-
EUSO-SPB1 Mission and Science
Authors:
JEM-EUSO Collaboration,
:,
G. Abdellaoui,
S. Abe,
J. H. Adams. Jr.,
D. Allard,
G. Alonso,
L. Anchordoqui,
A. Anzalone,
E. Arnone,
K. Asano,
R. Attallah,
H. Attoui,
M. Ave Pernas,
R. Bachmann,
S. Bacholle,
M. Bagheri,
M. Bakiri,
J. Baláz,
D. Barghini,
S. Bartocci,
M. Battisti,
J. Bayer,
B. Beldjilali,
T. Belenguer
, et al. (271 additional authors not shown)
Abstract:
The Extreme Universe Space Observatory on a Super Pressure Balloon 1 (EUSO-SPB1) was launched in 2017 April from Wanaka, New Zealand. The plan of this mission of opportunity on a NASA super pressure balloon test flight was to circle the southern hemisphere. The primary scientific goal was to make the first observations of ultra-high-energy cosmic-ray extensive air showers (EASs) by looking down on…
▽ More
The Extreme Universe Space Observatory on a Super Pressure Balloon 1 (EUSO-SPB1) was launched in 2017 April from Wanaka, New Zealand. The plan of this mission of opportunity on a NASA super pressure balloon test flight was to circle the southern hemisphere. The primary scientific goal was to make the first observations of ultra-high-energy cosmic-ray extensive air showers (EASs) by looking down on the atmosphere with an ultraviolet (UV) fluorescence telescope from suborbital altitude (33~km). After 12~days and 4~hours aloft, the flight was terminated prematurely in the Pacific Ocean. Before the flight, the instrument was tested extensively in the West Desert of Utah, USA, with UV point sources and lasers. The test results indicated that the instrument had sensitivity to EASs of approximately 3 EeV. Simulations of the telescope system, telescope on time, and realized flight trajectory predicted an observation of about 1 event assuming clear sky conditions. The effects of high clouds were estimated to reduce this value by approximately a factor of 2. A manual search and a machine-learning-based search did not find any EAS signals in these data. Here we review the EUSO-SPB1 instrument and flight and the EAS search.
△ Less
Submitted 12 January, 2024;
originally announced January 2024.
-
Gamma-Ray Burst observations by the high-energy charged particle detector on board the CSES-01 satellite between 2019 and 2021
Authors:
Francesco Palma,
Matteo Martucci,
Coralie Neubüser,
Alessandro Sotgiu,
Francesco Maria Follega,
Pietro Ubertini,
Angela Bazzano,
James Rodi,
Roberto Ammendola,
Davide Badoni,
Simona Bartocci,
Roberto Battiston,
Stefania Beolè,
Igor Bertello,
William Jerome Burger,
Donatella Campana,
Antonio Cicone,
Piero Cipollone,
Silvia Coli,
Livio Conti,
Andrea Contin,
Marco Cristoforetti,
Giulia D'Angelo,
Fabrizio De Angelis,
Cinzia De Donato
, et al. (46 additional authors not shown)
Abstract:
In this paper we report the detection of five strong Gamma-Ray Bursts (GRBs) by the High-Energy Particle Detector (HEPD-01) mounted on board the China Seismo-Electromagnetic Satellite (CSES-01), operational since 2018 on a Sun-synchronous polar orbit at a $\sim$ 507 km altitude and 97$^\circ$ inclination. HEPD-01 was designed to detect high-energy electrons in the energy range 3 - 100 MeV, protons…
▽ More
In this paper we report the detection of five strong Gamma-Ray Bursts (GRBs) by the High-Energy Particle Detector (HEPD-01) mounted on board the China Seismo-Electromagnetic Satellite (CSES-01), operational since 2018 on a Sun-synchronous polar orbit at a $\sim$ 507 km altitude and 97$^\circ$ inclination. HEPD-01 was designed to detect high-energy electrons in the energy range 3 - 100 MeV, protons in the range 30 - 300 MeV, and light nuclei in the range 30 - 300 MeV/n. Nonetheless, Monte Carlo simulations have shown HEPD-01 is sensitive to gamma-ray photons in the energy range 300 keV - 50 MeV, even if with a moderate effective area above $\sim$ 5 MeV. A dedicated time correlation analysis between GRBs reported in literature and signals from a set of HEPD-01 trigger configuration masks has confirmed the anticipated detector sensitivity to high-energy photons. A comparison between the simultaneous time profiles of HEPD-01 electron fluxes and photons from GRB190114C, GRB190305A, GRB190928A, GRB200826B and GRB211211A has shown a remarkable similarity, in spite of the different energy ranges. The high-energy response, with peak sensitivity at about 2 MeV, and moderate effective area of the detector in the actual flight configuration explain why these five GRBs, characterised by a fluence above $\sim$ 3 $\times$ 10$^{-5}$ erg cm$^{-2}$ in the energy interval 300 keV - 50 MeV, have been detected.
