Fusion Rules of Mobility
Pith reviewed 2026-05-18 22:10 UTC · model grok-4.3
pith:ARH6GRI7 Add to your LaTeX paper
What is a Pith Number?\usepackage{pith}
\pithnumber{ARH6GRI7}
Prints a linked pith:ARH6GRI7 badge after your title and writes the identifier into PDF metadata. Compiles on arXiv with no extra files. Learn more
The pith
Restricted mobility classes in topological phases obey their own multi-channel fusion algebras including Fibonacci rules.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
In a family of exactly solvable models with Z2 topological order enriched by subsystem symmetries, the fusion of mobility-restricted excitations yields a multi-channel fusion ring. This ring arises because mobility constraints, which stem from symmetries supported on specific subsets, interfere spatially and deterministically when excitations combine. The paper explicitly demonstrates three such structures: Fibonacci fusion rules for mobility classes, tensor products of Fibonacci rules, and lineon period transmutation.
What carries the argument
The multi-channel fusion ring that emerges from the spatial interference of rigid geometric constraints on quasiparticle mobility enforced by subsystem symmetries
If this is right
- Restricted mobility classes combine according to Fibonacci fusion rules in specific models.
- Other classes follow tensor products of Fibonacci fusion rules.
- Lineon periods undergo transmutation upon fusion in these enriched Z2 models.
- The structures are realized explicitly through exactly solvable lattice models.
Where Pith is reading between the lines
- Mobility transformations could serve as an extra handle for controlling anyonic statistics in quantum information settings.
- Geometric interference of constraints may generalize to other phases protected by subsystem or higher-form symmetries.
- Direct simulation of the models on quantum devices could reveal whether mobility changes match the predicted fusion channels.
Load-bearing premise
Enforcing symmetries supported on specific subsets produces rigid geometric constraints whose spatial interference upon fusion deterministically yields a multi-channel fusion ring.
What would settle it
Constructing one of the proposed lattice models and measuring the possible mobility classes after fusing two excitations with known initial mobilities to check if the outcomes match the predicted multi-channel algebra.
Figures
read the original abstract
In topological phases of matter, fusion rules dictate how anyonic topological charges combine. However, the transformation of quasiparticle mobility under fusion remains largely unexplored. In this letter, we reveal that restricted mobility classes obey their own complex multi-channel fusion algebras. We introduce a family of exactly solvable models with $\mathbb{Z}_2$ topological order enriched by subsystem symmetries to explicitly demonstrate these structures. Within this framework, mobility constraints arise from enforcing symmetries supported on specific subsets. When excitations fuse, these rigid geometric constraints interfere spatially. At the macroscopic level, this deterministic geometric interference manifests as a multi-channel fusion ring. We present three explicit mobility fusion phenomena realized in distinct models: (i) Fibonacci fusion rules; (ii) tensor products of Fibonacci rules; and (iii) lineon period transmutation.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The manuscript proposes that restricted mobility classes in topological phases with subsystem symmetries obey complex multi-channel fusion algebras. It introduces exactly solvable models with Z_2 topological order to demonstrate three phenomena: Fibonacci fusion rules, tensor products of Fibonacci rules, and lineon period transmutation, resulting from spatial interference of geometric constraints upon fusion.
Significance. If these claims are substantiated, the work introduces mobility as an additional structure in fusion rules, which could be important for classifying and understanding topological orders with restricted mobility. The use of explicit, exactly solvable models to realize these algebras is a notable strength, allowing for direct verification of the predicted fusion phenomena.
minor comments (2)
- [Abstract] Consider adding a short sentence outlining the key result for each of the three phenomena to make the abstract more informative.
- [Section 3] The definition of the mobility classes and their constraints could be presented in a dedicated subsection for better clarity.
Simulated Author's Rebuttal
We thank the referee for their positive summary and significance assessment of our manuscript. We are pleased that the introduction of mobility as an additional structure in fusion rules, demonstrated via exactly solvable models, is viewed as a notable contribution. We will incorporate minor revisions as recommended to further improve clarity and presentation.
