<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Towards an Ontological Framework for Environmental Survey Hazard Analysis of Autonomous Systems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Dr Christopher Harper</string-name>
          <email>chris.harper@brl.ac.uk</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Prof Praminda Caleb-Solly</string-name>
          <email>praminda.caleb-solly@uwe.ac.uk</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Bristol Robotics Laboratory, University of the West of England T-Block</institution>
          ,
          <addr-line>Frenchay Campus, UWE Bristol, Bristol BS16 1QY</addr-line>
          ,
          <country country="UK">United Kingdom</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>This paper presents current progress in the development of Environmental Survey Hazard Analysis (ESHA), a method of preliminary hazard identification aimed at autonomous system application problems. In addition to performing their design mission, autonomous systems must be capable of reliable and predictable behaviour in their environments, particularly when facing potential hazards that are not explicitly included in their design specifications ('non-mission' tasks). ESHA differs from conventional hazard identification methods in that its scope explicitly covers the identification of non-mission interactions between a system and its environment and any associated hazards. Although of general use as a safety analysis technique, ESHA has been designed primarily to support a ”so far as is reasonably practicable” (SFAIRP) style of safety argument. However, early versions of the method were based on informal models, and therefore provided only weak support. This paper reviews the development of a formal ontological framework for ESHA, intended to provide much stronger basis for arguing the completeness and consistency of analyses.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Autonomous systems (AS) are now emerging from the
research laboratory into full industrial and social application,
for example applications which require collaborative
interaction with humans in shared spaces. Yet one of the key
challenges in the development of these systems, and one
of the principal barriers to their full deployment, remains
unsolved; we still lack the tools and methods for adequate
safety assurance and certification. This paper reviews
current progress at Bristol Robotics Laboratory in the
development of a method called Environmental Survey Hazard</p>
      <p>
        Analysis (ESHA)
        <xref ref-type="bibr" rid="ref20">(Harper et al. 2014)</xref>
        , which is a relatively
new technique of preliminary hazard identification aimed at
autonomous system design problems.
1.1
      </p>
    </sec>
    <sec id="sec-2">
      <title>The Problem of Autonomy from a Safety</title>
    </sec>
    <sec id="sec-3">
      <title>Perspective</title>
      <p>Autonomous systems have unique characteristics and
requirements that present a considerable challenge for safety
assurance and certification. By definition, an AS may be
required to operate for extended periods (or even indefinitely)
without any human intervention or supervision. This means
that they must be capable of interacting safely with any
feature of the environment necessary to ensure their ongoing
survival, and performance of their required mission. Hence,
there is a set of ”non-mission” interactions that an AS is
required to perform, which relate to general existence and
survival, as well as all those ”mission tasks” that are required
for the AS to fulfil its intended purpose.</p>
      <p>A simple example of the concept of mission and
nonmission interactions of an autonomous robot waiter is shown
in Figure 1.
The robot will be expected to (and designed to) perform
tasks related to interacting with customers, or setting down
or picking up drinks from furniture such as tables. However,
there are numerous other unexpected features of the
environment that might be found within a location where such a
robot might operate(e.g. a cafe), for example unusual terrain
(such as holes in the floor), humans such as children who are
not otherwise engaged in the business of ordering drinks, or
other creatures such as pets or service animals (e.g. guide
dogs for visually impaired people). The robot will need to be
capable of performing these non-mission interactions safely
and reliably if it is not to present an unacceptable risk while
in service.</p>
      <p>
        Non-mission interactions are often overlooked by typical
design engineering practices. However, this gap is usually
closed either by the supervision of human operators or by
constraining the system’s environment, which reduces the
number of required interactions between a system and its
environment to a point where it becomes tractable to
control them with the resources available to the system. Since
such interactions are an essential feature of AS problems,
we need new or revised safety analysis methods that seek to
identify non-mission interactions, especially in unbounded
environments. Such a goal is challenging - the
unboundedness criterion creates problems of combinatorial expansion
in the number of situated states that must be considered. We
encountered these problems when we first started to look at
hazard identification of AS, which led to the development of
our original version of ESHA, as presented in
        <xref ref-type="bibr" rid="ref20">(Harper et al.
2014)</xref>
        .
1.2
      </p>
    </sec>
    <sec id="sec-4">
      <title>Safety Validation of Autonomous Systems and ML/AI</title>
      <p>
        In safety critical systems, hazard analysis is one of the
principal sources of information for safety validation
requirements, and autonomous systems are no exception in this
regard. Once a hazard has been identified, it follows that one
or more safety measures need to be introduced (typically
design changes, safeguard mechanisms, or operational
procedures) to reduce or eliminate the risk of its occurrence,
and the effectiveness of those safety measures must be
validated. Since ESHA is a process of identifying
environmental interactions, it lends itself naturally to the specification
of test scenarios that can serve to evaluate the
effectiveness of safety measures. For example, it could be used in
conjunction with scenario definition languages such as
MSDL
        <xref ref-type="bibr" rid="ref14">(Foretellix 2020)</xref>
        , OpenSCENARIO
        <xref ref-type="bibr" rid="ref3">(ASAM 2020)</xref>
        or
SCENIC
        <xref ref-type="bibr" rid="ref15">(Fremont et al. 2019)</xref>
        , where ESHA captures the
high-level specification for scenarios that can be translated
into scenario description languages for execution on a
simulator.