△ Less
Submitted 25 October, 2023;
originally announced October 2023.
-
ImageNet-Patch: A Dataset for Benchmarking Machine Learning Robustness against Adversarial Patches
Authors:
Maura Pintor,
Daniele Angioni,
Angelo Sotgiu,
Luca Demetrio,
Ambra Demontis,
Battista Biggio,
Fabio Roli
Abstract:
Adversarial patches are optimized contiguous pixel blocks in an input image that cause a machine-learning model to misclassify it. However, their optimization is computationally demanding, and requires careful hyperparameter tuning, potentially leading to suboptimal robustness evaluations. To overcome these issues, we propose ImageNet-Patch, a dataset to benchmark machine-learning models against a…
▽ More
Adversarial patches are optimized contiguous pixel blocks in an input image that cause a machine-learning model to misclassify it. However, their optimization is computationally demanding, and requires careful hyperparameter tuning, potentially leading to suboptimal robustness evaluations. To overcome these issues, we propose ImageNet-Patch, a dataset to benchmark machine-learning models against adversarial patches. It consists of a set of patches, optimized to generalize across different models, and readily applicable to ImageNet data after preprocessing them with affine transformations. This process enables an approximate yet faster robustness evaluation, leveraging the transferability of adversarial perturbations. We showcase the usefulness of this dataset by testing the effectiveness of the computed patches against 127 models. We conclude by discussing how our dataset could be used as a benchmark for robustness, and how our methodology can be generalized to other domains. We open source our dataset and evaluation code at https://github.com/pralab/ImageNet-Patch.
△ Less
Submitted 7 March, 2022;
originally announced March 2022.
-
JEM-EUSO Collaboration contributions to the 37th International Cosmic Ray Conference
Authors:
G. Abdellaoui,
S. Abe,
J. H. Adams Jr.,
D. Allard,
G. Alonso,
L. Anchordoqui,
A. Anzalone,
E. Arnone,
K. Asano,
R. Attallah,
H. Attoui,
M. Ave Pernas,
M. Bagheri,
J. Baláz,
M. Bakiri,
D. Barghini,
S. Bartocci,
M. Battisti,
J. Bayer,
B. Beldjilali,
T. Belenguer,
N. Belkhalfa,
R. Bellotti,
A. A. Belov,
K. Benmessai
, et al. (267 additional authors not shown)
Abstract:
Compilation of papers presented by the JEM-EUSO Collaboration at the 37th International Cosmic Ray Conference (ICRC), held on July 12-23, 2021 (online) in Berlin, Germany.
Compilation of papers presented by the JEM-EUSO Collaboration at the 37th International Cosmic Ray Conference (ICRC), held on July 12-23, 2021 (online) in Berlin, Germany.
△ Less
Submitted 28 January, 2022;
originally announced January 2022.
