<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Risk Assessment in Collaborative Robotics</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>DEIB, Politecnico di Milano</institution>
          ,
          <addr-line>Milan</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Problems and Objectives. In Human-Robot Collaborative (HRC) applications, operators and robots work in a common space. Their close interactions increase the likelihood of direct physical contacts either due to the intrinsics of the operations (e.g., tools, motions, etc) or behavior of the operator (e.g., mistakes, misuses, instruction misunderstanding, etc). Unintended physical contacts may lead to hazardous situations for the operator. In order to identify and avoid such situations as far as possible, we need to define and develop a comprehensive approach for safety assessment of HRC applications, that includes: - Complying standards of risk analysis [10] and robotic safety [9]. - Ensuring the absence of unforeseen hazardous situations during design of systems by formal verification. - Focusing on hazards caused by behavior of operators. - Identifying hazards automatically, hence none is unconsidered, however keeping a human-in-the-loop attitude to interact with safety analyzers in order to use their operational perspective and experience. - Estimating the gravity of identified hazard as a quantified value-named risk, which is computed on the basis of detailed analysis of the whole system (e.g., the severity of the injury that it causes). - Suggesting proper treatments known as Risk Reduction Measures (RRM), which decrease the risk down to a negligible threshold.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Our approach to provide the above mentioned factors exploits formal methods
for the specification and verification of system properties and is centered on the
following steps: (i) Observe a real HRC case study to achieve a common
understanding with robotic community about safety requirements, hazards and their
relevant treatments, (ii) Define a coherent methodology to describe applications
and verify if they provide a minimum level of safety, (iii) Build a modular model
of the case study by use of a decidable fragment of the TRIO metric temporal
logic [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] and apply an iterative verification according to the defined
methodology, by use of the Zot tool [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], (iv) Generalize the model, so it will be tailored
to different case-studies by least possible amount of changes required, (v)
Evaluate the methodology and the generality of the model through new case studies,
(vi) Create a framework upon them to help safety engineers to design a system,
and iteratively equip it with as many RRMs as possible, so to make the design
trustworthy, (vii) Extend the use of the framework to runtime, as an assistant
to safety engineers to monitor the system, detect hazards and introduce suitable
RRM “on the fly”.
      </p>
      <p>
        Literature Review. We performed an extensive literature search on current
safety analysis research in robotics, and found that none of them recognizes the
operator as a proactive factor. There is no focus on the safety violations that
are caused by human activities and interactions with robots. Also there is no
compatibility with international standards [
        <xref ref-type="bibr" rid="ref10 ref11 ref9">9,10,11</xref>
        ] and robotic community.
      </p>
      <p>
        Two main approaches to determine the behavior of human operators in
literature are: cognitive and task-analytic models [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. The former involves a
formal model of human cognition as part of the system model. [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] identifies
principles that generate cognitively-plausible human behaviors such as repetition,
mis-sequencing and intrusion, and generate formalized templates from
cognitive psychology. However cognitive approaches are too hand-crafted and specific
models and do not address human fallibility and plausible errors.
      </p>
      <p>
        Task-analytic approaches, instead, model all the possible combinations of
hazardous situations, regardless of their cognitive reasons, by hierarchical
structures of tasks to be then decomposed into smaller functional units (atomic
actions). Execution and sequence of actions are usually controlled through pre- and
post-conditions. Examples of such approaches include the User Action Notation
in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], the ConcurTaskTrees Environment in [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] and the Enhanced Operator
Function Model by [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. These models are limited to normative behavior of
human and does not reflect human errors.
      </p>
      <p>
        In addition, traditional formal approaches such as FMEA (Failure Mode and
Effects Analysis) and FTA (Fault Tree Analysis) are not well-suited for HRC
applications because they do not capture hazards due to human factors or
combinations of hazards. They also produce a large amount of repeated information
and false positives and are dependent on the analyzers team which makes them
less generic [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. On the other hand, well-known informal solutions such as STPA
(Systems-Theoretic Process Analysis) [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] and HAZOP (Hazard and Operability
Study ) [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] describe an overall frame for hazard identification and safety design
for systems. Although they are used together with (semi-)formal solutions. For
example [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] combines UML diagrams and HAZOP to identify hazards.
