SlideShare a Scribd company logo
Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions
Veriļ¬cation and Validation of Robotic Assistants
Clare Dixon
Department of Computer Science
University of Liverpool
1 University of Liverpool (UoL)
2 University of Hertfordshire (UoH)
3 Bristol Robotics Lab (BRL)
www.robosafe.org
Farshid Amirabdollahian2
Kerstin Dautenhahn2 Anthony Pipe3
Kerstin Eder3 Maha Salem2
Michael Fisher1 Joe Saunders2
Dejanira Araiza Illan3 Matt Webster1
Kheng Lee Koay2 David Western3
Clare Dixon Veriļ¬cation and Validation Robotic Assistants 1 / 23
Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions
Robotic Assistants
Robotic assistants are being developed to
help, or work closely with humans in
industrial, domestic and health care
environments (e.g. RI-MAN, Pearl,
Wakamaru, . . . )
The robots will need to be able to act
autonomously and make decisions to
choose between a range of activities.
In addition they will need to operate close
to, or in collaboration with humans.
How do we make sure they are trustworthy,
safe, reliable and do what they are
supposed to?
Wakamaru image by Nesnad (Own work) [CC BY-SA 3.0 (http://creativecommons.org/licenses/by-sa/3.0) or GFDL
(http://www.gnu.org/copyleft/fdl.html)], via Wikimedia Commons
Clare Dixon Veriļ¬cation and Validation Robotic Assistants 2 / 23
Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions
What is Trustworthiness and Safety?
Safety involves showing that the robot does nothing that
(unnecessarily) endangers the person.
There are ISO safety requirements and guidelines for
industrial robots (ISO 10218, 2011), personal care robots
(ISO 13482, 2014), and for collaborative robots (ISO
15066, 2016).
Trustworthiness involves social issues beyond pure safety.
It is not just a question of whether the robots are safe but
whether they are perceived to be safe, useful and reliable.
There are also legal (and ethical) issues such as what
happens when
the robot spills a hot drink on someone;
the robot doesnā€™t remind the person to take their medicine;
the robot doesnā€™t go to the kitchen when told?
Clare Dixon Veriļ¬cation and Validation Robotic Assistants 3 / 23
Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions
Robots in the Workplace and at Home
Currently many robots used in industry or domestic use operate
in limited physical space or have limited functionality. This helps
assure their safety.
Robotsā€™ industrial environments are limited so they can
only move in a ļ¬xed area and have limited interactions with
humans e.g. welding or paint spraying robots.
Small or limited capability domestic robots, e.g., vacuum
cleaning robots, robot lawn mowers, pool cleaning robots
etc
Clare Dixon Veriļ¬cation and Validation Robotic Assistants 4 / 23
Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions
Trustworthy Robotic Assistants Project
The EPSRC funded Trustworthy Robotic Assistants Project
develops three different approaches to veriļ¬cation and
validation of robotic assistants.
Each approach is aimed at increasing trust in robotic assistants.
Formal Veriļ¬cation (Liverpool)
Simulation-based Testing (Bristol Robotics Laboratory)
End-user Validation (Hertfordshire)
Clare Dixon Veriļ¬cation and Validation Robotic Assistants 5 / 23
Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions
Robotic Assistants
We consider two use cases, domestic
and manufacturing.
A personal robot assistant (the Care-
O-bot R
,) located in a domestic house
in the University of Hertfordshire.
A co-operative manufacturing task
with BERT a robot at Bristol Robotics
Lab.
8 Journal Title XX(X)
ā€¢ System model inaccuracies. All the veriļ¬cation
techniques use models of the real-world. The models
might have been constructed erroneously, or may be
inconsistent with the real world, or relative to one
another.
ā€¢ Requirement model inaccuracies. In our approach,
the real-world requirements of the system are con-
verted into textual requirements, assertions and prop-
erties for veriļ¬cation. These requirements models
may not have been correctly formulated.