-
Helium fluxes measured by the PAMELA experiment from the minimum to the maximum solar activity for solar cycle 24
Authors:
N. Marcelli,
M. Boezio,
A. Lenni,
W. Menn,
R. Munini,
O. P. M. Aslam,
D. Bisschoff,
M. D. Ngobeni,
M. S. Potgieter,
O. Adriani,
G. C. Barbarino,
G. A. Bazilevskaya,
R. Bellotti,
E. A. Bogomolov,
M. Bongi,
V. Bonvicini,
A. Bruno,
F. Cafagna,
D. Campana,
P. Carlson,
M. Casolino,
G. Castellini,
C. De Santis,
A. M. Galper,
S. V. Koldashov
, et al. (31 additional authors not shown)
Abstract:
Time-dependent energy spectra of galactic cosmic rays (GCRs) carry fundamental information regarding their origin and propagation. When observed at the Earth, these spectra are significantly affected by the solar wind and the embedded solar magnetic field that permeates the heliosphere, changing significantly over an 11-year solar cycle. Energy spectra of GCRs measured during different epochs of s…
▽ More
Time-dependent energy spectra of galactic cosmic rays (GCRs) carry fundamental information regarding their origin and propagation. When observed at the Earth, these spectra are significantly affected by the solar wind and the embedded solar magnetic field that permeates the heliosphere, changing significantly over an 11-year solar cycle. Energy spectra of GCRs measured during different epochs of solar activity provide crucial information for a thorough understanding of solar and heliospheric phenomena. The PAMELA experiment had collected data for almost ten years (15th June 2006 - 23rd January 2016), including the minimum phase of solar cycle 23 and the maximum phase of solar cycle 24. In this paper, we present new spectra for helium nuclei measured by the PAMELA instrument from January 2010 to September 2014 over a three Carrington rotation time basis. These data are compared to the PAMELA spectra measured during the previous solar minimum providing a picture of the time dependence of the helium nuclei fluxes over a nearly full solar cycle. Time and rigidity dependencies are observed in the proton-to-helium flux ratios. The force-field approximation of the solar modulation was used to relate these dependencies to the shapes of the local interstellar proton and helium-nuclei spectra.
△ Less
Submitted 4 January, 2022;
originally announced January 2022.
-
Solar-Cycle Variations of South-Atlantic Anomaly Proton Intensities Measured With The PAMELA Mission
Authors:
A. Bruno,
M. Martucci,
F. S. Cafagna,
R. Sparvoli,
O. Adriani,
G. C. Barbarino,
G. A. Bazilevskaya,
R. Bellotti,
M. Boezio,
E. A. Bogomolov,
M. Bongi,
V. Bonvicini,
D. Campana,
P. Carlson,
M. Casolino,
G. Castellini,
C. De Santis,
A. M. Galper,
S. V. Koldashov,
S. Koldobskiy,
A. N. Kvashnin,
A. Lenni,
A. A. Leonov,
V. V. Malakhov,
L. Marcelli
, et al. (28 additional authors not shown)
Abstract:
We present a study of the solar-cycle variations of >80 MeV proton flux intensities in the lower edge of the inner radiation belt, based on the measurements of the Payload for Antimatter Matter Exploration and Light-nuclei Astrophysics (PAMELA) mission. The analyzed data sample covers an ~8 year interval from 2006 July to 2014 September, thus spanning from the decaying phase of the 23rd solar cycl…
▽ More
We present a study of the solar-cycle variations of >80 MeV proton flux intensities in the lower edge of the inner radiation belt, based on the measurements of the Payload for Antimatter Matter Exploration and Light-nuclei Astrophysics (PAMELA) mission. The analyzed data sample covers an ~8 year interval from 2006 July to 2014 September, thus spanning from the decaying phase of the 23rd solar cycle to the maximum of the 24th cycle. We explored the intensity temporal variations as a function of drift shell and proton energy, also providing an explicit investigation of the solar-modulation effects at different equatorial pitch angles. PAMELA observations offer new important constraints for the modeling of low-altitude particle radiation environment at the highest trap** energies.
△ Less
Submitted 13 August, 2021;
originally announced August 2021.
-
Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples
Authors:
Maura Pintor,
Luca Demetrio,
Angelo Sotgiu,
Ambra Demontis,
Nicholas Carlini,
Battista Biggio,
Fabio Roli
Abstract:
Evaluating robustness of machine-learning models to adversarial examples is a challenging problem. Many defenses have been shown to provide a false sense of robustness by causing gradient-based attacks to fail, and they have been broken under more rigorous evaluations. Although guidelines and best practices have been suggested to improve current adversarial robustness evaluations, the lack of auto…
▽ More
Evaluating robustness of machine-learning models to adversarial examples is a challenging problem. Many defenses have been shown to provide a false sense of robustness by causing gradient-based attacks to fail, and they have been broken under more rigorous evaluations. Although guidelines and best practices have been suggested to improve current adversarial robustness evaluations, the lack of automatic testing and debugging tools makes it difficult to apply these recommendations in a systematic manner. In this work, we overcome these limitations by: (i) categorizing attack failures based on how they affect the optimization of gradient-based attacks, while also unveiling two novel failures affecting many popular attack implementations and past evaluations; (ii) proposing six novel indicators of failure, to automatically detect the presence of such failures in the attack optimization process; and (iii) suggesting a systematic protocol to apply the corresponding fixes. Our extensive experimental analysis, involving more than 15 models in 3 distinct application domains, shows that our indicators of failure can be used to debug and improve current adversarial robustness evaluations, thereby providing a first concrete step towards automatizing and systematizing them. Our open-source code is available at: https://github.com/pralab/IndicatorsOfAttackFailure.