      </p>
      <p>
        Scenario-based validation is seen as one of the
principal modes of safety validation for autonomous systems (see
        <xref ref-type="bibr" rid="ref15">(Fremont et al. 2019)</xref>
        for example). As discussed earlier, one
of the distinguishing concepts of autonomy relates to the
requirement to interact reliably with features of the
environment. So, it follows that one must test those interactions in
order to validate the correctness of an autonomous system’s
function. Since ESHA is a process of systematic search for
(potentially hazardous) environmental interactions,
irrespective of their inclusion in the system’s specified mission, it is
a straightforward extension of the method to identify one or
more validation scenarios for each identified hazard, to
evaluate the capability of the AS to avoid them. ESHA is a
complementary technique to a test coverage metric called
Situation Coverage which has been developed recently
        <xref ref-type="bibr" rid="ref1">(Alexander, Hawkins, and Rae 2015)</xref>
        as a validation metric for
scenario-based testing, and in Section 5.2 we discuss
current activities using ESHA to identify test scenarios for a
connected autonomous vehicle (CAV) using situation
coverage to evaluate progress and completion of the process.
      </p>
      <p>The environment-driven requirements analysis produced
by ESHA can also support the development of machine
learning solutions for autonomous system problems. Since
all ML processes or devices are developed inductively by
training from a set of examples, the correctness of the
system behaviour produced from a machine learning process
is highly dependent on the diversity of the samples provided
for its training. If there is any systematic error of omission in
the training set, then the product of the ML process is likely
to exhibit similar omissions in its operational behaviour. By
providing a systematic coverage of potentially hazardous
environmental interactions, ESHA can assist in specifying the
scope of the training data set that is needed for adequate
coverage of potential hazards, and can support the safety
argument that an ML/AI system has been sufficiently well
trained that the risk of any incompleteness affecting safety
has been reduced as far as reasonably practicable.
1.3</p>
    </sec>
    <sec id="sec-5">
      <title>Safety arguments for autonomous systems</title>
      <p>
        The unboundedness of the general problem of autonomy
        <xref ref-type="bibr" rid="ref23">(Pfeifer and Scheier 1999)</xref>
        causes significant problems for
the safety argument(s) of an AS - for example as
recommended by the new UL 4600 standard for autonomous road
vehicles
        <xref ref-type="bibr" rid="ref2">(ANSI/UL 2020)</xref>
        . The demonstration that the
residual risk of harmful events (a function of severity and
probability) of a system is ’acceptable’ becomes questionable.
Significant underlying causes of this problem include:
1. In unbounded environments, the number of features with
which an autonomous agent may interact is uncertain.
This affects the validity of quantitative risk analyses;
calculations of requirements for or verification of a system’s
probability of failure depend on the set of contributing
hazards to be complete. If any are omitted then
quantitative safety targets will be erroneous and the system less
reliable or fail-safe than it needs to be to fulfil its ’true’
requirements (i.e. those specified by legislation).
2. It has been a long standing problem in the risk assessment
of safety critical systems in many industry sectors, that
regulatory requirements demand levels of reliability that
are not feasible to demonstrate by practical testing
        <xref ref-type="bibr" rid="ref8">(Butler and Finelli 1991)</xref>
        . Most practical test programmes can
only deliver high-confidence estimates of probability of
failure that are usually several orders of magnitude lower
than the values required. This applies in particular to rare
events, which are unlikely to occur during testing but may
nevertheless still occur at a higher rate than is considered
acceptable by legislative requirements.
3. Where simulation models are used to accelerate the
testing of a system, and existing simulation data are used for
probability estimation based on extrapolation of (bounds
of) probability from the measured results, any such
analysis rests on the assumption that the simulation is a faithful
reproduction of the system and its environment. But any
simulator will have limits to its fidelity
        <xref ref-type="bibr" rid="ref22">(Koopman and
Wagner 2018)</xref>
        , which are likely to be impossible or too
expensive to correct, and this makes the task of
identifying rare events solely from testing impossible (the event
does not occur during the test programme, and there is no
way to determine whether the lack of occurrence is due to
the genuine rarity of the event or due to being masked by
errors in simulator fidelity).