Circularity Check
No significant circularity in derivation chain
full rationale
The paper introduces a family of exactly solvable Z2 models enriched by subsystem symmetries specifically to realize and demonstrate the claimed multi-channel mobility fusion algebras (Fibonacci, tensor products, lineon transmutation) via explicit construction. Mobility constraints are defined directly from the enforced symmetries on subsets, and the resulting fusion outcomes follow from spatial interference in those models without reduction to fitted parameters, self-citations, or prior ansatzes. The derivation chain from symmetry enforcement to observed fusion rings is self-contained and externally verifiable through the model Hamiltonians, with no load-bearing steps that collapse to inputs by construction.
Axiom & Free-Parameter Ledger
axioms (1)
- domain assumption Z2 topological order can be enriched by subsystem symmetries that restrict quasiparticle mobility
invented entities (1)
-
mobility fusion algebras
no independent evidence
Lean theorems connected to this paper
-
IndisputableMonolith/Foundation/AbsoluteFloorClosure.leanreality_from_one_distinction unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
Theorem 1: mobility polynomial determined by g[f,m] = f/gcd(f,m) via rules (i) g=1 fully mobile, (ii) g=t[q] lineon period T, (iii) otherwise fracton; fusion rules (7-10) from exhausting relative positions x^a y^b
-
IndisputableMonolith/Cost/FunctionalEquation.leanwashburn_uniqueness_aczel echoes?
echoesECHOES: this paper passage has the same mathematical shape or conceptual pattern as the Recognition theorem, but is not a direct formal dependency.
Fibonacci fusion rules, tensor products of Fibonacci rules, lineon period transmutation in Z2 models
What do these tags mean?
- matches
- The paper's claim is directly supported by a theorem in the formal canon.
- supports
- The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
- extends
- The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
- uses
- The paper appears to rely on the theorem as machinery.
- contradicts
- The paper's claim conflicts with a theorem or certificate in the canon.
- unclear
- Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.
Forward citations
Cited by 1 Pith paper
-
Universal Design and Physical Applications of Non-Uniform Cellular Automata on Translationally Invariant Lattices
A higher-order non-uniform cellular automata algorithm is introduced for translationally invariant Euclidean and hyperbolic lattices, demonstrated on the {5,4} lattice to generate subsystem symmetry-protected topologi...
Reference graph
Works this paper leans on
-
[1]
This decomposition is equivalent to connecting the blue dots in Fig. 2 by horizontal (teal edges) and vertical (orange edges), such that each blue dot is linked to odd number of colored edges, shown in the second panel in Fig. 2. (iii) Expressing P (x, y) = P ij pijxiyj and Q(x, y) =P ij qijxiyj, construct the finite-depth circuit Uf = Y c1 Y c2∈Cx∪Cy CZc...
-
[2]
×” denotes the fusion process, while “+
| qij ̸= 0 }. This corresponds to the third and fourth panels in Fig. 2: First, ascribe the central vertex as the control qubit and all qubits lying at the center of colored edges as target qubit (third panel); then duplicate the circuit translationally (fourth panel). CZa,b = |0⟩ ⟨0|a ⊗ Ib + |1⟩ ⟨1|a ⊗ Zb denotes controlled- Z gates with control qubit a ...