△ Less
Submitted 11 October, 2022; v1 submitted 18 June, 2021;
originally announced June 2021.
-
FADER: Fast Adversarial Example Rejection
Authors:
Francesco Crecchi,
Marco Melis,
Angelo Sotgiu,
Davide Bacciu,
Battista Biggio
Abstract:
Deep neural networks are vulnerable to adversarial examples, i.e., carefully-crafted inputs that mislead classification at test time. Recent defenses have been shown to improve adversarial robustness by detecting anomalous deviations from legitimate training samples at different layer representations - a behavior normally exhibited by adversarial attacks. Despite technical differences, all aforeme…
▽ More
Deep neural networks are vulnerable to adversarial examples, i.e., carefully-crafted inputs that mislead classification at test time. Recent defenses have been shown to improve adversarial robustness by detecting anomalous deviations from legitimate training samples at different layer representations - a behavior normally exhibited by adversarial attacks. Despite technical differences, all aforementioned methods share a common backbone structure that we formalize and highlight in this contribution, as it can help in identifying promising research directions and drawbacks of existing methods. The first main contribution of this work is the review of these detection methods in the form of a unifying framework designed to accommodate both existing defenses and newer ones to come. In terms of drawbacks, the overmentioned defenses require comparing input samples against an oversized number of reference prototypes, possibly at different representation layers, dramatically worsening the test-time efficiency. Besides, such defenses are typically based on ensembling classifiers with heuristic methods, rather than optimizing the whole architecture in an end-to-end manner to better perform detection. As a second main contribution of this work, we introduce FADER, a novel technique for speeding up detection-based methods. FADER overcome the issues above by employing RBF networks as detectors: by fixing the number of required prototypes, the runtime complexity of adversarial examples detectors can be controlled. Our experiments outline up to 73x prototypes reduction compared to analyzed detectors for MNIST dataset and up to 50x for CIFAR10 dataset respectively, without sacrificing classification accuracy on both clean and adversarial data.
△ Less
Submitted 18 October, 2020;
originally announced October 2020.
-
Domain Knowledge Alleviates Adversarial Attacks in Multi-Label Classifiers
Authors:
Stefano Melacci,
Gabriele Ciravegna,
Angelo Sotgiu,
Ambra Demontis,
Battista Biggio,
Marco Gori,
Fabio Roli
Abstract:
Adversarial attacks on machine learning-based classifiers, along with defense mechanisms, have been widely studied in the context of single-label classification problems. In this paper, we shift the attention to multi-label classification, where the availability of domain knowledge on the relationships among the considered classes may offer a natural way to spot incoherent predictions, i.e., predi…
▽ More
Adversarial attacks on machine learning-based classifiers, along with defense mechanisms, have been widely studied in the context of single-label classification problems. In this paper, we shift the attention to multi-label classification, where the availability of domain knowledge on the relationships among the considered classes may offer a natural way to spot incoherent predictions, i.e., predictions associated to adversarial examples lying outside of the training data distribution. We explore this intuition in a framework in which first-order logic knowledge is converted into constraints and injected into a semi-supervised learning problem. Within this setting, the constrained classifier learns to fulfill the domain knowledge over the marginal distribution, and can naturally reject samples with incoherent predictions. Even though our method does not exploit any knowledge of attacks during training, our experimental analysis surprisingly unveils that domain-knowledge constraints can help detect adversarial examples effectively, especially if such constraints are not known to the attacker.
△ Less
Submitted 29 December, 2021; v1 submitted 6 June, 2020;
originally announced June 2020.