      </p>
      <p>In all these cases a systematic analysis of environmental
interactions such as ESHA will help to improve confidence in
the quality of the results, but our conclusion is that it will
be difficult to produce strong supporting evidence for an AS
safety case with these techniques.</p>
      <p>
        Therefore, we are investigating an alternative safety
argument strategy
        <xref ref-type="bibr" rid="ref18">(Harper 2020)</xref>
        , where the claim is that the
risk has been reduced ”so far as is reasonably practicable”
(SFAIRP). This argument concept is explicitly written into
UK law
        <xref ref-type="bibr" rid="ref21">(HMSO 1974)</xref>
        and is often an acceptable legal
interpretation in other countries. We use the UK legal basis of
the concept as the working model for our studies, as well as
the work in
        <xref ref-type="bibr" rid="ref11 ref13">(Eliot 2006, 2007)</xref>
        , which provides supporting
interpretive material.
      </p>
      <p>
        In a SFAIRP-based safety case, the general obligation for
a system developer is to demonstrate that any of the
following have been achieved:
• it was not practicable or not reasonably practicable to do
more than was in fact done to satisfy the duty or
requirement;
• there was no better practicable means than was in fact
used to satisfy the duty or requirement;
• the potential cause of harm lies outside the scope of the
[system developer’s] undertaking
        <xref ref-type="bibr" rid="ref13">(Eliot 2007)</xref>
        .
      </p>
      <p>Compliance with these requirements must be demonstrated
by means of objective evidence, namely that no allowance be
made for personal qualities of any legal defendant, i.e. it will
not be a valid legal defence if the system developer appeals
to the actual conduct of the safety assurance process, or the
nature of the people who performed it. Evidence must be
objective, i.e. epistemically independent of the people who
created it.</p>
      <p>The legal concept of ”reasonableness” is based on the
concept of a ”reasonable person”, which in the case of
engineering problems may be interpreted as ”competent
technical specialist”. Hence whatever may be considered
’reasonably practicable’ in a safety assurance context would mean
whatever might be expected of a suitably qualified practicing
safety assurance engineer. If in the design of any system, any
hazard was overlooked or any safety feature of a system
design not considered for its practicability, which could
plausibly have been identified or specified by such an engineer,
then it could not be said that all foreseeable hazards were
identified, nor all practicable safety measures deployed.</p>
      <p>
        A plausible defence against breach of safety regulations
can be made if it can be demonstrated objectively that the
harm was not foreseeable, any safety measures not deployed
were not reasonably practicable, or the harm was outside
the scope of the undertaking. For these reasons, a safety
case/argument will need to demonstrate objectively
        <xref ref-type="bibr" rid="ref13">(Eliot
2007)</xref>
        the following characteristics:
• that exhaustive coverage of potential hazards has been
achieved
• that the analysis of a system’s scope of operation is
systematic and complete
• that the identification of safety measures to resolve any
potential hazard has been exhaustive
• that the costs vs. benefits of each identified safety measure
have been analysed systematically
However, this may not be easy for AS - if the environment
is unconstrained or unbounded, then it may not be possible
to show that any potential cause of harm is outside the scope
of the undertaking, or that it was not practicable to do more
than was in fact done to identify potential hazards.
      </p>
      <p>
        ESHA was developed
        <xref ref-type="bibr" rid="ref20">(Harper et al. 2014)</xref>
        specifically to
support this type of argument by attempting to construct at
least part of the evidence necessary to support such claims,
in terms of providing an objectively demonstrable process
framework that can assist analysts to show that all categories
of environmental feature have been considered, even if it is
not feasible to demonstrate that all instances have been
identified. This is the motivation for our consideration of
ontological frameworks; ontology is the disciplined (and,
ideally, formal) practice of trying to build such classification
schemes.
      </p>
      <p>While the SFAIRP approach takes a different approach by
avoiding conventional quantitative risk-driven arguments, it
is nevertheless the case that reducing risk to as low as can
practicably be achieved may still mean that the residual risk
is too great to be acceptable. This is a residual problem,
but not one that can be resolved by engineering analysis
methods alone; it is a legislative matter that lies within the
purview of legislators and politicians to decide where any
such boundary may lie. Nevertheless, we argue that ESHA
could contribute to such decision making by supporting the
establishment of risk models that have some formal
backing, and some confidence that the significant risks have been
found.</p>
      <p>2</p>
      <sec id="sec-5-1">
        <title>Overview of ESHA</title>
        <p>ESHA was developed to help identify environmental
features with which an AS might interact (irrespective of
whether it is a mission or non-mission interaction) and
whether there is any potential for hazard.
2.1</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>ESHA Procedure and Guide-words</title>
      <p>
        The ESHA procedure
        <xref ref-type="bibr" rid="ref20">(Harper et al. 2014)</xref>
        is similar in many
respects to conventional system hazard analyses: a set of
guide-words is considered, which classify the environmental
features with which an AS may need to interact. The general
nature of any possible hazardous interactions is identified.
The results are compiled in tabular a format similar to
traditional variants of hazard analysis. A set of procedures and
checklists were developed to guide analysts in compilation
of results tables correctly, and the guide-words shown 2 in
were specified.