- [3]
-
[4]
C. Castelnovo and C. Chamon, Topological order in a three-dimensional toric code at finite temperature, Phys. Rev. B 78, 155120 (2008)
work page 2008
-
[5]
Haah, Local stabilizer codes in three dimensions with- out string logical operators, Phys
J. Haah, Local stabilizer codes in three dimensions with- out string logical operators, Phys. Rev. A 83, 042330 (2011)
work page 2011
-
[6]
M. B. Hastings, Topological order at nonzero tempera- ture, Phys. Rev. Lett. 107, 210501 (2011)
work page 2011
-
[7]
M. B. Hastings, G. H. Watson, and R. G. Melko, Self- correcting quantum memories beyond the percolation threshold, Phys. Rev. Lett. 112, 070501 (2014)
work page 2014
-
[8]
S. Roberts and S. D. Bartlett, Symmetry-protected self- correcting quantum memories, Phys. Rev. X 10, 031041 (2020)
work page 2020
-
[9]
S.-T. Zhou, M. Cheng, T. Rakovszky, C. von Keyser- lingk, and T. D. Ellison, Finite-temperature quantum topological order in three dimensions, Phys. Rev. Lett. 135, 040402 (2025)
work page 2025
-
[10]
C. Chamon, Quantum glassiness in strongly correlated clean systems: An example of topological overprotection, Phys. Rev. Lett. 94, 040402 (2005)
work page 2005
- [11]
- [12]
-
[13]
R. M. Nandkishore and M. Hermele, Fractons, Annual Review of Condensed Matter Physics 10, 295 (2019)
work page 2019
-
[14]
D. T. Stephen, D. V. Else, and D. J. Williamson, Frac- tionalization of subsystem symmetries in two dimensions, Phys. Rev. B 106, 085104 (2022)
work page 2022
-
[15]
M. Barkeshli, P. Bonderson, M. Cheng, and Z. Wang, Symmetry, defects, and gauging of topological phases, Phys. Rev. B 100, 115147 (2019)
work page 2019
-
[16]
A. Babakhani and P. Bonderson, G-crossed modularity of 6 symmetry enriched topological phases, Communications in Mathematical Physics 402, 2979 (2023)
work page 2023
-
[17]
L. Savary and L. Balents, Quantum spin liquids: a re- view, Reports on Progress in Physics 80, 016502 (2017)
work page 2017
-
[18]
C. Broholm, R. J. Cava, S. A. Kivelson, D. G. Nocera, M. R. Norman, and T. Senthil, Quantum spin liquids, Science 367, eaay0668 (2020)
work page 2020
-
[19]
D. C. Tsui, H. L. Stormer, and A. C. Gossard, Two- dimensional magnetotransport in the extreme quantum limit, Phys. Rev. Lett. 48, 1559 (1982)
work page 1982
-
[20]
R. B. Laughlin, Anomalous quantum hall effect: An in- compressible quantum fluid with fractionally charged ex- citations, Phys. Rev. Lett. 50, 1395 (1983)
work page 1983
-
[21]
Yoshida, Topological phases with generalized global symmetries, Physical Review B 93, 155131 (2016)
B. Yoshida, Topological phases with generalized global symmetries, Physical Review B 93, 155131 (2016)
work page 2016
-
[22]
D. Gaiotto, A. Kapustin, N. Seiberg, and B. Willett, Generalized Global Symmetries, Journal of High Energy Physics 2015, 172 (2015), arXiv:1412.5148 [hep-th]
work page internal anchor Pith review Pith/arXiv arXiv 2015
-
[23]
J. McGreevy, Generalized Symmetries in Condensed Matter, Annual Review of Condensed Matter Physics14, 57 (2023), arXiv:2204.03045 [cond-mat]
-
[24]
What's Done Cannot Be Undone: TASI Lectures on Non-Invertible Symmetries
S.-H. Shao, What’s Done Cannot Be Undone: TASI Lectures on Non-Invertible Symmetries (2024), arXiv:2308.00747 [hep-th]
work page internal anchor Pith review Pith/arXiv arXiv 2024
-
[25]
Tachikawa, On gauging finite subgroups, SciPost Physics 8, 015 (2020)
Y. Tachikawa, On gauging finite subgroups, SciPost Physics 8, 015 (2020)
work page 2020
-
[26]
W. Ji and X.-G. Wen, Categorical symmetry and non- invertible anomaly in symmetry-breaking and topological phase transitions, Physical Review Research 2, 033417 (2020), arXiv:1912.13492 [cond-mat]
-
[27]
X.-G. Wen, Emergent anomalous higher symmetries from topological order and from dynamical electromagnetic field in condensed matter systems, Physical Review B99, 205139 (2019), publisher: American Physical Society
work page 2019
-
[28]