ā€¢ Tool inaccuracies. It is possible that numerical
approximations affect the veriļ¬cation results. In
addition, third party tools can contain bugs that are
unknown to us.
We could now proceed to perform ā€œExperiments.ā€ As
before, we may ļ¬nd a problem with the textual require-
ments or the physical system during experimentation. At
Figure 2. BERT 2 engaged in the handover task.
robot. BERT 2 then picks up a nearby object, and holdsClare Dixon Veriļ¬cation and Validation Robotic Assistants 6 / 23
Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions
Formal Veriļ¬cation
A mathematical analysis of all behaviours using logics, and
tools such as theorem provers or model checkers.
We focus on temporal veriļ¬cation using automatic tools
and techniques that do not require user interaction.
Model checking is a fully automatic, algorithmic technique
for verifying the temporal properties of systems.
Input to the model checker is a model of the system and a
property to be checked on that model.
Output is that the property is satisļ¬ed or a counter
example is given.
Model Checker
Property holds
or
counter example
Property eg
"always p"
Clare Dixon Veriļ¬cation and Validation Robotic Assistants 7 / 23
Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions
Robot Architectures and Veriļ¬cation
We assume an architecture where there is a separation
between the high level decision making layer and the low level
control layer.
etc
Control System
Sense and act
High level choices
Rational Agent
Low level control
Decision making
Avoidance
Reactive
Goal selection
Plan selection
Prediction
etc
We aim to represent and verify the decision making layer and
we donā€™t deal with low level control such as movement etc.
Clare Dixon Veriļ¬cation and Validation Robotic Assistants 8 / 23
Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions
Simulation Based Testing
This is an exhaustive testing methodology widely used in
the design of micro-electronic and avionics systems.
These appeal to Monte-Carlo techniques and dynamic test
reļ¬nement in order to cover a wide range or practical
situations.
Tools are used to automate the testing and analyse the
coverage of the tests.
over Scenario
Clare Dixon Veriļ¬cation and Validation Robotic Assistants 9 / 23
Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions
End User Validation
This approach involves experiments and user evaluations
in practical robotic scenarios.
Scenarios relating to robot human interaction are
developed to test some hypothesis and experiments with
users carried out.
This helps establish whether the human participants
indeed view the robotic assistants as safe and trustworthy.
Clare Dixon Veriļ¬cation and Validation Robotic Assistants 10 / 23
Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions
Overall Approach
Clare Dixon Veriļ¬cation and Validation Robotic Assistants 11 / 23
Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions
A Domestic Robot Assistant
Here we apply model checking to the
high level behaviours controlling the
(commercially available) Care-O-bot R
,
manufactured by Fraunhofer IPA.
It is based on the concept of a ā€œrobot
butlerā€ which has been developed as a
mobile robotic assistant to support
people in domestic environments.
It has a manipulator arm, an articulated
torso, stereo sensors serving as ā€œeyesā€,
LED lights, a graphical user interface,
and a moveable tray.
The robotā€™s sensors monitor its current location, the state
of the arm, torso, eyes and tray.
Its software is based on the Robot Operating System.
Clare Dixon Veriļ¬cation and Validation Robotic Assistants 12 / 23
Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions
Care-O-bot and Robot House
This is deployed in a domestic-type house (the robot
house) at the University of Hertfordshire.
The robot house is equipped with sensors which provide
information on the state of the house and its occupants,
such as whether the fridge door is open and whether
someone is seated on the sofa.
Low-level robot actions such as movement, speech, light
display, etc., are controlled by groups of high-level rules
that together deļ¬ne particular behaviours. 3
Fig. 2. A plan view of the ground ļ¬‚oor of the University of Hertfordshire Robot House. Numbered boxes show the locations of sensors.
models, and their formal veriļ¬cation, are described in
Section IV.