      </p>
      <p>While this guide-word set is not unreasonable in an
intuitive sense, and was intended to be grounded in a concept
based on how the characteristics of how environmental
features might be perceived by the sensors of an AS, it
nevertheless is an informal model, and lacks any objective proof
of completeness. This compromises the aim that the ESHA
method can demonstrate objectively an exhaustive coverage
of interactions with environmental features. We are therefore
looking to provide such a formal basis, which is the reason
for our investigation of ontological frameworks as a basis for
doing so.
2.2</p>
    </sec>
    <sec id="sec-7">
      <title>Current Experience with ESHA</title>
      <p>
        Our applications of ESHA have so far been restricted to
small or partial application problems in robotics and
autonomous systems. In the original development phase of
ESHA
        <xref ref-type="bibr" rid="ref20">(Harper et al. 2014)</xref>
        , we investigated some problems
in urban search and rescue and domestic assistance (guide
robot for elderly persons). More recently, we have trialled
the method in conference and project workshops, including
the SOCRATES project1 and the European Robotics Forum
2020
        <xref ref-type="bibr" rid="ref9">(Caleb-Solly 2020)</xref>
        .
      </p>
      <p>Anecdotal and verbal responses from workshop
delegates and participants have generally been positive, although
it should be noted that in most cases the participants
in1This event is mentioned in passing at URL: http://www.
socrates-project.eu/blog/2019/12/02/meeting-in-bristol/
volved were not safety assurance practitioners (academic
researchers and students in robotics were the most typical
groups). And even though these versions of ESHA have been
logically informal, the method still serves as a useful
technique for getting human designers to consider in a structured
way how hazards might be identified for autonomous
systems. But it has been noted that complexity and
combinatorial issues may limit the practicability of the method, and
ontology has been seen as one of the best approaches to
overcoming these problems.</p>
      <p>3</p>
      <sec id="sec-7-1">
        <title>Requirements for an ESHA Ontology</title>
        <p>The guide-words presented in the previous section are an
attempt to categorize environmental features in such a way
as to be logically complete and therefore exhaustive of any
environmental domain. The set was developed on the
conceptual basis that in an unbounded environment, the only
boundary available from which one could extract a
logically complete description was the boundary of the
system (robot) itself. The intent of the original ESHA
guidewords was to identify environmental features by the
characteristics of their ’images’ as they impinged upon the
system sensors. Visual perception was the principal modality
considered, hence the classification of objects in particular
as ’point-like’ or ’line-like’; the ’dimensionality’ of images
was considered to be a concept that could demarcate all
possible environmental features in a logically exhaustive way.</p>
        <p>However, the guide-word model was never formally
derived from first principles, and hence there is no rigorous
basis for asserting its completeness. Since we wish to
demonstrate objectively that the ESHA procedure is exhaustive, we
are investigating existing formal ontologies to see if they
provide the necessary logical framework we need to
underpin ESHA. Based on the previous discussions, the following
requirements are seen as necessary for the foundational
ontology:
• Support for essential ontological concepts</p>
        <p>
          Several core ontological topics are required a a minimum
of any ontology that could be used to support ESHA:
– Mereotopology: relationships between parts and
wholes, that allow the identification of structures and
complex objects
– Boundaries: formal treatment of boundaries within the
mereotopology, especially fiat as well as bona fide
boundaries
          <xref ref-type="bibr" rid="ref25">(Smith and Varzi 2000)</xref>
          – Situations and Events: formal classification scheme of
situations and events, which will provide support for
hazard identification
– Agency, Causality, Autonomy: formal classification
scheme for the behaviour of environmental features, to
allow capture of causal relationships and identification
of interactions.
• Particulars and Universals
        </p>
        <p>Since we are interested in establishing abstract concepts
such as safety properties, we seek a foundational ontology
that incorporates Universals as well as Particulars.
• Realism or Conceptualism preferred over Nominalism
Since we require the existence of universals, we reject the
purely Nominalist stance that Universals do not exist. We
require ontological frameworks that reflect at least a
Conceptualist if not a fully Platonic perspective. However, this
does not mean that we cannot incorporate nominalist
ontological models as partial frameworks, applying solely to
Particulars, and then ’complete the model’ by adding
corresponding Universals, which can be done by means of
model-patterns such as the ontological square.
• Logical completeness and disjointness</p>
        <p>We are looking for formal ontologies whose type
hierarchy is defined as far as possible in a logically complete
and disjoint manner. Completeness ensures that the model
is exhaustive in its scope. Disjointness of types ensures
that our analysis remains tractable, since multiple
combinations of parent types will be excluded.</p>
        <p>Our general model of ontological frameworks for ESHA
takes the view that they will follow a three-layer
organization/ structure:
• Foundational ontologies are the most abstract layer,
defining the most basic entities that underpin other layers.