T. Devakul, Y. You, F. J. Burnell, and S. L. Sondhi, Fractal Symmetric Phases of Matter, SciPost Phys. 6, 007 (2019)
work page 2019
-
[29]
Y. You, T. Devakul, F. J. Burnell, and S. L. Sondhi, Subsystem symmetry protected topological order, Phys. Rev. B 98, 035112 (2018)
work page 2018
-
[30]
J.-Y. Zhang, M.-Y. Li, and P. Ye, Higher-order cellu- lar automata generated symmetry-protected topological phases and detection through multi point strange corre- lators, PRX Quantum 5, 030342 (2024)
work page 2024
-
[31]
Google Quantum AI, Suppressing quantum errors by scaling a surface code logical qubit, Nature 614, 676 (2023)
work page 2023
-
[32]
D. Bluvstein, S. J. Evered, A. A. Geim, S. H. Li, H. Zhou, T. Manovitz, S. Ebadi, M. Cain, M. Kali- nowski, D. Hangleiter, J. P. Bonilla Ataides, N. Maskara, I. Cong, X. Gao, P. Sales Rodriguez, T. Karolyshyn, G. Semeghini, M. J. Gullans, M. Greiner, V. Vuleti´ c, and M. D. Lukin, Logical quantum processor based on reconfigurable atom arrays, Nature 626, ...
work page 2024
-
[33]
A. Mart´ ın del Rey, J. P. Mateus, and G. R. S´ anchez, A secret sharing scheme based on cellular automata, Ap- plied Mathematics and Computation 170, 1356 (2005)
work page 2005
-
[34]
Z. Chai, Z. Cao, and Y. Zhou, Encryption based on re- versible second-order cellular automata, in Parallel and Distributed Processing and Applications - ISPA 2005 Workshops, edited by G. Chen, Y. Pan, M. Guo, and J. Lu (Springer Berlin Heidelberg, Berlin, Heidelberg,
work page 2005
-
[35]
A. Dennunzio, E. Formenti, and L. Margara, An efficient algorithm deciding chaos for linear cellular automata over (Z/mZ)n with applications to data encryption, Informa- tion Sciences 657, 119942 (2024)
work page 2024
-
[36]
G. Jing and S. Dianxun, The faster higher-order cellular automaton for hyper-parallel undistorted data compres- sion, Journal of Computer Science and Technology 15, 126 (2000)
work page 2000
-
[37]
See Supplemental Material for basic knowledge of HOCA and operator algebra formalism; the mathematical de- tails of the protocol and more properties of the SET models; the detailed proof for the universality of HOCA symmetry, Theorem 1, and fusion rules. SM contains ad- ditional Refs. [42-44]
-
[38]
A. Ostrowski, On the significance of the theory of convex polyhedra for formal algebra, SIGSAM Bull.33, 5 (1999)
work page 1999
-
[39]
J. Haah, Commuting Pauli Hamiltonians as Maps be- tween Free Modules, Communications in Mathematical Physics 324, 351 (2013)
work page 2013
-
[40]
Wikipedia contributors, Polynomial greatest common di- visor — Wikipedia, the free encyclopedia (2023), [Online; accessed 2-August-2025]
work page 2023
- [41]
- [42]
-
[43]
C. Zhou, M.-Y. Li, Z. Yan, P. Ye, and Z. Y. Meng, Evo- lution of dynamical signature in the x-cube fracton topo- logical order, Phys. Rev. Res. 4, 033111 (2022)
work page 2022
-
[44]
S. Gao, Absolute irreducibility of polynomials via New- ton polytopes, Journal of Algebra 237, 501 (2001)
work page 2001
-
[45]
V. H. Minkowski, Geometrie der zahlen, Monatshefte f¨ ur Mathematik und Physik 22, A30 (1911)
work page 1911
-
[46]
M. F. Atiyah and I. G. MacDonald, Introduction To Commutative Algebra , 1st ed. (CRC Press, Boca Raton, 1969). 7 In this supplemental material, we provide several pieces of background information related to the main Letter, give details of the model construction, and rigorously prove the theorems and claims in the Letter. Appendix A: Basic knowledge
work page 1969
-
[47]
Compared to conventional cellular automaton (CA), the evolution of HOCA involves multiple time steps
HOCA Now we introduce some basic notation of the higher-order cellular automaton (HOCA). Compared to conventional cellular automaton (CA), the evolution of HOCA involves multiple time steps. Consider a set of 1 D lattice sites {i}, i ∈ Z with alphabet ai ∈ { 0, 1, · · · , n − 1} = Fn evolving over time j. The state of any given site at any given time may ...