ā€¢ Figs. 2 and 3 have been added to provide additional
information on the Robot House and the user activity
within it.
move_tray_and_wait(lowered_position)
set_light(white)
wait()
set(tray_is_raised,false)
set(tray_is_lowered,true)Clare Dixon Veriļ¬cation and Validation Robotic Assistants 13 / 23
Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions
Care-O-bot Decision Making: Behaviours
The Care-O-botā€™s high-level decision making is determined
by a set of behaviours of the form precondition ā†’ action
(each a sequence of rules).
Examples of high-level rules can take the form ā€œlower trayā€,
ā€œmove to sofa area of the living roomā€, ā€œsay ā€˜The fridge
door is openā€™ ā€, set a ļ¬‚ag, check a sensor etc.
Only one behaviour executes at once.
Each behaviour has a priority (integer between 0 and 90).
Higher priority behaviours are executed in preference to
lower priority behaviours.
Each behaviour is ļ¬‚agged as interruptible or not.
Once it has started executing, a behaviour will execute to
completion, if it is not interruptible.
Users can add new behaviours.
Clare Dixon Veriļ¬cation and Validation Robotic Assistants 14 / 23
Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions
The S1-alertFridgeDoor Behaviour
Behaviours (a set of high level rules) take the form:
Precondition-Rules -> Action-Rules
27 Fridge Freezer Is *ON* AND has been ON for more than 30 secs
31 ::514:: GOAL-fridgeUserAlerted is false
32 Turn light on ::0::Care-o-Bot 3.2 to yellow
34 move ::0::Care-o-Bot 3.2 to ::2:: Living Room and wait for
completion
35 Turn light on ::0::Care-o-Bot 3.2 to white and wait for
completion
36 ::0::Care-o-Bot 3.2 says ā€˜The fridge door is open!ā€™ and
wait for completion
37 SET ::506::GOAL-gotoCharger TO false
38 SET ::507::GOAL-gotoTable TO false
39 SET ::508::GOAL-gotoSofa TO false
40 ::0::Care-o-Bot 3.2 GUI, S1-Set-GoToKitchen, S1-Set-WaitHere
41 SET ::514::GOAL-fridgeUserAlerted TO true
Its priority is 60 and it is not interruptible.
Clare Dixon Veriļ¬cation and Validation Robotic Assistants 15 / 23
Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions
Models and Properties
We need to abstract away from some of the timing details
included in the database to obtain a model that is discrete,
ļ¬nite and not too large.
We developed a (by hand) model in the input language for
the model checker NuSMV and later developed a tool
(CRutoN) to automatically translate from behaviours to
NuSMV input.
We also need a set of properties of the system to check
over the model.
Ideally these would come from a speciļ¬cation or standards
documents about what is expected of the robot with
respect to functionality, safety etc.
Here we focus on issues relating to the scheduling of
behaviours, priorities and interruptions (which at least
provide a sanity check).
Clare Dixon Veriļ¬cation and Validation Robotic Assistants 16 / 23
Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions
Sample Properties and Model Checking Results
1 ((fridge_freezer_on āˆ§ Ā¬goal_fridge_user_alerted) ā‡’
ā™¦(location = livingroom āˆ§ ā™¦say = fridge_door_open))
2 ((fridge_freezer_on āˆ§ Ā¬goal_fridge_user_alerted āˆ§
schedule = schedule_alert_fridge_door) ā‡’
ā™¦(location = livingroom āˆ§ ā™¦say = fridge_door_open))
Property Output Time (sec)
1 FALSE 11.1
2 TRUE 12.3
The model had 130,593 reachable states.
We did ļ¬nd a small bug in the behaviours (a ļ¬‚ag was
wrongly set) but this was by inspection of the behaviours.
It would be better to try properties relating to the
requirements of the robot.
Clare Dixon Veriļ¬cation and Validation Robotic Assistants 17 / 23
Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions
Discussion
CRutoN allowed us to translate from different databases of
behaviours into input for a model checker, setting
parameters to control particular aspects of the translation.
CRutoN uses an intermediate representation so that input
to different model checkers can potentially be generated.
Understanding the semantics of the robot execution cycle
took a lot of close work and interaction with UoH.