• Domain ontologies define the most general concepts that
are specific to a particular domain but general to
numerous applications (e.g. system safety, geospatial domains,
HMI, etc.);
• Application ontologies define entity types intended for
specific application categories, such as assistive robots or
driverless vehicles
4</p>
      </sec>
      <sec id="sec-7-2">
        <title>Review of Candidate Ontologies</title>
        <p>
          It was not the original aim of this work to develop any
fundamentally new ontologies to support ESHA, rather to
exploit existing work
          <xref ref-type="bibr" rid="ref18">(Harper 2020)</xref>
          . However, in respect of the
basic foundational ontology layer, no existing frameworks
have been found to possess all the properties desired. So we
must adapt existing foundational ontology to introduce the
modifications or new elements as needed.
        </p>
        <p>
          While numerous proposed ontological frameworks have
been reviewed, the following are the major candidates that
were considered for adoption as the ESHA foundational
ontology.
• Sowa’s Knowledge Representation Ontology
          <xref ref-type="bibr" rid="ref26">(Sowa
2000)</xref>
          • Basic Formal Ontology
          <xref ref-type="bibr" rid="ref24">(Smith 2015)</xref>
          • Zemach’s ”Four Ontologies”
          <xref ref-type="bibr" rid="ref29">(Zemach 1970)</xref>
          • Unified Foundational Ontology (UFO)
          <xref ref-type="bibr" rid="ref17">(Guizzardi 2005)</xref>
          Sowa’s ontology
          <xref ref-type="bibr" rid="ref26">(Sowa 2000)</xref>
          was the first we reviewed. It
blends together several ontological concepts developed by
Peirce and Whitehead, and has some interesting features, but
two significant flaws. First, as noted by
          <xref ref-type="bibr" rid="ref10">(Degen et al. 2001)</xref>
          ,
it does not draw clear distinctions between sets, universals
and individuals, nor does it clarify the ontological meaning
of modal operators used in their definitions. Second, we have
noticed that the type hierarchy contains inheritance errors in
some sub-types, which are derived both from physical and
abstract entities simultaneously and therefore inherit
conflicting definitions of spatial and temporal existence. Once
the type hierarchy is corrected for this inconsistency, it
begins to look similar to other ontologies (such as BFO,
discussed below) that are far more explicitly formal and hence
are preferred for that reason.
        </p>
        <p>
          Basic formal ontology
          <xref ref-type="bibr" rid="ref24">(Smith 2015)</xref>
          has the advantage of
being a consistent formal specification, but is insufficient for
ESHA purposes since (as a matter of pragmatic policy) it
only include types and sub-types of Particulars.
Additionally, the theory of mereology that underpins the BFO model
is less extensive than other frameworks (UFO).
        </p>
        <p>
          Zemach’s ”Four Ontologies” model
          <xref ref-type="bibr" rid="ref29">(Zemach 1970)</xref>
          ,
although having a nominalist perspective, does offer a disjoint
and complete decomposition of Particulars into four types of
continuant and occurrent entity. The model is complete and
disjoint, and we believe can be adapted to resolve issues in
other models to improve the properties of the model
eventually used to support ESHA (as discussed later).
        </p>
        <p>
          While no previously developed formal ontological model
had all the attributes we were seeking, our preferred
ontological framework is the Unified Foundational Ontology
(UFO), as it has the greatest number of useful features that
we have seen, and we believe that the few deficiencies of
logical completeness that exist in some parts of its model
(especially in the decomposition into continuants and
occurrents) can be modified to correct the problems. While
the original version of UFO (UFO-A) was developed only
as an ontology of endurant (continuant) entities
          <xref ref-type="bibr" rid="ref17">(Guizzardi
2005)</xref>
          , it has been extended with additional subsets
UFOB (covering perdurant/occurrent entities) and UFO-C
(providing models of causality, interaction and agency). UFO-A
and UFO-B have recently been integrated into a combined
ontology of endurants and perdurants UFO-AB
          <xref ref-type="bibr" rid="ref4">(Benevides,
Almeida, and Guizzardi 2019)</xref>
          . These extensions develop
ontologies for processes, events and their relationships, for
example temporal sequences of events, or how processes
might be composed from (or otherwise related to) set(s) of
individual events that may be ascribed to them.
        </p>
        <p>5</p>
      </sec>
      <sec id="sec-7-3">
        <title>Conclusion and Current Progress</title>
        <p>We have selected UFO as the basis for a design of a
foundational ontology for ESHA, although it will require some
modification and extension to ensure that it has the relevant
properties of completeness necessary to fulfil the
requirements of a method that can support a SFAIRP safety
argument.
5.1</p>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>Modifying UFO to Support ESHA</title>
    </sec>
    <sec id="sec-9">
      <title>Requirements</title>
      <p>
        Where the UFO ontological model in its most recent
incarnation UFO-AB
        <xref ref-type="bibr" rid="ref4">(Benevides, Almeida, and Guizzardi 2019)</xref>
        has all the properties we require for ESHA, we propose to
use it unchanged. Where it does not, we propose to
incorporate ideas from other models where they appear to be
compatible, a partial example of which is shown in the model
fragment in Figure 3.
