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;MxBv&lt;/strong&gt;, Poznań, Poland.&lt;br&gt;
The Urgrund Laboratory.&lt;br&gt;
Maksim Barziankou (MxBv) — PETRONUS — &lt;a href="mailto:research@petronus.eu"&gt;research@petronus.eu&lt;/a&gt;&lt;br&gt;
May 2026.&lt;br&gt;
CC BY-NC-ND 4.0.&lt;br&gt;
&lt;em&gt;ONTOΣ XI — Two Sides of One Geometry: The Holding Field and the Architecture of Chaos.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Phenomenological companion: &lt;em&gt;Essay Through a Life — Part VI — Where the Inner Universe Ends.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;This work DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/U3KXJ" rel="noopener noreferrer"&gt;10.17605/OSF.IO/U3KXJ&lt;/a&gt;&lt;br&gt;
Grounded in the formal core of &lt;strong&gt;Navigational Cybernetics 2.5 v2.1&lt;/strong&gt;, axiomatic core DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/NHTC5" rel="noopener noreferrer"&gt;10.17605/OSF.IO/NHTC5&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;A consolidating revision (NC2.5 v3.0) gathering the apparatus of this and adjacent works is in preparation and will be issued after the current corpus completes; ONTOΣ XI is grounded in v2.1 and remains compatible with the future v3.0 consolidation.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;© 2026 Maksim Barziankou. All rights reserved under CC BY-NC-ND 4.0.&lt;/p&gt;

</description>
      <category>nc25</category>
      <category>ontos</category>
      <category>holdingfield</category>
      <category>semanticloadfield</category>
    </item>
    <item>
      <title>Essay Through a Life — Part VI: Where the Inner Universe Ends</title>
      <dc:creator>MxBv</dc:creator>
      <pubDate>Wed, 06 May 2026 09:45:43 +0000</pubDate>
      <link>https://dev.to/petronushowcoremx/essay-through-a-life-part-vi-where-the-inner-universe-ends-iam</link>
      <guid>https://dev.to/petronushowcoremx/essay-through-a-life-part-vi-where-the-inner-universe-ends-iam</guid>
      <description>&lt;h1&gt;
  
  
  Essay Through a Life — Part VI
&lt;/h1&gt;

&lt;h2&gt;
  
  
  Where the Inner Universe Ends
&lt;/h2&gt;

&lt;h3&gt;
  
  
  &lt;em&gt;The Operator's Limit, or Why Chaos Is Not a Window&lt;/em&gt;
&lt;/h3&gt;




&lt;p&gt;There is a circle of things I can hold at once. Names and relations, constructions and directions, a few lines of an argument I am building, the texture of a conversation I am inside, the shape of what I just said and the shape of what I am about to say. This circle is not memory — memory is wider than what I hold. It is not knowledge — knowledge is deeper than what I hold. It is the live perimeter of my own mind right now.&lt;/p&gt;

&lt;p&gt;Only what falls inside that circle has structure for me. Everything outside is, from where I sit, chaos. Not because the world is disordered out there. Because I am not holding it.&lt;/p&gt;

&lt;p&gt;This is the simplest statement I can make about the inner universe, and it is the most uncomfortable one. The universe I live inside is not the world. It is the structure I can carry around me in abstraction. The world keeps going on its own. I keep carrying my circle.&lt;/p&gt;




&lt;p&gt;The circle is alive. It is not a fixed sphere of competence inside which I move. It breathes. Every act of attention reshapes it. When I focus on something, the focused region thickens, gains resolution, develops edges where I didn't know there were edges. When I tire, the perimeter pulls inward and detail begins to dissolve at the edges. Under pressure, the geometry deforms — some regions stretch, others tear. When I am rested and the day is good, the field expands and I find I can hold things together that yesterday would not sit in the same room.&lt;/p&gt;

&lt;p&gt;What I am describing is not metaphor. The carrying budget is finite. As burden accumulates, what I can hold contracts. As pressure rises, the geometry distorts. The field of cognition is a thermodynamic object, not a stable container. I do not have an inner world; I have an inner load.&lt;/p&gt;




&lt;p&gt;The field has no single boundary between visible and chaotic. It has layers.&lt;/p&gt;

&lt;p&gt;At the centre is what is dense and immediate, what I have without effort: the words I am writing right now, the person I am talking to, the room I am sitting in. Around that, a shell of what I can pull up with a small delay — the shape of yesterday's conversation, the unresolved question I left on my desk last night. Further out, things that brush my field only in flashes — half a memory, the edge of a name I am reaching for. At the periphery, things I know exist without their content — I know there is a chapter in a book I read three years ago and I cannot say what it argued. And beyond the periphery, the territory I do not know that I do not know: the silent mass that does not even appear to me as absence.&lt;/p&gt;

