Preprint
Article

This version is not peer-reviewed.

The Synchronization Latency Principle: Geometric Coherence, Informational Audit, and the Emergence of Inertia and Mass

Submitted:

24 December 2025

Posted:

24 December 2025

Read the latest preprint version here

Abstract
We formulate an operational hypothesis—the Synchronization Latency Principle—as a disciplined extension of an “Information Audit” viewpoint within a locality-preserving quantum cellular automaton (QCA) framework. The central claim is scoped in a referee-proof way: matter-like excitations are auditable images that are not certified at a single-site update, but only after an audit closes over a minimal local neighborhood. In three dimensions, a nearest-neighbor stencil suggests a (1 + 6) block of cardinality 7; under explicit circuit-locality and audit assumptions, we show a clean lower bound Daudit ≥ 7 on the micro-depth needed to incorporate all neighbor links into a joint certification. To strengthen the theory beyond narrative plausibility, we add: (i) an operational definition of copy time via hypothesis-testing distinguishability (Helstrom bound), (ii) a quantum-speed-limit style lower bound on τcopy via quantum Fisher information and an explicit “stiffness” parameter χ, (iii) a reproducibility / audit-trail protocol separating priors (calibration) from validation (comparison tables), and (iv) an explicit toy construction with a 7-layer gate schedule. We also separate particle masses (PDG), atomic/isotopic masses (NIST), and nuclear masses (AME-style conversion), with electron and electronic-binding corrections stated and numerically illustrated.
Keywords: 
;  ;  ;  ;  ;  ;  ;  ;  ;  ;  ;  ;  ;  

1. Reader Contract: Assumptions, Scope, Falsifiability

We isolate what is structural (within stated assumptions) from what is model-dependent (matching and numerical outputs).
  • A1 (Neighborhood choice). The substrate admits a meaningful ( 1 + 6 ) nearest-neighbor block in three spatial dimensions.
  • A2 (Audit criterion). “Matter” is defined operationally as an auditable image: certification requires a joint neighborhood constraint to be satisfied to tolerance ε 1 .
  • A3 (Circuit locality). One QCA timestep admits a bounded-depth decomposition into layers of disjoint two-site unitaries (plus optional on-site unitaries).
  • A4 (Copy-time control parameter). A stiffness/gap-like parameter χ controls distinguishability growth in a gapped/stiff sector, enabling a conditional bound τ copy ( χ , ε ) χ 1 / 2 (constants depend on tolerance and model class).
  • A5 (UV/IR matching). Any Planck calibration and any RG/FRG flow mapping UV scales to IR masses is model-dependent and must be stated as an ansatz or computed explicitly.
Falsifiable content here. Under (A1–A3) the bound D audit 7 is structural. Under (A2–A4) the inequality τ mat 7 τ copy ( χ , ε ) is structural. Any specific IR mass value requires (A5).

2. Model Definition: QCA Dynamics and Audit Closure

2.1. Lattice, Local Degrees of Freedom, and Global Update

Let the lattice be Z 3 with nearest-neighbor adjacency. Each site x carries a finite-dimensional Hilbert space
H x = H x ( field ) H x ( audit ) .
A single QCA timestep is a translation-invariant, causal (locality-preserving) unitary U acting on x H x [1,2,3]. We assume a depth-D circuit representation
U = U ( D ) U ( D 1 ) U ( 1 ) ,
where each layer U ( k ) is a product of commuting two-site unitaries on disjoint edges (a matching), optionally interleaved with on-site unitaries.

2.2. Minimal Neighborhood Block

Define the ( 1 + 6 ) neighborhood
B min = { A } { B i } i = 1 6 , | B min | = 7 ,
where A is central and B i are its six axis neighbors.

2.3. Formal Audit Closure

Let Π audit be a projector acting on x B min H x defining the set of configurations judged auditable. One concrete choice is “six link constraints” between A and each neighbor B i (e.g. agreement of syndrome bits or stabilizer eigenvalues).
  • Definition (certification at time t). A state ρ t is certified on B min if
Tr Π audit ρ t 1 ε .