      </p>
      <p>Figure 3 shows a partial representation of one particular
modification that we have already identified, using Zemach’s
model mentioned above. In the original type model
developed for UFO, the major sub-types of Individual consisted
only of ’Endurant’ (also known as ’Continuant’) and
’Perdurant’ (also known as ’Occurrent’), and this was not a
logically complete and disjoint type decomposition. By adding
two new sub-types ’Pure Continuant’ and ’Pure Occurrent’
(known as ’Event’ in Zemach’s model) one can develop this
into a complete and disjoint decomposition, albeit with some
underlying logic regarding spatial and temporal bounds, as
mentioned in the list below.</p>
      <p>
        By this and other modifications, we aim to create a new
ESHA Foundational Ontology as an evolutionary
development of UFO. There are several ’grafts’ to be done to UFO
to incorporate all the elements that we anticipate might be
necessary or useful to support an environmental survey
hazard analysis, including:
• The incorporation of Zemach’s model as the major
subtypes of Individuals, and the extension of this model
(which was originally conceived as a nominalist model
applicable only to Individuals, also known as
’Particulars’) into the corresponding Universal types according
to the ontological square, which UFO applies as a
metamodel governing the form of its ontology.
• The incorporation of the concept(s) of topoids, chronoids,
and situoids from GOL
        <xref ref-type="bibr" rid="ref10">(Degen et al. 2001)</xref>
        as the
underlying formal framework for the elements from Zemach’s
model.
• The incorporation of Fiat Boundaries
        <xref ref-type="bibr" rid="ref25">(Smith and Varzi
2000)</xref>
        into the mereotopology framework of UFO; fiat
boundaries are boundaries that are established by an
observer or social convention rather than existing in a
strictly physical sense. This concept may be useful
because changes in agent behaviour can be driven by such
boundaries (for example a doorway between two rooms,
or the centre line of a road), and interactions between
agents and the environment may be influenced or even
governed by such boundaries.
• The incorporation of the work of
        <xref ref-type="bibr" rid="ref27">(Vogt et al. 2011)</xref>
        , who
have developed a complete taxonomy of constitutively
organized material entities as an extension of BFO. This
work could be a bridge between the foundational ontology
and domain ontology layers, as it could form an abstract
catalogue of patterns for combining foundational material
entities in any given domain, which can in principle be
logically complete.
• It may be worthwhile to incorporate some of the work
of Bittner on granular partitions, collections, and
temporal mereological relations
        <xref ref-type="bibr" rid="ref11 ref6">(Bittner, Donnelly, and Smith
2006)</xref>
        . Bittner’s work on partitions may also serve as a
meta-model for the development of the ontology itself, as
it can serve to establish the consistency and completeness
of the type hierarchy.
      </p>
      <p>The extent to which it is logically permissible to
incorporate all these elements in a consistent manner remains to be
seen, and will be a challenge for this research programme.
Where it proves impossible to complete the UFO ontology,
’gaps’ will remain in the underlying framework, which then
affect the capability of environmental survey analyses to
conclude that a systematic and complete survey has been
achieved. We anticipate (purely as an informal judgement)
that it will be possible to develop a complete Foundational
Ontology for ESHA, but that incompleteness may begin to
’creep in’ to the model from the Domain Ontology level
onward (as discussed in Section 3), where the relatively
abstract types of the foundational layer begin to be applied to
real-world domains.</p>
      <p>
        For example, the formal ontological ’catalogue’ of
constitutive material entities developed by
        <xref ref-type="bibr" rid="ref27">(Vogt et al. 2011)</xref>
        would
seem to be an extremely powerful development of profound
significance to this research, but early indications are that
for any given domain the catalogue may be extremely large
due to the permutations of potential combinations of
entities, and may well be open-ended. (Consider the set of all
possible roads that can be composed from road environment
entites such as junctions, straight sections, road bends, etc.)
Hence the domain-level catalogue may become
impracticable to complete, even though a complete set of individual
entities might be identified.
      </p>
      <p>But the advantage of attempting to ground the analysis in
an ontological model means that at least it will be known
where the incompleteness exists, and this can be taken into
account when identifying hazards and specifying safety
requirements for a system. (Effectively, this is a strategy of
attempting to transform any ”unknown unknowns” of a
hazard analysis into ”known unknowns”, which can then at least
be managed if not resolved.)