-
[48]
Universality of HOCA generated symmetries To demonstrate the universality of our crafting procedure, we analyze in this section what kind of subsystem symmetry support can be generated by HOCA. We claim that the HOCA-generated symmetry support contains all locally generated symmetry support patterns, or explicitly:
-
[49]
HOCA symmetry can generate all finite symmetry support patterns
-
[50]
HOCA symmetry can generate all infinite symmetry support with local, translation-invariant constraints. We will further explain these terminologies. For the Z2 subsystem symmetries discussed in the Letter, the symmetry support pattern of a given symmetry operator can be generally denoted by a polynomial S (x, y) ∈ F2[[x, y, x−1, y−1]], where each non-zero...
-
[51]
Operator algebra formalism and notations In order to conveniently compute the commutation relation of Pauli operators on lattices, the polynomial represen- tation is usually adapted. A general Pauli group (the group of Pauli operators acting on multiple qubits) on the lattice can be expressed in terms of polynomials [37], and their commutation relation ca...
-
[52]
T opological order enriched by HOCA symmetries Now we want to construct topological order models with extra symmetries generated by HOCA. Generally, this can be done by partially gauging [12] the global symmetry in one sublattice of a higher-order cellular automata generated symmetry-protected topological (HGSPT) model [28]. For simplicity, we focus on th...
-
[53]
We assume the system is defined on an L × L square lattice with periodic boundary condition (i.e
Symmetry and ground state picture Defined on periodic boundary condition, we can calculate the ground state degeneracy of the model by counting the qubits and the constraints. We assume the system is defined on an L × L square lattice with periodic boundary condition (i.e. torus). The model has the following properties:
-
[54]
There are 3 qubits per site, resulting in a total of 3 L2 qubits in the system
Total Qubits: The model is defined on an L × L lattice with periodic boundary conditions (a torus). There are 3 qubits per site, resulting in a total of 3 L2 qubits in the system
-
[55]
For L2 vertices, this gives a total of L2 + L2 = 2 L2 vertex-based constraints
Vertex Constraints: The Hamiltonian Hf imposes two types of stabilizer constraints associated with each vertex: one ˜Av term and one ˜Cv term. For L2 vertices, this gives a total of L2 + L2 = 2 L2 vertex-based constraints
-
[56]
On an L×L lattice, this contributes L2 plaquette-based constraints
Plaquette Constraints: There is one ˜Bp stabilizer term for each plaquette. On an L×L lattice, this contributes L2 plaquette-based constraints
-
[57]
Constraint Dependencies : The stabilizer generators are not fully independent. There are two relations among them: • The product of all plaquette operators is the identity operator: Q p ˜Bp = 1. • The product of all ˜Av vertex operators is also the identity operator: Q v ˜Av = 1. These two dependencies reduce the number of independent constraints by 2
-
[58]
Ground State Degeneracy Calculation : The logarithm of the ground state degeneracy (GSD) is the total number of qubits minus the number of independent constraints. log2 GSD = #(Qubits) − #(Independent Constraints) = 3L2 − (2L2 + L2 − 2) = 2. (B23) This yields a GSD of 2 2 = 4, which is identical to the standard toric code model on a torus. This confirms t...