3. Why the Minimal Certification Depth is D audit 7 Micro-Steps

This is the first reinforcement brick: the factor 7 is a depth lower bound from locality scheduling.

3.1. Scheduling Constraint: One Edge per Layer per Site

In a layer made of disjoint two-site unitaries, any site can participate in at most one two-site gate. The central site A has six incident edges ( A , B i ) that must be incorporated if audit closure depends on all six neighbor relations.

3.2. Proposition (Minimal Certification Depth)

Proposition. Assume (A1–A3) and that audit closure requires incorporating information from each link ( A , B i ) into a joint certification (so that all six link constraints are checkable). Then
D audit 6 + 1 = 7 ,
where + 1 corresponds to an on-site “audit finalization” step (writing/locking a certification flag at A).
Proof sketch.
Each layer is a matching; site A can interact with at most one neighbor per layer. Covering the six incident edges requires at least six two-site layers. A final on-site layer aggregates/locks the audit result, hence D audit 7 . □

4. Operational Definition of Copy Time via Distinguishability (Helstrom)

This is the second reinforcement brick: τ copy is operational.

4.1. Distinguishability and Minimal Decision Error

Let ρ 0 be a reference state and ρ t the state after t micro-layers. Define the trace distance
D ( ρ 0 , ρ t ) : = 1 2 ρ 0 ρ t 1 .
For binary hypothesis testing with equal priors, the Helstrom bound gives
p err = 1 2 1 D ( ρ 0 , ρ t )
[6]. Therefore a tolerance ε can be implemented as a distinguishability threshold:
p err ε D ( ρ 0 , ρ t ) 1 2 ε .

4.2. Definition (copy time)

Definition. For specified ε , define the copy time as
τ copy ( ε ) : = inf t 0 : D ( ρ 0 , ρ t ) 1 2 ε .

5. Quantum-Speed-Limit Style Lower Bound and the χ 1 / 2 Scaling

This is the third reinforcement brick: τ copy admits a principled lower bound tied to information geometry.

5.1. Fidelity/Bures and Quantum Fisher Information

Let F ( ρ 0 , ρ t ) be the fidelity. The Bures angle is θ ( t ) = arccos F ( ρ 0 , ρ t ) . Quantum speed-limit (QSL) inequalities relate the rate of state change to generators and information metrics [7]. In unitary families, quantum Fisher information (QFI) controls distinguishability rates; in many settings one can write a speed-limit form (schematically)
θ ( t ) 1 2 0 t I Q ( s ) d s ,
and for approximately constant QFI this yields t 2 θ / I Q .

5.2. Mini-Section: χ in This Model (Definition, Dimension, How to Compute)

We now make χ concrete for the toy-QCA setting.

Definition (effective local generator).

Associate each micro-layer with an effective local generator K via a discrete-to-continuous parametrization:
U ( k ) = exp i K ( k ) , H eff ( k ) : = τ copy ( 0 ) K ( k ) .
Here K ( k ) is dimensionless and H eff ( k ) has dimensions of energy.

Definition (stiffness parameter χ ).

For a chosen reference state | ψ (e.g. the pre-audit local vacuum/ready state), define
χ : = 4 Var ψ H eff ( k ) 2 = 4 τ copy ( 0 ) 2 Var ψ K ( k ) ,
where Var ψ ( X ) = ψ | X 2 | ψ ψ | X | ψ 2 . With this choice, χ has units of 1 / time 2 (because Var ( H ) has units of energy2 and 2 converts it to 1 / time 2 ).

How to compute χ in the toy QCA.

Once the explicit gate set is chosen (Appendix A), one can:
  • write each local gate as exp ( i K ) and identify its K;
  • pick a reference | ψ (commonly | + -type product states or the intended “ready” state);
  • compute Var ψ ( K ) analytically (for Pauli generators it is immediate) and plug into (12).

Concrete example (controlled-phase).