      </p>
      <p>
        Other examples of combining formal and informal solutions are [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. They
use assistant robot case studies where operators do not collaborate with robots
and are more passive factors in the system, thus lacking a strong model of the
operator behavior. The former work addresses the impact of robot errors, while
the latter focuses more on application of Brahms language to model a system.
Current Progress. Our proposed methodology called SAFER-HRC (Safety
Assessment through Formal vERification in HRC applications) uses concepts of
temporal logic and satisfiability checking to automate the classic risk assessment
approach as much as possible [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. SAFER-HRC starts from designing a formal
model for a robotic application and incrementally refines it until required safety
properties according to ISO 10218 are satisfied. The refinements are done via
interacting with a safety engineer. The method can also be adopted at runtime
by using added measures at design time and also pre-defined urgent reactions.
We have introduced a preliminary version of it in [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Here its principles and
some further developments are explained.
      </p>
      <p>Input by
the
Safety
Engineer</p>
      <p>O
L</p>
      <p>T</p>
      <p>R</p>
      <p>Hazards Module
Risk Estimation</p>
      <p>Module
RRMs Module
risk &gt;T</p>
      <p>Zot
Update or Modify according to safety Eng. suggestions
List of interrupted
actions and
hazards.</p>
      <p>In order to make it easier for safety engineers to build formal models, we
introduced a general model, depicted in Fig. 1, which can be tailored to different
scenarios with a minimum amount of required input. It consists of four main
modules written in TRIO. The ORL-module includes formal descriptions for
operator O, robot R and layout L. The descriptions of O and R are generic
descriptions and there can be multiple instances of each of them, according to
the case study (e.g., defining predicates that describe parts of body and robot).
The rule set related to L divides the layout into fine-grained regions so that
positioning of O and R and their movements are expressible.</p>
      <p>The model also includes a set of
rules T concerning the definition of
tasks, what O and R are supposed to
execute in L. The definition of tasks
varies for different applications,thus
the safety analyzer provide them as
input. Tasks are broken down into a
set of elementary actions that are the
smallest possible functional units and
are executed either by the operator or
the robot. Each action is defined by
its pre and post-conditions and can be
in one of the following states at any
given time: “not started” (ns),
“waiting” (wt), “executing” (sfex),
“executing together with at least one RRM
” (exe), “hold” (hd), “exit” (exit), and
“done” (dn). The wt phase is defined
only for operator actions that asserts
preC of the action are true but
opFig. 2: In addition to their guards, black erator hesitates to start the
execuand blue edges also have 9i(riski T ), tion.The total state of the model is the
while red ones have 9i(riski &gt; T ). Cartesian product of the state of
actions and the value of predicates (e.g.,
positions, risk values).</p>
      <p>Figure.2 displays a state diagram representing the behavior of actions and
shows how their state changes.</p>
      <p>
        The Hazards module includes formal definition of situations generating a
significant hazard. It contains a set of formulae that use modal operators such as
Contact;( ; !) Approach;( ; !) Depart;( ; !) , where ; ! are parts of R and
O, to express the hazardous situations. Consequences of different hazards and
measuring their severity are explained exhaustively in [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. It also includes
reasonably foreseeable operator errors which lead to hazardous situations. Hazard
sources need to be updated as new situations and errors are detected.