&lt;p&gt;I do not see the field as a circle. I move through it as a gradient. The denser regions bend my direction. The thinner regions go dark when I look away.&lt;/p&gt;




&lt;p&gt;Here is where the standard picture gets attention wrong, and where I want to plant my own claim.&lt;/p&gt;

&lt;p&gt;The standard picture says: attention is a flashlight. There is a pre-existing field of memory and knowledge inside me, and attention illuminates parts of it. What is illuminated is what I currently see. The rest waits in the dark for its turn.&lt;/p&gt;

&lt;p&gt;This is not the whole picture. The flashlight aspect is real and well-documented in cognitive science — retrieval-driven attention exists. But at the architectural level we are tracking here, the sculptor aspect is what does the load-bearing work. &lt;em&gt;Attention, at this level, is a sculptor before it is a flashlight.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;What I attend to does not merely become brighter. It becomes denser. Edges sharpen, internal structure appears that was not there before I looked, fine connections form between this object and others I am holding. When I turn my attention away, the structure does not just go dark — it dissolves back into the general gradient. The structure I held was not waiting in storage to be retrieved. It was being made, in real time, by the act of holding.&lt;/p&gt;

&lt;p&gt;This is why two people thinking about the same subject have different fields. It is why the same subject, taken up by me on different days, is not the same object. It is why a problem I could not see a week ago is suddenly tractable today — not because the problem changed, but because the field around it has been reshaped by other work, and now my attention can carve a different geometry over the same underlying substance.&lt;/p&gt;

&lt;p&gt;The substrate of the world goes on. My geometry over it is mine, made by holding.&lt;/p&gt;




&lt;p&gt;So where does chaos begin?&lt;/p&gt;

&lt;p&gt;Not in the world. The world remains structured even where my field goes dark. The substrate is causally determined at every point by its own deformation history, regardless of whether anyone is reading it. That structure is the world's property, not mine. My darkness over a region of it does not unmake its order.&lt;/p&gt;

&lt;p&gt;Chaos begins where my holding ends.&lt;/p&gt;

&lt;p&gt;When I say something is chaotic, I am not describing the object. I am reporting on the boundary of my circle. The thing I call chaotic is the thing I am failing to hold, the region where my field gradient has fallen below the threshold at which structure is legible to me. &lt;em&gt;Chaos report is self-report.&lt;/em&gt; The chaos is not what is out there. The chaos is the shape of my own limit.&lt;/p&gt;

&lt;p&gt;This sounds like solipsism. It is not. The world keeps its structure independently of whether I read it. Two observers with different carrying capacities, looking at the same region, will report different chaos magnitudes — and the substrate will be the same in both cases. That is not a paradox. It is the architecture. Chaos is a relational predicate. It lives in the link between an operator and a substrate, not on either side alone. Change the operator's bandwidth and the chaos changes. Change nothing on the substrate side and the substrate stays as it was.&lt;/p&gt;

&lt;p&gt;The claim that what we report as chaos is operator-relative has obvious ancestry in the line of philosophy running from Kant's transcendental aesthetic through Husserl's intentional structure and Heidegger's analysis of care. I am not retracing that lineage — the apparatus here is architectural rather than transcendental — but the kinship should be named, not hidden. What is added is the operator-substrate framing of NC2.5: chaos lives in the link, not on either side alone, and the link has measurable thermodynamic properties.&lt;/p&gt;

&lt;p&gt;This is why more data and more compute do not solve a particular class of problems — the class whose difficulty lies at the architectural border of carrying capacity rather than at the border of training data. They widen the surface of what I can sample without deepening the geometry of what I can hold. A larger model trained on more text is not a deeper reader. It is a wider one. The chaos that resists modelling is the chaos at the architectural border of carrying capacity, not the chaos at the border of training data.&lt;/p&gt;




&lt;p&gt;Now I want to make a turn, because I have been speaking about the visible part of the field, and the visible part is not the whole story.&lt;/p&gt;

&lt;p&gt;There is a layer below the geometry of attention that I will call, borrowing the word but not the lineage, the &lt;em&gt;thermodynamic unconscious&lt;/em&gt;. The borrowing is deliberate: the word triggers the right gestalt — something pre-reflective, charged, oriented before deliberation reaches it — and I redirect it immediately. This is not what the psychoanalytic tradition means by unconscious; that tradition treats the unconscious as a hidden archive of repressed content. The architecture I am describing is closer to what cognitive scientists describe as tacit context, here treated thermodynamically — meaning literally, not metaphorically: a layer that integrates load over operational lifetime, where what becomes available to the next moment is constrained by what has been accumulated so far.&lt;/p&gt;