If the edge-interaction in layers 1–6 uses a two-qubit controlled-phase / Ising form
U A B ( φ ) = exp i φ 2 Z A Z B , U A B ( φ ) = exp i φ 2 Z A Z B ,
puis K = φ 2 Z A Z B , et pour la référence | ψ = | + A | + B , on obtient : Var ψ ( K ) = φ 2 2 . D’où :
χ = 4 τ copy ( 0 ) 2 φ 2 2 = φ 2 τ copy ( 0 ) 2 .
So χ = | φ | / τ copy ( 0 ) is the natural “rate” set by the gate angle per micro-time.

5.3. Copy-Time Bound in Terms of χ

Assume (A4) that χ controls distinguishability growth in the relevant sector so that QFI is bounded as I Q C 0 ( ε ) χ (constants depend on the audit protocol and model class). Combining (10) with the certification threshold (8) yields the conditional lower bound
τ copy ( χ , ε ) C 1 ( ε ) χ 1 / 2 .

6. Synchronization Latency as an Operational Timescale

Define the matter certification time
τ mat = η τ copy ( 0 ) , η : = 7 .
Combining (16) with (15) yields the reinforced (conditional) inequality
τ mat ( χ , ε ) 7 C 1 ( ε ) χ 1 / 2 .

7. Locality Reinforcement: Lieb–Robinson and Why Synchronization is Meaningful

Locality-preserving dynamics supports an emergent causal cone; in lattice systems this is formalized by Lieb–Robinson bounds [4,5]. This supports treating audit closure as a finite-time synchronization over B min : influence from outside B min is suppressed at short times relative to the effective light-cone.

8. Reproducible Mapping: Latency → Energy → Mass

8.1. Latency Energy Scale

Use the heuristic
E lat τ mat = 7 τ copy ( 0 ) .
If (only if) one chooses τ copy ( 0 ) = t as a UV boundary condition, then
E seed E lat ( t ) 7 t E Pl 7 ,
with Planck conventions from CODATA/NIST [14,15].

8.2. Explicit UV-to-IR Attenuation Factor

To connect E seed to an IR mass m IR , define
m IR c 2 = ρ E seed ,
where ρ is computed by a specified matching/flow scheme (e.g. FRG) [8,9].

Context: Higgs-portal singlet scalar.

A real singlet scalar in the Higgs portal is a standard benchmark; the resonant region m S m h / 2 is phenomenologically special [10,11,12]. Any specific value (e.g. 58.7   G e V ) must be presented as a model-dependent output of an explicit ρ computation.

9. Reproducibility and Audit Trail (“Data vs Priors” Hard Separation)

Rule R1 (freeze priors). Fix before any comparison: neighborhood choice, audit threshold ε , data sources (PDG/NIST/AME), and calibration convention.
  • Rule R2 (no leakage). Values used as priors may not be reused as validation targets. Validation tables must cite sources and be reproducible from frozen inputs.
Maintain a minimal audit log:
AUDIT_RUN:
  script_sha256: <hash>
  inputs_sha256: <hash>
  conventions: {Planck: "reduced/unreduced", eps: 1e-6, u_to_MeV: 931.49410242}
  outputs:
    table_atomic_to_nuclear_sha256: <hash>

10. Mass-Data Hygiene: PDG vs NIST vs AME

We separate:
  • Particle masses (PDG) [13],
  • Atomic/isotopic masses (NIST) [18,19,20,21],
  • Nuclear masses derived from atomic masses (AME practice) [16,17].

10.1. Atomic-to-Nuclear Conversion

Given a neutral-atom mass M A ( A , Z ) , the nuclear mass is [17]
M N ( A , Z ) = M A ( A , Z ) Z m e + B e ( Z ) c 2 ,
with electronic binding energy B e ( Z ) . A widely used approximation is [17]
B e ( Z ) 14.4381 Z 2.39 + 1.55468 × 10 6 Z 5.35 eV .