-
[59]
Symmetric string operator for anyons In the presence of symmetry, the symmetry operator for anyons in toric code can be significantly modified. Here the “string operator” may not have the shape of a string. Here we formally define a string operator as some locally supported operators that annihilate a certain excitation and create the identical excitation...
-
[60]
Proof of Theorem 1 In the Letter, we claim that given a composite anyon E = m(x, y) in the SET model generated by the HOCA rule f(x, y), we have the following theorem: Theorem 2. The mobility polynomial of excitation E = m(x, y) is determined by a characteristic polynomial g[f(x, y), m(x, y)] = f(x, y) gcd(f(x, y), m(x, y)) (C1) via the following three rules:
-
[61]
If g(x, y) = 1, then the excitation is fully mobile, with rE(x, y) =P i,j∈Z xiyj
-
[62]
See [44] Chapter 1 for more details)
If g(x, y) = t[q(x, y)] for some monomial q(x, y) = xuyv, and polynomial t(q) in F2[q] with t(0) = 1 (meaning that t(q) is reversible in F2[[q]], the formal power series ring of q, containing elements like P∞ i=−∞ λiqi, where λi ∈ F2. See [44] Chapter 1 for more details). Let t−1(q) =P∞ k=0 bkqk be the inverse of t(q), then the excitation 21 has linear mo...
-
[63]
To prove this theorem, we first introduce the following useful definitions and lemmas: Definition 5
Otherwise, the excitation is immobile with rE(x, y) = 1. To prove this theorem, we first introduce the following useful definitions and lemmas: Definition 5. Mobility Polynomial r(x, y) for a given excitation E is defined as the sum of monomials xiyj that E and xiyjE can be annihilated simultaneously by a symmetric string operator. For example, if some ex...
-
[64]
Find all possible h(x, y) such that h(x, y)m(x, y) ∈ ⟨f ⟩
-
[65]
+” is the Minkowski sum, and “ ·
Check whether 1 + xiyj is one of the h(x, y). By definition, the set of all possible h(x, y) is exactly the quotient of two ideals: h(x, y) ∈ ⟨f ⟩ : ⟨m⟩ . (C12) Since F2[x, y, ¯x, ¯y] is a unique factorization domain (UFD), we have [44] ⟨f ⟩ : ⟨m⟩ = f gcd(f, m) , (C13) which contains all possible polynomial h(x, y). Now we determine whether 1 + xiyj is in...
-
[66]
Thus ∀i, j ∈ Z, 1 + xiyj ∈ ⟨g⟩
If g(x, y) = 1, or equivalently dim Newt( g) = 0, then ⟨g⟩ = F2[x, y, x−1, y−1], which is the original polynomial ring. Thus ∀i, j ∈ Z, 1 + xiyj ∈ ⟨g⟩. Thus the mobility polynomial is rE(x, y) = X i,j∈Z xiyj, (C22) indicating that the excitation is fully mobile
-
[67]
(B35)) dN(x, y)¯t(x, y) = 1 + xuN yvN = 1 + qN , N ∈ Z+, q := xuyv
If g(x, y) = t(xuyv), or equivalently, according to Lemma 4, dim Newt( g) = 1 , where t is some polynomial in F2[x], then we need to prove that there exists a set {dN(x, y)|N ∈ Z+} such that (according to Eq. (B35)) dN(x, y)¯t(x, y) = 1 + xuN yvN = 1 + qN , N ∈ Z+, q := xuyv. (C23) The bar sign over t is taken since in Eq. (B34), the excitation map of eac...
-
[68]
This follows directly from Lemma 6
For any other cases, or dim Newt( g) = 2, then 1 + xiyj /∈ ⟨ g⟩. This follows directly from Lemma 6. Since dim Newt(1 +xiyj) = 1 and we are considering a 2D vector space, assume that ∃h(x, y) such that hg = 1 +xiyj, then we have dim Newt(hg) ≥ max(dim Newt(h), dim Newt(g)) = 2, (C39) giving 1 = dim Newt(1 +xiyj) = dim Newt(hg) = 2, which leads a contradic...
