HomeDocs-Technical WhitePaper33-EFT.WP.Cosmo.EarlyObjects v1.0

Chapter 12 — Error Budget & System Safeguards


I. One-Sentence Goal

Establish an end-to-end error model and protection framework for early objects from causation (seed/trigger) → growth (state) → radiation (L_nu/LC) → propagation (n_eff, segmentation, two forms) → observation (T_arr/Delta_T_arr/F_nu/LC). Provide both GUM and MC uncertainty propagation, two-form–specific errors, thin/thick switching tau_switch, interface energy closure and sidedness, differential out-of-band leakage, c_ref drift, coordinate/unit consistency, and auditable criteria for spectral and causation parameter ill-posedness and clamping/saturation—together with falsification lines.


II. Scope & Non-Goals

Covered: error stratification and sources; two-form GUM/MC propagation formulae; spectrum–arrival joint propagation; thin/thick consistency; safeguard checklist; energy closure and sidedness; differential OOB leakage; path discretization and quadrature error; c_ref calibration/drift; K-correction and luminosity distance; guardband and falsification; logging and interface anchors.
Not covered: re-derivation of Chs. 3–9; detailed instrument response; any propagation construct violating n_eff ≥ 1.


III. Minimal Terms & Symbols


IV. Error Stratification & Sources


V. GUM Uncertainty Propagation (Two-Form Arrival Time)

Constant pull-out (discrete approximation)

T_arr ≈ (1/c_ref) * ∑_{k=0}^{N-1} n_eff[k] • Δell[k]

Sensitivities:

∂T_arr/∂c_ref = − T_arr / c_ref

∂T_arr/∂n_eff[k] = Δell[k] / c_ref

∂T_arr/∂Δell[k] = n_eff[k] / c_ref

Combination:

u_c^2(T_arr) ≈ (∂T/∂c_ref)^2 u^2(c_ref)

+ ∑ ( (Δell[k]/c_ref)^2 u^2(n_eff[k]) )

+ ∑ ( (n_eff[k]/c_ref)^2 u^2(Δell[k]) )

+ 2∑∑ ρ_ij (∂T/∂q_i)(∂T/∂q_j) u(q_i) u(q_j)

with q_i ∈ { c_ref, n_eff[*], Δell[*] }. Report the correlation model ρ_ij.

General form (discrete approximation)

T_arr ≈ ∑ ( n_eff[k] / c_ref[k] ) • Δell[k]

Sensitivities:

∂T_arr/∂n_eff[k] = Δell[k] / c_ref[k]

∂T_arr/∂c_ref[k] = − n_eff[k] • Δell[k] / c_ref[k]^2

∂T_arr/∂Δell[k] = n_eff[k] / c_ref[k]

Model the spatio-temporal correlation of c_ref[k] (and its correlation with n_eff[k]) explicitly in V_ξ.


VI. Spectrum↔Arrival Joint Propagation (GUM View)

Observation model:

F_nu(f_obs) = L_nu(f_em)/(4π D_L^2) • K(z_obs), f_em = f_obs • (1+z_obs)

Illustrative first-order sensitivities:

∂F_nu/∂L_nu = [K / (4π D_L^2)], ∂F_nu/∂D_L = − 2 F_nu / D_L,

∂F_nu/∂z ≈ (∂K/∂z) • L_nu / (4π D_L^2)

Build a joint block covariance over {T_arr, F_nu, LC}, carrying cross-terms from θ_growth / params_sed / n_eff / c_ref for joint fitting and GUM composition of u_c.


VII. MC Propagation (Nonlinearity, Clamping & Events)

Use when: n_eff ∈ [1,n_max] clamping, discrete Delta_T_sigma triggers, interface type switching, significant c_ref(x,t,f) variation, or strongly nonlinear multi-path weights.
Flow:


VIII. Two-Form–Specific Error & Consistency


IX. Thin/Thick Switching Error & Safeguards


X. Differential & Out-of-Band Leakage

Same-path differential:

Delta_T_arr = (1/c_ref) ∫ ( n_path(f1) − n_path(f2) ) d ell (constant pull-out)

Delta_T_arr = ∫ ( ( n_path(f1) − n_path(f2) ) / c_ref ) d ell (general form)

Consistency: share the same { gamma[k], Δell[k] }, segmentation, and Delta_T_sigma settings across the two bands; fold OOB residuals into u_sys and record leakage ratio & alignment policy.


XI. Path Discretization, Quadrature & Interpolation


XII. c_ref Calibration & Drift Guard


XIII. K-Correction, Luminosity Distance & Spectral Errors


XIV. Clamping, Saturation & Nonlinearity


XV. Bias Detectors, Falsification Lines & Guardband

Detectors:

Falsification: meet any detector and rule out implementation/metrology error → register a falsification sample and enter Ch. 11 audit; three independent reproducible falsifications on the same dimension trigger P70-* and parameterization review.
Guardband: GB = k_guard • u_c; edge samples enter a review queue and receive MC re-checks.


XVI. Logging & Audit (Minimal Fields)


XVII. Interfaces & Implementation Binding (Aligned with Template; I70-* Safety Checks)

Constraints: enforce n_eff ≥ 1 and lower-bound auditing at ingress; differential reuse of identical path discretization and correction settings.


XVIII. Cross-References


XIX. Deliverables


Copyright & License (CC BY 4.0)

Copyright: Unless otherwise noted, the copyright of “Energy Filament Theory” (text, charts, illustrations, symbols, and formulas) belongs to the author “Guanglin Tu”.
License: This work is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0). You may copy, redistribute, excerpt, adapt, and share for commercial or non‑commercial purposes with proper attribution.
Suggested attribution: Author: “Guanglin Tu”; Work: “Energy Filament Theory”; Source: energyfilament.org; License: CC BY 4.0.

First published: 2025-11-11|Current version:v5.1
License link:https://creativecommons.org/licenses/by/4.0/