The state explosion problem means we have to ļ¬nd a
balance between the level of detail/abstraction and
veriļ¬cation times (timing details were not well represented).
We could deal better with uncertainty or timing constraints
by applying a different model checker.
The model of a person in the robot house was not
represented but this could be incorporated showing their
location for example.
Clare Dixon Veriļ¬cation and Validation Robotic Assistants 18 / 23
Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions
Experiments with Trust and Reliability
In the robot house UoH experimented using two scenarios
where the robot appeared faulty or not.
In both scenarios the person was asked to carry out a task with
the robot.
Results suggested that although errors in a robotā€™s behavior are
likely to affect participantā€™s perception of its reliability and
trustworthiness, this doesnā€™t seem to inļ¬‚uence their decisions
to comply with instructions (or not).
Their willingness to comply with the
robotā€™s instructions seem to depend
on the nature if the task, in particular,
whether its effects are irrevocable.
Clare Dixon Veriļ¬cation and Validation Robotic Assistants 19 / 23
Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions
The Manufacturing Scenario: Veriļ¬cation
The focus was on a table leg handover task. The gaze, hand
location and hand pressure of the human should be correct
before the handover takes place.
Journal Title XX(X)
All the veriļ¬cation
-world. The models
oneously, or may be
, or relative to one
s. In our approach,
he system are con-
assertions and prop-
quirements models
mulated.
ble that numerical
ļ¬cation results. In
ontain bugs that are
ā€œExperiments.ā€ As
the textual require-
experimentation. At
formal veriļ¬cation
e compared against
cover that one of the
ed testing or formal
ents. In this case we
assets, as explained
e between the dif-
cover the cause of
isons are indicated
Formal Veriļ¬cationā€
ulation-based Test-
Figure 2. BERT 2 engaged in the handover task.
robot. BERT 2 then picks up a nearby object, and holds
it out to the human. The robot announces that it is ready
to handover. The human responds verbally to indicate that
they are ready to receive. (For practical reasons, human-to-
robot verbal signals were relayed to the robot by a human
operator pressing a key.) Then, the human is expected to
pull gently on the object while looking at it. BERT 2 then
calculates three binary sensor conditions:
ā€¢ Gaze: The humanā€™s head position and orientation
relative to the object are tracked using the Vicon R
motion-tracking system for an approximate measure
of whether he/she is looking at the object.
11
RobotController_3S
Modelling was carried out using Probabilistic Timed Automata
and veriļ¬cation via the PRISM probabilistic model checker.
Clare Dixon Veriļ¬cation and Validation Robotic Assistants 20 / 23
Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions
Manufacturing Scenario: Simulation and Experiments
Simulation based testing and real robot experiments (BRL)
12
code to be used in simulation and in the actual robot,
providing consistency between simulations, experiments,
and deployed use. A screenshot of the ROS/Gazebo
simulation can be seen in Figure 5.
For the simulator, additional ROS nodes were con-
structed in Python, to simulate BERT 2ā€™s sensor sys-
tems and embedded actuation controllers. The pre-existing
URDF ļ¬le describing BERT 2 was extended as described
previously for use in Gazebo. The simulated human
behaviour was controlled by a ROS node written in Python,
driving a simpliļ¬ed physical model of the head and hand.
Figure 5. Screenshot of the simulated handover task. The
human head and hand are represented in orange. The object
to be handed over is shown in blue.