-
[69]
+” sign here denotes different “mobility fusion channels
Proof of fusion rules of mobility Now we utilize Theorem 1 to calculate the fusion rules for mobility. In the Letter, we claim that Theorem 3. If we denote fully mobile excitations in the model as α, lineons with mobility along the vector v and the period T as βv,T , and fractons as γ. Here δvv′ equals 1 when v ∥ v′, and equals 0 otherwise. The “ +” sign ...
-
[70]
(C45) Using Lemma 9, gcd( f, m1 + m2) = f
α × α = α: This indicates that g(f, m1,2) = f gcd(f, m1,2) = 1, (C44) yielding that gcd(f, m1,2) = f. (C45) Using Lemma 9, gcd( f, m1 + m2) = f. So g(f, m1 + m2) = 1, (C46) indicating that we always get a fully mobile excitation. 27
-
[71]
α × βv,T = βv,T : Using Lemma 9, gcd( f, m1 + m2) = f. So g(f, m1 + m2) = g(f, m2), (C47) indicating that we always get the same lineon as in the fusion process
-
[72]
So g(f, m1 + m2) = g(f, m2), (C48) indicating that we always get a fracton
α × γ = γ: Using Lemma 9, gcd( f, m1 + m2) = f. So g(f, m1 + m2) = g(f, m2), (C48) indicating that we always get a fracton
-
[73]
βv,T × βv′,T ′ = (1 − δvv′)γ + δvv′(α +P ˜T | lcm(T,T ′) βv, ˜T ): The fusion of two lineons have two possibilities: they can move in the same direction or not. We will discuss case by case. (a) Same direction: If m1 and m2 can move in the same direction, which means v = v′ and δvv′ = 1. This means g(f, m1,2) = t1,2[q(x, y)], q = xuyv. (C49) First, it is ...
-
[74]
Since D′ divides Fq, K1, and K2, it must also divide Fq and the sum K1 + K2
= gcd( Fq, K1, K2). Since D′ divides Fq, K1, and K2, it must also divide Fq and the sum K1 + K2. Thus, D′ must divide their greatest common divisor, d′ 0 = gcd(Fq, K1 + K2). The relation gcd( d′ 1, d′
-
[75]
Using the identity for the least common multiple, this means Q0 | lcm(Q1, Q2)
| d′ 0 implies that Fq/d′ 0 | Fq/ gcd(d′ 1, d′ 2). Using the identity for the least common multiple, this means Q0 | lcm(Q1, Q2). The period Ti is the order of q modulo Qi(q). The polynomial divisibility Q0 | lcm(Q1, Q2) implies a divisibility relation for the orders: ord Q0(q)(q) | ordlcm(Q1,Q2)(q). Since the order of an lcm is the lcm of the orders, we ...
-
[76]
βv,T × γ = P ˜v̸=v, ˜T β˜v, ˜T + γ: This shows that if we fuse a lineon with a fracton, we may get a lineon with different direction or a fracton. Now we prove this rule. Let g(f, m1) = t(q), (C63) and we have dim Newt g(f, m2) = 2. Assume the HOCA rule is f(x, y) = e(x, y) NY i=1 ti(qi), (C64) where qi = xui yvi satisfies uivj − ujvi ̸= 0 for i ̸= j. Thi...
-
[77]
This can be directly verified by taking the example f(x, y) = 1 + x + y + xy
γ × γ = α +P v,T βv,T + γ: This suggests the fusion of two fractons can result in all possible mobility types. This can be directly verified by taking the example f(x, y) = 1 + x + y + xy. One can immediately verify that γ1 = 1, γ2 = x, γ3 = y, γ4 = xy, γ5 = x + y, γ6 = 1 + xy are all fractons, β1 = 1 + x, β2 = 1 + y are two lineons with different directi...
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.