11. Interpretive Summary (Reinforced)

Matter is a waiting time: a stable “image” is certified only after an audit closes over a minimal neighborhood.
Reinforcement comes from:
1.
Geometry + locality scheduling:  ( 1 + 6 ) implies D audit 7 (5).
2.
Operational measurability:  τ copy via Helstrom distinguishability (9).
3.
Lower-bound control:  τ copy admits a QSL/QFI lower bound (15), hence τ mat obeys (17).
4.
Auditability: priors/validation separation and hash-logged artifacts prevent post-hoc tuning.

12. Outlook: Superheavy Stability as Conjecture (Scoped)

Conjecture (coherence-volume bound). If audit latency enforces an upper bound on sustainable coherence volume, then beyond a critical complexity the certification time may exceed relevant decoherence times, yielding systematically shortened lifetimes for sufficiently heavy nuclei.
  • Quantitative placeholder. A working range sometimes discussed is A 310 –320, presented here only as a model-dependent placeholder until derived from explicit composite-audit dynamics and confronted with nuclear-structure systematics.

Appendix A. Explicit 7-Layer Toy Gate Set (One Certified Neighborhood)

This appendix gives a minimal, explicit gate schedule that realizes a ( 1 + 6 ) audit closure in exactly 7 micro-layers.

Appendix A.1. Registers

For the central site A and each neighbor B i (with i = 1 , , 6 ), assume:
  • field qubits: f A at A, and f B i at B i ;
  • audit bits at A: a 6-bit register a A , i (one bit per neighbor link) and a 1-bit certification flag g A .
Initialize a A , i = 0 and g A = 0 .

Appendix A.2. Edge-Syndrome Writing Layers (Layers 1–6)

For each neighbor i, define a reversible unitary U A , B i ( i ) that writes the link syndrome
s i : = f A f B i
into the corresponding audit bit a A , i :
U A , B i ( i ) : a A , i a A , i ( f A f B i ) ,
leaving all other bits unchanged. This is a permutation on the computational basis and hence unitary.
One decomposition uses two CNOT-type updates:
1.
on-site at A: CNOT ( f A a A , i ) ,
2.
two-site across the edge ( A , B i ) : CNOT ( f B i a A , i ) .
Because only one neighbor edge touches A per micro-layer (by scheduling), this respects (A3).

Appendix A.3. Audit Finalization Layer (Layer 7)

Define an on-site reversible gate U A ( 7 ) that sets the certification flag if and only if all six syndromes are zero:
U A ( 7 ) : g A g A i = 1 6 ¬ a A , i .
This is implementable by standard reversible logic (multi-controlled Toffoli decompositions) but the explicit decomposition is not required for the conceptual point: the finalization is an on-site aggregation step.

Appendix A.4. Audit Projector for This Toy Construction

A natural audit projector is
Π audit = i = 1 6 | 0 0 | a A , i | 1 1 | g A
(tensored with identity on unused degrees of freedom). In the noiseless toy setting, certification is exact on the computational basis; in noisy settings one uses tolerance ε as in (4).

Appendix B. Atomic → Nuclear Conversion Table (Computed for H, C-12, Au-197, U-238)

We apply (21) with electronic binding energy approximation (22). Constants/conventions used:
  • atomic masses M A from NIST isotopic composition tables [19,20,21];
  • 12C mass is exact by definition of the atomic mass scale [18];
  • conversion 1 u c 2 = 931.49410242 M e V (CODATA 2018) [14];
  • electron mass in u: m e 0.000548579909065 u (CODATA 2018) [14].
Table A1. Computed nuclear masses using M N = M A Z m e + B e ( Z ) / c 2 with B e from (22). Values are rounded to the MeV level in energy. The B e formula is an approximation used in atomic-mass practice; it is included to make the correction explicit.
Table A1. Computed nuclear masses using M N = M A Z m e + B e ( Z ) / c 2 with B e from (22). Values are rounded to the MeV level in energy. The B e formula is an approximation used in atomic-mass practice; it is included to make the correction explicit.
Isotope Z M A (u) B e (MeV) M N (u) M A c 2 (GeV) M N c 2 (GeV)
1H 1 1.00782503223 0.000014 1.00727646782 0.938783 0.938272
12C 6 12 (exact) 0.001045 11.99671052055 11.177929 11.174864
197Au 79 196.96656879 0.517344 196.92378636837 183.473197 183.433346
238U 92 238.0507884 0.762670 238.00113780810 221.742905 221.696656