      </p>
      <p>
        The Risk Estimation module includes the information regarding the
computation of risk of hazards according to the hybrid method reported in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>Finally, the RRM module defines all the RRMs that should additionally be
present in the model when a hazard occurs in a trace of the model. At Each
verification iteration, we check the full formal model explained above, against
the property Alw(8x(riskx T )). The property actually asserts that for all the
occurred hazards x, the value of risk should always be less than en acceptable
threshold T . The Zot explores the state-space of the model and looks for states
that conform with at least one hazard definition. If such state is detected and
its risk value is non-negligible, then verification is failed and Zot outputs the
problematic state so that we can refine the model.</p>
      <p>Case Study. We studied an assembly task in which workpieces should be
machined into fixtures attached to a pallet. A small collaborative robot, Kuka
lightweight manipulator, carrying an interchangeable screwdriver/gripper
endeffector is installed on a cart in close position to both the pallet and the operator.
The work-cell is equipped with cameras and sensors that detect the position of
robot and operator. The work-cell of the scenario and its division is shown in
Figure. 3(a).</p>
      <p>In the task, one of the executors (operator/robot) is supposed to set a
workpiece (wp) in place from a bin into the tombstone fixtures and holds the wp until
the other executor (robot/operator) completes the screwdriving. The operator
chooses the executor of each part of the task and sends relevant commands to
the robot through an interface.</p>
      <p>The user-provided description of the task is broken into several actions, each
formalized through a set of pre-/post-conditions. This is done through an
intermediate stage of translating the textual description to UML notation, in
particular activity diagrams (see Figure.3(b))1.</p>
      <p>We found out about some hazardous situations that have been overlooked
in earlier versions of the model, through the verification process. For example
different timing behavior of the operator and robot (considering the timeout of
the operator actions) can lead to different circumstances. Also replacing actions
of a task with actions from elsewhere (e.g., with actions of different tasks, that
may happen due to misunderstanding of the task instructions) by the operator
creates situations that have not been anticipated initially.
1 The complete formal model and the experiments can be found at repository.
(a)
(b)</p>
      <p>Further Work. SAFER-HRC takes into account also the concurrency of
multiple actions, in particular actions that must be executed by the operator and by
the robot in full coordination. It explores all the different order of execution of
actions. For example, traces ai; aj and aj ; ai achieve the same goal, but executing
ai after aj causes a hazard that does not exist in the first trace (e.g., , a change
in positioning of the operator w.r.t the robot). In the remaining year of my phD,
we plan to exploit this feature of the work using larger scale and more complex
case studies. Next we will develop a stand alone framework for interactive risk
assessment of HRC applications for system designer and safety engineers. In a
longer-term perspective, we aim to empower the framework with libraries that
define most of the tasks that a robot performs (e.g., Kuka lightweight
manipulator). Therefore, we believe our framework will suit for real HRC scenarios.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Zot</surname>
          </string-name>
          <article-title>: a bounded satisfiability checker. github.com/fm-polimi/zot (</article-title>
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>SAFER-HRC</surname>
          </string-name>
          :
          <article-title>Safety Analysis Through Formal vERification in Human-Robot Collaboration (</article-title>
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Bolton</surname>
            ,
            <given-names>M.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bass</surname>
            ,
            <given-names>E.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Siminiceanu</surname>
            ,
            <given-names>R.I.</given-names>
          </string-name>
          :
          <article-title>Generating phenotypical erroneous human behavior to evaluate human-automation interaction using model checking</article-title>
          .
          <source>Int. J. Hum.-Comput. Stud</source>
          .
          <volume>70</volume>
          (
          <issue>11</issue>
          ),
          <fpage>888</fpage>
          -
          <lpage>906</lpage>
          (
          <year>Nov 2012</year>
          ), http://dx.doi.org/10. 1016/j.ijhcs.
          <year>2012</year>
          .
          <volume>05</volume>
          .010
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Bolton</surname>
            ,
            <given-names>M.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Siminiceanu</surname>
            ,
            <given-names>R.I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bass</surname>
            ,
            <given-names>E.J.:</given-names>
          </string-name>
          <article-title>A systematic approach to model checking human-automation interaction using task analytic models</article-title>
          .