A testbench was incorporated into the simulator. The
testbench comprised a test generator, a driver, a checker
and a coverage collector. Achieving the exploration of
meaningful and interesting sequences of behaviours from
the robot and its environment in an HRI task is a
challenging task. For this reason, we stimulate the robotā€™s
code in the simulation indirectly through stimulating its
environment (e.g., the personā€™s behaviour) instead, and we
use a combination of model-based and pseudorandom test
generation. Also, to alleviate the complexity of generating
and timing different types of system inputs, the test
generator is based on a two-tiered approach (Araiza-Illan
et al. 2016) where an abstract test is generated ļ¬rst and
then concretized by instantiating low-level parameters. The
high-level actions of the human in the simulator include
sending signals to the robot, or setting abstract parameters
for gaze, location and pressure. Low-level parameters
include the robotā€™s initial pose and the poses and force
vectors applied by the human during the interaction. For
example, we computed an abstract test of high-level actions
for the human, by exploring the model in UPPAALā‡¤ā‡¤
, so
that the
robot an
pressure
gaze, pr
released
the hum
The
simulato
monitor
describe
Finally,
triggerin
The s
5.2.1
assertio
in Pyth
If the
machine
to deter
postcon
For e
both ini
if (sens
wait
asse
Note th
be diff
same t
misinter
The
collecte
veriļ¬ed
The nu
triggere
coverag
5.3 E
5.3.1
imental
custom
in Figur
of a sy
unbiase
environ
to repro
safety c
quently,
be inac
such as
ā‡¤ā‡¤http:
ā€ ā€ https
Prepared using sagej.cls
We carried out a small user valida-
tion study with 10 participants each
carrying out 10 handover tasks.
Clare Dixon Veriļ¬cation and Validation Robotic Assistants 21 / 23
Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions
The Manufacturing Scenario: Discussion
A number of properties checked inspired by the ISO
requirements, e.g. ā€œAt least 95% (60%) of handover
attempts should be completed successfullyā€.
Disagreement between outcomes from some of the
techniques meant further investigation and reļ¬nement of
the models was needed:
simulation based testing revealed that the robot sometimes
dropped the table leg accidentally (gripper failure) which
was not modelled in the formal veriļ¬cation;
real experiments revealed false negatives for the pressure
sensor and location sensor (they were wrongly reported as
too low/incorrect hand position) not represented elsewhere.
Some of the techniques were not suitable for verifying
some of the requirements, for example for aspects such as
speed or closeness formal veriļ¬cation may not be the best
technique to use.
Clare Dixon Veriļ¬cation and Validation Robotic Assistants 22 / 23
Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions
Concluding Remarks
We gave an overview to the research carried out on the project
Trustworthy Robotic Assistants and discussed approaches to
trust and safety for robotic assistants.
We advocate the use of a suite of veriļ¬cation and validation
techniques at different levels of abstraction and coverability to
help gain assurance of the robotā€™s safety, reliability and
functional correctness.
We considered the combination of formal veriļ¬cation (model
checking), simulation-based testing, and user validation in
experiments with real robots in a domestic and collaborative
manufacturing scenario.
Papers available at www.robosafe.org
Clare Dixon Veriļ¬cation and Validation Robotic Assistants 23 / 23

More Related Content

What's hot

2019 1 testing and verification of vlsi design_introduction
2019 1 testing and verification of vlsi design_introduction2019 1 testing and verification of vlsi design_introduction
2019 1 testing and verification of vlsi design_introduction
Usha Mehta
Ā 
ASIC design verification
ASIC design verificationASIC design verification
ASIC design verification
Gireesh Kallihal
Ā 
ISTQB, ISEB Lecture Notes
ISTQB, ISEB Lecture NotesISTQB, ISEB Lecture Notes
ISTQB, ISEB Lecture Notes
onsoftwaretest
Ā 
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
Jaap van Ekris
Ā 
Introduction of testing and verification of vlsi design