Appendix C. Toy FRG Matching That Computes the Attenuation Factor ρ

This appendix provides a minimal, reproducible toy example showing how an explicit UV→IR matching can yield a concrete attenuation factor ρ in
m IR c 2 = ρ E seed .
The goal is not realism (we do not claim to reproduce the full SM+portal system here), but to make the logical step “UV seed ⇒ IR mass” mathematically explicit and auditable.

Appendix C.1. Set-Up: Scalar Toy model and Wetterich Flow in LPA

Consider a single real scalar field in four Euclidean dimensions with an effective average action in Local Potential Approximation (LPA),
Γ k [ ϕ ] = d 4 x 1 2 ( ϕ ) 2 + V k ( ϕ ) , V k ( ϕ ) = 1 2 m k 2 ϕ 2 + λ k 4 ! ϕ 4 .
The Wetterich equation reads [8,9]
t Γ k = 1 2 Tr Γ k ( 2 ) + R k 1 t R k , t = ln ( k / Λ ) ,
with IR regulator R k . Using the Litim regulator R k ( p ) = ( k 2 p 2 ) Θ ( k 2 p 2 ) yields closed-form threshold functions [?].
Define the standard dimensionless couplings
m ˜ 2 ( k ) = m k 2 k 2 , λ ˜ ( k ) = λ k ,
(with λ ˜ dimensionless in d = 4 ). In a minimal toy truncation, keep λ ˜ approximately constant over the flow window (this is the toy simplification), and approximate the mass flow by the one-loop/LPA form (Litim threshold)
t m ˜ 2 = 2 m ˜ 2 + λ ˜ 16 π 2 1 1 + m ˜ 2 .
In the regime | m ˜ 2 | 1 , one can approximate 1 / ( 1 + m ˜ 2 ) 1 and obtain the linearized flow
t m ˜ 2 2 m ˜ 2 + a λ ˜ , a : = 1 16 π 2 .

Appendix C.2. Analytic Solution and Explicit ρ

Solve (A9) with UV boundary condition at k = Λ (i.e. t = 0 ):
m ˜ 2 ( k ) = m ˜ Λ 2 a λ ˜ 2 Λ k 2 + a λ ˜ 2 .
The corresponding dimensionful mass is m k 2 = k 2 m ˜ 2 ( k ) , hence
m k 2 = m ˜ Λ 2 a λ ˜ 2 Λ 2 + a λ ˜ 2 k 2 .
Taking the IR limit k 0 gives
m IR 2 = m ˜ Λ 2 a λ ˜ 2 Λ 2 , m IR = Λ m ˜ Λ 2 a λ ˜ 2 .
Now identify the UV matching scale with the seed energy:
Λ E seed c 2 .
Then (A4) and (A12) yield an explicit attenuation factor
ρ = m IR c 2 E seed = m ˜ Λ 2 a λ ˜ 2 .

Interpretation (why ρ can be tiny).

Equation (A14) shows that a very small ρ corresponds to UV parameters lying close to the critical surface
m ˜ Λ 2 a λ ˜ 2 ,
i.e. near criticality. This is not a “free lunch”; it is a precise statement of what must hold in the UV to generate a much smaller IR mass in this toy truncation.

Appendix C.3. Numerical Illustration Consistent with a Higgs-Resonant Scale (Order of Magnitude)

If one uses the seed scale E seed E / 7 (as a boundary-condition choice) and targets m IR 60 G e V , then
ρ target 60 1.7 × 10 18 3.5 × 10 17 .
In the toy formula (A14), choosing for instance λ ˜ = 0.1 gives a λ ˜ / 2 3.17 × 10 4 , so one must set
m ˜ Λ 2 = a λ ˜ 2 + ρ target 2 3.17 × 10 4 + 1.2 × 10 33 .
The point of the example is the mechanism: the UV parameters must be fixed to (or dynamically attracted to) a near-critical surface to generate huge scale separation. In a full model, the FRG computation of ρ would be replaced by a specified truncation, regulator choice, and flow integration (and the Higgs-portal sector would be included explicitly).