          <source>IEEE Trans. Systems, Man, and Cybernetics</source>
          , Part A
          <volume>41</volume>
          (
          <issue>5</issue>
          ),
          <fpage>961</fpage>
          -
          <lpage>976</lpage>
          (
          <year>2011</year>
          ), http://dblp. uni-trier.de/db/journals/tsmc/tsmca41.html#BoltonSB11
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Curzon</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          , Rukše˙nas, R.,
          <string-name>
            <surname>Blandford</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>An approach to formal verification of human-computer interaction</article-title>
          .
          <source>Formal Aspects of Computing</source>
          <volume>19</volume>
          (
          <issue>4</issue>
          ),
          <fpage>513</fpage>
          -
          <lpage>550</lpage>
          (
          <year>2007</year>
          ), http://dx.doi.org/10.1007/s00165-007-0035-6
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Furia</surname>
            ,
            <given-names>C.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mandrioli</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Morzenti</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rossi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Modeling Time in Computing</article-title>
          .
          <source>Monographs in Theoretical Computer Science. An EATCS Series</source>
          , Springer (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Hartson</surname>
            ,
            <given-names>H.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Siochi</surname>
            ,
            <given-names>A.C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hix</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>The uan: A user-oriented representation for direct manipulation interface designs</article-title>
          .
          <source>ACM Trans. Inf. Syst</source>
          .
          <volume>8</volume>
          (
          <issue>3</issue>
          ),
          <fpage>181</fpage>
          -
          <lpage>203</lpage>
          (
          <year>Jul 1990</year>
          ), http://doi.acm.
          <source>org/10</source>
          .1145/98188.98191
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8. International Electrotechnical Commission: IEC 61882,
          <article-title>Hazard and operability studies (HAZOP studies)-Application guide (</article-title>
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9. ISO: ISO 10218-2:2011:
          <article-title>Robots and robotic devices - Safety requirements for industrial robots - Part 2: Robot systems and integration</article-title>
          . International Organization for Standardization, Geneva, Switzerland (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10. ISO: ISO/TR 14121-2:2012:
          <article-title>Safety of machinery - Risk assessment - Part 2: Practical guidance and examples of methods</article-title>
          . International Organization for Standardization, Geneva, Switzerland (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11. ISO: ISO/TS 15066:
          <year>2016</year>
          :
          <article-title>Robots and robotic devices - Collaborative robots</article-title>
          .
          <source>International Organization for Standardization</source>
          , Geneva, Switzerland (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Joshi</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Joshi</surname>
          </string-name>
          , H.:
          <article-title>FMEA and alternatives v/s enhanced risk assessment mechanism</article-title>
          .
          <source>International Journal of Computer Applications</source>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Leveson</surname>
          </string-name>
          , N.:
          <article-title>Engineering a safer world: Systems thinking applied to safety</article-title>
          . MIT Press (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Machin</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dufossé</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Guiochet</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Powell</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Roy</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Waeselynck</surname>
          </string-name>
          , H.:
          <article-title>Modelchecking and game theory for synthesis of safety rules</article-title>
          .
          <source>In: Proc. of HASE</source>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15. Paterno',
          <string-name>
            <surname>F.</surname>
          </string-name>
          :
          <article-title>Formal reasoning about dialogue properties with automatic support</article-title>
          .
          <source>Interacting with Computers</source>
          <volume>9</volume>
          (
          <issue>2</issue>
          ),
          <fpage>173</fpage>
          -
          <lpage>196</lpage>
          (
          <year>1997</year>
          ), http://www.sciencedirect. com/science/article/pii/S0953543897000155
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Webster</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dixon</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fisher</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Salem</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Saunders</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Koay</surname>
            ,
            <given-names>K.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dautenhahn</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Saez-Pons</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          :
          <article-title>Toward reliable autonomous robotic assistants through formal verification: A case study</article-title>
          .
          <source>IEEE Trans. Human-Machine Systems</source>
          pp.
          <fpage>186</fpage>
          -
          <lpage>196</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>