-
Time dependence of the flux of helium nuclei in cosmic rays measured by the PAMELA experiment between July 2006 and December 2009
Authors:
N. Marcelli,
M. Boezio,
A. Lenni,
W. Menn,
R. Munini,
O. P. M. Aslam,
D. Bisschoff,
M. D. Ngobeni,
M. S. Potgieter,
O. Adriani,
G. C. Barbarino,
G. A. Bazilevskaya,
R. Bellotti,
E. A. Bogomolov,
M. Bongi,
V. Bonvicini,
A. Bruno,
F. Cafagna,
D. Campana,
P. Carlson,
M. Casolino,
G. Castellini,
C. De Santis,
A. M. Galper,
S. V. Koldashov
, et al. (31 additional authors not shown)
Abstract:
Precise time-dependent measurements of the Z = 2 component in the cosmic radiation provide crucial information about the propagation of charged particles through the heliosphere. The PAMELA experiment, with its long flight duration (15th June 2006 - 23rd January 2016) and the low energy threshold (80 MeV/n) is an ideal detector for cosmic ray solar modulation studies. In this paper, the helium nuc…
▽ More
Precise time-dependent measurements of the Z = 2 component in the cosmic radiation provide crucial information about the propagation of charged particles through the heliosphere. The PAMELA experiment, with its long flight duration (15th June 2006 - 23rd January 2016) and the low energy threshold (80 MeV/n) is an ideal detector for cosmic ray solar modulation studies. In this paper, the helium nuclei spectra measured by the PAMELA instrument from July 2006 to December 2009 over a Carrington rotation time basis are presented. A state-of-the-art three-dimensional model for cosmic-ray propagation inside the heliosphere was used to interpret the time-dependent measured fluxes. Proton-to-helium flux ratio time profiles at various rigidities are also presented in order to study any features which could result from the different masses and local interstellar spectra shapes.
△ Less
Submitted 18 May, 2020;
originally announced May 2020.
-
secml: A Python Library for Secure and Explainable Machine Learning
Authors:
Maura Pintor,
Luca Demetrio,
Angelo Sotgiu,
Marco Melis,
Ambra Demontis,
Battista Biggio
Abstract:
We present \texttt{secml}, an open-source Python library for secure and explainable machine learning. It implements the most popular attacks against machine learning, including test-time evasion attacks to generate adversarial examples against deep neural networks and training-time poisoning attacks against support vector machines and many other algorithms. These attacks enable evaluating the secu…
▽ More
We present \texttt{secml}, an open-source Python library for secure and explainable machine learning. It implements the most popular attacks against machine learning, including test-time evasion attacks to generate adversarial examples against deep neural networks and training-time poisoning attacks against support vector machines and many other algorithms. These attacks enable evaluating the security of learning algorithms and the corresponding defenses under both white-box and black-box threat models. To this end, \texttt{secml} provides built-in functions to compute security evaluation curves, showing how quickly classification performance decreases against increasing adversarial perturbations of the input data. \texttt{secml} also includes explainability methods to help understand why adversarial attacks succeed against a given model, by visualizing the most influential features and training prototypes contributing to each decision. It is distributed under the Apache License 2.0 and hosted at \url{https://github.com/pralab/secml}.
△ Less
Submitted 13 May, 2022; v1 submitted 20 December, 2019;
originally announced December 2019.
-
Deep Neural Rejection against Adversarial Examples
Authors:
Angelo Sotgiu,
Ambra Demontis,
Marco Melis,
Battista Biggio,
Giorgio Fumera,
Xiaoyi Feng,
Fabio Roli
Abstract:
Despite the impressive performances reported by deep neural networks in different application domains, they remain largely vulnerable to adversarial examples, i.e., input samples that are carefully perturbed to cause misclassification at test time. In this work, we propose a deep neural rejection mechanism to detect adversarial examples, based on the idea of rejecting samples that exhibit anomalou…
▽ More
Despite the impressive performances reported by deep neural networks in different application domains, they remain largely vulnerable to adversarial examples, i.e., input samples that are carefully perturbed to cause misclassification at test time. In this work, we propose a deep neural rejection mechanism to detect adversarial examples, based on the idea of rejecting samples that exhibit anomalous feature representations at different network layers. With respect to competing approaches, our method does not require generating adversarial examples at training time, and it is less computationally demanding. To properly evaluate our method, we define an adaptive white-box attack that is aware of the defense mechanism and aims to bypass it. Under this worst-case setting, we empirically show that our approach outperforms previously-proposed methods that detect adversarial examples by only analyzing the feature representation provided by the output network layer.
△ Less
Submitted 17 April, 2020; v1 submitted 1 October, 2019;
originally announced October 2019.