5.2</p>
    </sec>
    <sec id="sec-10">
      <title>Current Experiments and Further Work</title>
      <p>We are currently applying the improved ESHA methodology
to application problems in the fields of assistive robotics for
healthcare and social care, and also to driver-less road
vehicles (CAVs).</p>
      <p>
        In the CAV domain, we are using the ESHA technique to
analyse the operating design domain (ODD) of a connected
autonomous vehicle (CAV) in order to develop a
specification of test scenarios based on a systematic review of the
vehicle route. We will generate CAV simulator test scenarios
and validate coverage of the domain by use of a validation
metric called situation coverage, which is a new validation
metric concept developed recently by
        <xref ref-type="bibr" rid="ref1">(Alexander, Hawkins,
and Rae 2015)</xref>
        .
      </p>
      <p>Our experiments in assistive robotics applications are
aimed at gaining broader experience in application of the
method, especially since many applications in this field
are concerned with human-robot interaction with vulnerable
users with complex care needs that vary over time. This
increases the complexity of the required interactive behaviour
both for mission and non-mission tasks, and we are
investigating the impact of this on the practicability of the method.</p>
      <p>We will then proceed to develop domain-level and
application-level ontologies that support two particular
domains (assistive medical/social care robots, and driverless
road vehicles), which are active research topics at Bristol
Robotics Lab. As each stage of the ontological framework
is completed it will be published as a journal paper, and we
plan in the long term to amalgamate all the work into an
ESHA Handbook, to be made publicly available as a
textbook.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <surname>Alexander</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ; Hawkins, R.; and
          <string-name>
            <surname>Rae</surname>
            ,
            <given-names>A. J.</given-names>
          </string-name>
          <year>2015</year>
          .
          <article-title>Situation coverage - a coverage criterion for testing autonomous robots</article-title>
          .
          <source>Technical Report Technical Report YCS-2015-496</source>
          , Department of Computer Science, University of York.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <source>ANSI/UL</source>
          .
          <year>2020</year>
          .
          <article-title>Standard for Safety for the Evaluation of Autonomous Products., ansi/ul standard 4600, 1st edition</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <surname>ASAM.</surname>
          </string-name>
          <year>2020</year>
          .
          <source>OpenSCENARIO Manual, v1.0.0 edition.</source>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          2019.
          <article-title>Towards a Unified Theory of Endurants and Perdurants: UFO-AB</article-title>
          .
          <source>In Proceedings FOUST III: Workshop on Foundational Ontology, The Joint Ontology Workshops (JOWO</source>
          <year>2019</year>
          ),
          <source>volume CEUR Workshop</source>
          Proceedings Vol.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          2518.
          <string-name>
            <surname>Graz</surname>
          </string-name>
          , Austria. URL http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2518</volume>
          /.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <surname>Bittner</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Donnelly</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ; and
          <string-name>
            <surname>Smith</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <year>2006</year>
          .
          <article-title>A SpatioTemporal Ontology for Geographic Information Integration</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <source>International Journal of Geographical Information Science</source>
          <volume>23</volume>
          (
          <issue>6</issue>
          ):
          <fpage>1</fpage>
          -
          <lpage>29</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <surname>Butler</surname>
            , R. W.; and Finelli,
            <given-names>G. B.</given-names>
          </string-name>
          <year>1991</year>
          .
          <article-title>The Infeasibility of Experimental Quantification of Life-Critical Software Reliability</article-title>
          .
          <source>In ACM Software Engineering Notes (Proc. SIGSOFT '91 Conf. on Software for Critical Systems)</source>
          , volume
          <volume>16</volume>
          (
          <issue>5</issue>
          ),
          <fpage>66</fpage>
          -
          <lpage>76</lpage>
          . New Orleans.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <surname>Caleb-Solly</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <year>2020</year>
          . ERF 2020 - Workshop Report:
          <article-title>Assuring Safety for Assistive Robotics in Health and Social Care</article-title>
          . URL https://www.eu-robotics.net/robotics forum/ upload/erf2020/presentations/Workshops 04.
          <fpage>03</fpage>
          .
          <year>2020</year>
          .rar.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <surname>Degen</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Heller</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Herre</surname>
          </string-name>
          , H.; and
          <string-name>
            <surname>Smith</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <year>2001</year>
          .
          <article-title>GOL: Towards an Axiomatized Upper-Level Ontology</article-title>
          .
          <source>In Proceedings FOIS'01</source>
          ,
          <string-name>
            <surname>volume</surname>
            <given-names>ACM</given-names>
          </string-name>
          1-58113-377-4/01/0010.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <surname>Eliot</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <year>2006</year>
          .
          <article-title>System safety and the law</article-title>
          .
          <source>In Proceedings 1st IET International Conference on System Safety</source>
          ,
          <fpage>344</fpage>
          -
          <lpage>351</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <source>London, UK. ISBN 0-86341-646-2.</source>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <surname>Eliot</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <year>2007</year>
          .
          <article-title>What is a reasonable argument in law?</article-title>
          <source>In Proceedings of 8th GSN User Club Meeting</source>
          ,
          <fpage>344</fpage>
          -
          <lpage>351</lpage>
          . York, UK.