Appendix D. Detailed Derivation: QFI/Bures ⇒ a Lower Bound on τ

This appendix provides a self-contained derivation (with explicit constants) of a speed-limit-type bound implying
τ ( χ , ε ) C 1 ( ε ) χ 1 / 2 ,
under the definitions used in the main text.

Appendix D.1. Step 1: Certification Threshold in Trace Distance

Let ρ 0 be a reference state and ρ t the state after time t (continuous) or after n micro-layers (discrete). Define trace distance D ( ρ 0 , ρ t ) = 1 2 ρ 0 ρ t 1 . For binary hypothesis testing with equal priors, the Helstrom bound states [6]
p err = 1 2 1 D ( ρ 0 , ρ t ) .
Requiring p err ε is equivalent to the threshold
D ( ρ 0 , ρ t ) 1 2 ε .

Appendix D.2. Step 2: Relate Trace Distance to Fidelity (Fuchs–van de Graaf)

Let F ( ρ 0 , ρ t ) be the fidelity. The Fuchs–van de Graaf inequalities [??] state
1 F ( ρ 0 , ρ t ) D ( ρ 0 , ρ t ) 1 F ( ρ 0 , ρ t ) .
Using the upper bound in (A21) together with (A20) implies
1 2 ε 1 F F 1 ( 1 2 ε ) 2 = 4 ε ( 1 ε ) .

Appendix D.3. Step 3: Bures Angle Target

Define the Bures angle
θ ( t ) : = arccos F ( ρ 0 , ρ t ) [ 0 , π / 2 ] .
From (A22), certification implies
θ ( t ) θ min ( ε ) , θ min ( ε ) : = arccos 4 ε ( 1 ε ) .

Appendix D.4. Step 4: QFI Speed-Limit Inequality

Quantum speed-limit results relate the rate of change of the Bures angle to the quantum Fisher information (QFI) [7]. A convenient form is
θ ( t ) 1 2 0 t I Q ( s ) d s .
If I Q ( s ) I Q max for s [ 0 , t ] , then (A25) yields
θ ( t ) t 2 I Q max t 2 θ ( t ) I Q max .

Appendix D.5. Step 5: Specialize to Unitary Families and Define χ

For a unitary family ρ t = e i H t / ρ 0 e + i H t / generated by a time-independent Hamiltonian H, for pure ρ 0 = | ψ ψ | one has [??]
I Q = 4 Var ψ ( H ) 2 = 2 Δ H 2 .
Motivated by this, define the stiffness parameter (as in the main text)
χ : = 4 Var ψ ( H ) 2 ,
which has dimensions of 1 / time 2 . In this pure/unitary case, I Q = χ exactly, so we can take I Q max = χ .

Appendix D.6. Conclusion: Explicit Constant C 1 (ε)

Combine (A24) with (A26) and I Q max = χ :
t 2 θ min ( ε ) χ = 2 arccos 4 ε ( 1 ε ) = : C 1 ( ε ) χ 1 / 2 .
Thus, for the operational copy-time definition as the minimal time to reach the certification threshold,
τ ( χ , ε ) C 1 ( ε ) χ 1 / 2 , C 1 ( ε ) = 2 arccos 4 ε ( 1 ε ) .

Discrete micro-layer version.

If time is discrete in micro-layers of duration τ copy ( 0 ) , so t = n τ copy ( 0 ) , then
n C 1 ( ε ) τ copy ( 0 ) χ , τ n τ copy ( 0 ) C 1 ( ε ) χ 1 / 2 .

Scope note (mixed states / time-dependent generators).