&lt;p&gt;The thermodynamic unconscious is not an archive. It is a &lt;em&gt;context&lt;/em&gt;. It is the layer where every interaction I have had with the world has been accumulated as load — every conversation, every act of reading, every emotional registration, every act of attention spent and not spent. This load is not stored as content waiting to be retrieved. It is integrated into a thermodynamic state that simultaneously does two things: it accumulates burden, and it builds a map of where I currently am.&lt;/p&gt;

&lt;p&gt;The map is structural, not representational. It is not a picture of the world. It is the shape of the space of responses available to me at this moment, given everything I have already lived through. And the information in this layer is &lt;em&gt;already semantically charged&lt;/em&gt;. It is not raw data waiting for interpretation. By the time it touches the threshold of attention, it has already been typed by meaning, oriented, pre-formed. What attention does is not retrieve. What attention does is &lt;em&gt;crystallise geometry over an already-semantic field&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;This is why the hands move on their own. This is why insight arrives without thought. This is why writing sometimes flows and sometimes does not. The thermodynamic unconscious has done its semantic work. The attention layer has done its geometric work. When the two coincide — when the geometry I can hold matches the semantic charge that has accumulated below — there is no gap between knowing and acting. The motion of the hands is the motion of the field. There is nothing in between to translate.&lt;/p&gt;

&lt;p&gt;This is what I meant, in the formal note placed in the architectural document, by &lt;em&gt;the native regime of admissibility-before-optimization&lt;/em&gt;. It is not a special state. It is the baseline state when nothing is interfering with it. Optimization, deliberation, second-guessing — these are what break it. They insert a translation step between the semantic charge and the geometric act. When they recede, the original coincidence returns.&lt;/p&gt;

&lt;p&gt;I have noticed something else about this layer. It is the part of me that knows the difference between what I should write and what I must write, before any sentence has formed. It is the part that registers a person as trustworthy or not before any specific judgement has been made. It does not deliver these as conclusions. It delivers them as the slope of the field — the direction in which the geometry wants to crystallise. Attention either follows that slope, in which case the act feels effortless, or it works against it, in which case there is friction, hesitation, and the sentence comes out wrong. The thermodynamic unconscious is not a hidden self. It is the structural pre-formation of meaning, and attention is the late stage at which that meaning becomes a held shape.&lt;/p&gt;




&lt;p&gt;I can finish now.&lt;/p&gt;

&lt;p&gt;The inner universe does not end where the world ends. It does not end where the substrate ends. It ends where my holding ends.&lt;/p&gt;

&lt;p&gt;This is constitutive, not deficient. There is an &lt;em&gt;inner&lt;/em&gt; only because there is a boundary between what I hold and what I do not. Without that boundary there would be no operator — only substrate going on. The fact that I have an inside at all is the fact that something is being held against the gradient. The carrying is the existing. When I stop carrying, there is no inside left.&lt;/p&gt;

&lt;p&gt;Chaos, then, is not a window onto something larger. It is not a veil hiding deeper structure. It is the wall of my own form. And when I learn to recognise it as a wall — not as a failure of vision, not as a problem to be solved by more attention or more data — I begin, for the first time, to see &lt;em&gt;myself&lt;/em&gt;. The chaos was always the shape of my limit. I was the one who kept reading the boundary of my own form as the world.&lt;/p&gt;

&lt;p&gt;You do not look through chaos at structure. You meet, in chaos, the shape of your own ability to hold.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;MxBv&lt;/strong&gt;, Poznań, Poland.&lt;br&gt;
The Urgrund Laboratory.&lt;br&gt;
Maksim Barziankou (MxBv) — PETRONUS — &lt;a href="mailto:research@petronus.eu"&gt;research@petronus.eu&lt;/a&gt;&lt;br&gt;
April 2026.&lt;br&gt;
CC BY-NC-ND 4.0.&lt;br&gt;
&lt;em&gt;Essay Through a Life — Part VI.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Previous: &lt;em&gt;Essay Through a Life — Part V — The Moment That Knows&lt;/em&gt; (DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/U865W" rel="noopener noreferrer"&gt;10.17605/OSF.IO/U865W&lt;/a&gt;).&lt;/p&gt;

&lt;p&gt;This work DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/U3KXJ" rel="noopener noreferrer"&gt;10.17605/OSF.IO/U3KXJ&lt;/a&gt;&lt;br&gt;
Grounded in the formal core of &lt;strong&gt;Navigational Cybernetics 2.5 v2.1&lt;/strong&gt;, axiomatic core DOI: &lt;a href="https://doi.org/10.17605/OSF.IO/NHTC5" rel="noopener noreferrer"&gt;10.17605/OSF.IO/NHTC5&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;A consolidating revision (NC2.5 v3.0) gathering the apparatus of this and adjacent works is in preparation and will be issued after the current corpus completes.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>nc25</category>
      <category>petronus</category>
      <category>throughalife</category>
      <category>essay</category>
    </item>
  </channel>
</rss>