-
Spontaneous Radiofrequency Emission from Electron Spins within Drosophila: a preliminary report on a novel biological signal
Authors:
Alexandros Gaitanidis,
Antonello Sotgiu,
Luca Turin
Abstract:
Using simple radiofrequency (RF) instrumentation, we detect spontaneous RF emission from Drosophila immersed in a magnetic field within a waveguide or a shielded RF resonator. Remarkably, the RF emissions are abolished by chloroform anesthesia. Conversely, activation of the nervous system by temperature-sensitive cation channels causes bursts of radiofrequency emission. Both observations suggest t…
▽ More
Using simple radiofrequency (RF) instrumentation, we detect spontaneous RF emission from Drosophila immersed in a magnetic field within a waveguide or a shielded RF resonator. Remarkably, the RF emissions are abolished by chloroform anesthesia. Conversely, activation of the nervous system by temperature-sensitive cation channels causes bursts of radiofrequency emission. Both observations suggest that the radiofrequency emissions come from the nervous system. RF frequency and magnetic field dependence are consistent with RF emission being related to electron Zeeman energy. Since the RF emission occurs without external energy input, its energy must come from cell metabolism.We propose that RF emissions are due to in vivo spin-polarised cellular electron currents. We suggest that spin-polarised currents relax radiatively to equilibrium at the Larmor frequency and are detected under our experimental conditions (resonator cavity and lock-in detection). We invite scrutiny of our methods and results, aim to elicit theorists interest in this novel phenomenon, and encourage replication in this and other preparations.
△ Less
Submitted 15 May, 2021; v1 submitted 10 July, 2019;
originally announced July 2019.
-
IntelliAV: Building an Effective On-Device Android Malware Detector
Authors:
Mansour Ahmadi,
Angelo Sotgiu,
Giorgio Giacinto
Abstract:
The importance of employing machine learning for malware detection has become explicit to the security community. Several anti-malware vendors have claimed and advertised the application of machine learning in their products in which the inference phase is performed on servers and high-performance machines, but the feasibility of such approaches on mobile devices with limited computational resourc…
▽ More
The importance of employing machine learning for malware detection has become explicit to the security community. Several anti-malware vendors have claimed and advertised the application of machine learning in their products in which the inference phase is performed on servers and high-performance machines, but the feasibility of such approaches on mobile devices with limited computational resources has not yet been assessed by the research community, vendors still being skeptical. In this paper, we aim to show the practicality of devising a learning-based anti-malware on Android mobile devices, first. Furthermore, we aim to demonstrate the significance of such a tool to cease new and evasive malware that can not easily be caught by signature-based or offline learning-based security tools. To this end, we first propose the extraction of a set of lightweight yet powerful features from Android applications. Then, we embed these features in a vector space to build an effective as well as efficient model. Hence, the model can perform the inference on the device for detecting potentially harmful applications. We show that without resorting to any signatures and relying only on a training phase involving a reasonable set of samples, the proposed system, named IntelliAV, provides more satisfying performances than the popular major anti-malware products. Moreover, we evaluate the robustness of IntelliAV against common obfuscation techniques where most of the anti-malware solutions get affected.
△ Less
Submitted 4 February, 2018;
originally announced February 2018.
-
Study of the performance of the HEPD apparatus for the CSES mission
Authors:
Beatrice Panico,
Francesco Palma,
Alessandro Sotgiu
Abstract:
The High-Energy Particle Detector (HEPD) is one of the payloads of the CSES space mission. The CSES (China Seismo-Electromagnetic Satellite) mission will investigate the structure and the dynamic of the topside ionosphere, will monitor electric and magnetic field and high energy particle fluctuations, searching for their correlations with the geophysical activity, in order to contribute to the mon…
▽ More
The High-Energy Particle Detector (HEPD) is one of the payloads of the CSES space mission. The CSES (China Seismo-Electromagnetic Satellite) mission will investigate the structure and the dynamic of the topside ionosphere, will monitor electric and magnetic field and high energy particle fluctuations, searching for their correlations with the geophysical activity, in order to contribute to the monitoring of earthquakes from space. The HEPD is built by the Italian collaboration and has different goals. It will study the temporal stability of the inner Van Allen radiation belts, the precipitation of trapped particles in the atmosphere and the low energy component of the cosmic rays (5 - 100 MeV for electrons and 15 - 300 MeV for protons). Here is presented a study of the performance of the apparatus to separate electrons and protons and identify nuclei up to iron.
△ Less
Submitted 30 January, 2017;
originally announced January 2017.