For mixed states or time-dependent generators, one uses I Q ( s ) along the path and (A25); the same structure holds with χ interpreted as a suitable bound on QFI over the relevant interval. The constant C 1 ( ε ) remains fixed by the certification threshold via (A24).

References

  1. P. Arrighi, V. Nesme, and R. F. Werner, Unitarity plus causality implies localizability, J. Comput. Syst. Sci. 77, 372–378 (2011). [CrossRef]
  2. B. Schumacher and R. F. Werner, Reversible quantum cellular automata, arXiv: quant-ph/0405174 (2004).
  3. D. A. Meyer, From quantum cellular automata to quantum lattice gases, J. Stat. Phys. 85, 551–574 (1996). [CrossRef]
  4. E. H. Lieb and D. W. Robinson, The finite group velocity of quantum spin systems, Commun. Math. Phys. 28, 251–257 (1972). [CrossRef]
  5. M. B. Hastings and T. Koma, Spectral gap and exponential decay of correlations, Commun. Math. Phys. 265, 781–804 (2006). [CrossRef]
  6. C. W. Helstrom, Quantum Detection and Estimation Theory, Academic Press (1976).
  7. S. Deffner and S. Campbell, Quantum speed limits: from Heisenberg’s uncertainty principle to optimal quantum control, J. Phys. A: Math. Theor. 50, 453001 (2017). [CrossRef]
  8. C. Wetterich, Exact evolution equation for the effective potential, Phys. Lett. B 301, 90–94 (1993). [CrossRef]
  9. J. Berges, N. Tetradis, and C. Wetterich, Non-perturbative renormalization flow in quantum field theory and statistical physics, Phys. Rep. 363, 223–386 (2002). [CrossRef]
  10. V. Silveira and A. Zee, Scalar phantoms, Phys. Lett. B 161, 136–140 (1985). [CrossRef]
  11. J. McDonald, Gauge singlet scalars as cold dark matter, Phys. Rev. D 50, 3637–3649 (1994). [CrossRef]
  12. J. M. Cline, K. Kainulainen, P. Scott, and C. Weniger, Update on scalar singlet dark matter, Phys. Rev. D 88, 055025 (2013). [CrossRef]
  13. S. Navas et al. (Particle Data Group), Review of Particle Physics, Phys. Rev. D 110, 030001 (2024). [CrossRef]
  14. E. Tiesinga, P. J. Mohr, D. B. Newell, and B. N. Taylor, CODATA recommended values of the fundamental physical constants: 2018, Rev. Mod. Phys. 93, 025010 (2021). [CrossRef]
  15. NIST, CODATA Recommended Values of the Fundamental Physical Constants: 2018 (NIST SP 961, May 2019), PDF: https://physics.nist.gov/cgi-bin/cuu/Info/pdf/wall_2018.pdf.
  16. M. Wang, W. J. Huang, F. G. Kondev, G. Audi, and S. Naimi, The AME 2020 atomic mass evaluation (II). Tables, graphs and references, Chin. Phys. C 45, 030003 (2021). [CrossRef]
  17. G. Audi et al., The AME2012 atomic mass evaluation (II). Tables, graphs and references, Chin. Phys. C 36, 1603–2014 (2012). [CrossRef]
  18. NIST, Atomic Weights and Isotopic Compositions – Column Descriptions, https://www.nist.gov/pml/atomic-weights-and-isotopic-compositions-column-descriptions.
  19. NIST, Atomic Weights and Isotopic Compositions for Hydrogen, https://physics.nist.gov/cgi-bin/Compositions/stand_alone.pl?ascii=ascii&ele=H.
  20. NIST, Atomic Weights and Isotopic Compositions for Gold, https://physics.nist.gov/cgi-bin/Compositions/stand_alone.pl?ascii=ascii&ele=Au.
  21. NIST, Atomic Weights and Isotopic Compositions for Uranium, https://physics.nist.gov/cgi-bin/Compositions/stand_alone.pl?ele=U.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

Disclaimer

Terms of Use

Privacy Policy

Privacy Settings

© 2026 MDPI (Basel, Switzerland) unless otherwise stated