          <source>ISBN 0-86341-646-2.</source>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <string-name>
            <given-names>Foretellix. 2020. Open</given-names>
            <surname>Measureable Scenario Description Language Manual</surname>
          </string-name>
          ,
          <year>v20</year>
          .
          <article-title>10 edition</article-title>
          . URL https://www.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <surname>Fremont</surname>
            ,
            <given-names>D. J.</given-names>
          </string-name>
          ; Dreossi,
          <string-name>
            <given-names>T.</given-names>
            ;
            <surname>Ghosh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ;
            <surname>Yue</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            ;
            <surname>SangiovanniVincentelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. L.</given-names>
            ; and
            <surname>Seshia</surname>
          </string-name>
          ,
          <string-name>
            <surname>S. A.</surname>
          </string-name>
          <year>2019</year>
          .
          <article-title>Scenic: A Language for Scenario Specification</article-title>
          and
          <string-name>
            <given-names>Scene</given-names>
            <surname>Generation</surname>
          </string-name>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <source>In Proceedings of the 40th ACM SIGPLAN Conference on PLDI '19</source>
          . Phoenix, AZ, USA. doi:https://doi.org/10.1145/ 3314221.3314633.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <string-name>
            <surname>Guizzardi</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          <year>2005</year>
          .
          <article-title>Ontological Foundations For Structural Conceptual Models</article-title>
          .
          <source>Ph.D. thesis, Centre for Telematics and Information Technology</source>
          , University of Twente, The Netherlands.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <string-name>
            <surname>Harper</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <year>2020</year>
          .
          <article-title>Environmental Survey Hazard Analysis: Current Developments. UK Safety Critical Systems Club seminar, New Safety Analysis Techniques</article-title>
          . URL https://scsc.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <source>uk/e654.</source>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <string-name>
            <surname>Harper</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Dogramadzi</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ; Giannaccini,
          <string-name>
            <given-names>M. E.</given-names>
            ;
            <surname>Sobhani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ;
            <surname>Woodman</surname>
          </string-name>
          , R.; and
          <string-name>
            <surname>Choung</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <year>2014</year>
          .
          <article-title>Environmental hazard analysis - a variant of preliminary hazard analysis for autonomous mobile robots</article-title>
          .
          <source>Journal of Intelligent and Robotic Systems</source>
          <volume>76</volume>
          (
          <issue>1</issue>
          ):
          <fpage>73</fpage>
          -
          <lpage>117</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          <string-name>
            <surname>HMSO.</surname>
          </string-name>
          <year>1974</year>
          .
          <article-title>The Health and Safety at Work etc Act</article-title>
          . URL https://www.legislation.gov.uk/ukpga/1974/37/contents/.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          <string-name>
            <surname>Koopman</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ; and Wagner,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <year>2018</year>
          .
          <article-title>Toward a Framework for Highly Automated Vehicle Safety Validation</article-title>
          .
          <source>In Proceedings of SAE World Congress</source>
          <year>2018</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>13</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          <string-name>
            <surname>Pfeifer</surname>
          </string-name>
          , R.; and
          <string-name>
            <surname>Scheier</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <year>1999</year>
          .
          <article-title>Understanding Intelligence</article-title>
          . MIT Press.
          <source>ISBN 0-262-16181-8.</source>
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          <string-name>
            <surname>Smith</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <year>2015</year>
          .
          <article-title>Basic Formal Ontology 2.0: Specification and User's Guide. URL https://basic-formal-ontology</article-title>
          .org/.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          <string-name>
            <surname>Smith</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ; and
          <string-name>
            <surname>Varzi</surname>
            ,
            <given-names>A. C.</given-names>
          </string-name>
          <year>2000</year>
          .
          <article-title>Fiat and Bona fide boundaries</article-title>
          .
          <source>Philosophy and Phenomenological Research LX(2)</source>
          :
          <fpage>401</fpage>
          -
          <lpage>420</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          <string-name>
            <surname>Sowa</surname>
            ,
            <given-names>J. F.</given-names>
          </string-name>
          <year>2000</year>
          .
          <article-title>Knowledge Representation: Logical, Philosophical, and Computational Foundations</article-title>
          . Pacific Grove,
          <source>CA: Brooks Cole. ISBN 0-534-94965-7.</source>
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          <string-name>
            <surname>Vogt</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Grobe</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Quast</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ; and Bartolomaeus,
          <string-name>
            <surname>T.</surname>
          </string-name>
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          <source>PLoS ONE 6</source>
          (
          <issue>4</issue>
          ):
          <fpage>1</fpage>
          -
          <lpage>14</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          <string-name>
            <surname>Zemach</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <year>1970</year>
          .
          <article-title>Four Ontologies</article-title>
          .
          <source>Journal of Philosophy</source>
          <volume>67</volume>
          (
          <issue>8</issue>
          ):
          <fpage>231</fpage>
          -
          <lpage>247</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>