Introduction of testing and verification of vlsi designIntroduction of testing and verification of vlsi design
Introduction of testing and verification of vlsi design
Usha Mehta
Ā 
Bristol 2009 q1_eder_kersten
Bristol 2009 q1_eder_kerstenBristol 2009 q1_eder_kersten
Bristol 2009 q1_eder_kerstenObsidian Software
Ā 
2021 08-28, QONFEST 2021 - Reliability cenetered maintenance for sleeping giants
2021 08-28, QONFEST 2021 - Reliability cenetered maintenance for sleeping giants2021 08-28, QONFEST 2021 - Reliability cenetered maintenance for sleeping giants
2021 08-28, QONFEST 2021 - Reliability cenetered maintenance for sleeping giants
Jaap van Ekris
Ā 
Demystifying Binary Reverse Engineering - Pixels Camp
Demystifying Binary Reverse Engineering - Pixels CampDemystifying Binary Reverse Engineering - Pixels Camp
Demystifying Binary Reverse Engineering - Pixels Camp
AndrƩ Baptista
Ā 
Breakthrough in Quality Management
Breakthrough in Quality ManagementBreakthrough in Quality Management
Breakthrough in Quality Management
OptimalPlus
Ā 
4 verification flow_planning
4 verification flow_planning4 verification flow_planning
4 verification flow_planning
Usha Mehta
Ā 
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical InfrastructureHIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
AdaCore
Ā 
SpecTRM
SpecTRMSpecTRM
SpecTRM
CS, NcState
Ā 
Optimal+ GSA 2014
Optimal+ GSA  2014Optimal+ GSA  2014
Optimal+ GSA 2014
OptimalPlus
Ā 
Netw450 advanced network security with lab entire class
Netw450 advanced network security with lab entire classNetw450 advanced network security with lab entire class
Netw450 advanced network security with lab entire class
EugenioBrown1
Ā 
Test Drive Development
Test Drive DevelopmentTest Drive Development
Test Drive Development
satya sudheer
Ā 
Federation Lab and OpenID Connect
Federation Lab and OpenID ConnectFederation Lab and OpenID Connect
Federation Lab and OpenID Connect
Andreas ƅkre Solberg
Ā 

What's hot (18)

2019 1 testing and verification of vlsi design_introduction
2019 1 testing and verification of vlsi design_introduction2019 1 testing and verification of vlsi design_introduction
2019 1 testing and verification of vlsi design_introduction
Ā 
ASIC design verification
ASIC design verificationASIC design verification
ASIC design verification
Ā 
ISTQB, ISEB Lecture Notes
ISTQB, ISEB Lecture NotesISTQB, ISEB Lecture Notes
ISTQB, ISEB Lecture Notes
Ā 
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
Ā 
Introduction of testing and verification of vlsi design
Introduction of testing and verification of vlsi designIntroduction of testing and verification of vlsi design
Introduction of testing and verification of vlsi design
Ā 
Bristol 2009 q1_eder_kersten
Bristol 2009 q1_eder_kerstenBristol 2009 q1_eder_kersten
Bristol 2009 q1_eder_kersten
Ā 
2021 08-28, QONFEST 2021 - Reliability cenetered maintenance for sleeping giants
2021 08-28, QONFEST 2021 - Reliability cenetered maintenance for sleeping giants2021 08-28, QONFEST 2021 - Reliability cenetered maintenance for sleeping giants
2021 08-28, QONFEST 2021 - Reliability cenetered maintenance for sleeping giants
Ā 
Demystifying Binary Reverse Engineering - Pixels Camp
Demystifying Binary Reverse Engineering - Pixels CampDemystifying Binary Reverse Engineering - Pixels Camp
Demystifying Binary Reverse Engineering - Pixels Camp
Ā 
Breakthrough in Quality Management
Breakthrough in Quality ManagementBreakthrough in Quality Management
Breakthrough in Quality Management
Ā 
4 verification flow_planning
4 verification flow_planning4 verification flow_planning
4 verification flow_planning
Ā 
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical InfrastructureHIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
Ā 
SpecTRM
SpecTRMSpecTRM
SpecTRM
Ā 
Optimal+ GSA 2014
Optimal+ GSA  2014Optimal+ GSA  2014
Optimal+ GSA 2014
Ā 
Bangalore march07
Bangalore march07Bangalore march07
Bangalore march07
Ā 
Netw450 advanced network security with lab entire class
Netw450 advanced network security with lab entire classNetw450 advanced network security with lab entire class
Netw450 advanced network security with lab entire class
Ā 
Test Drive Development
Test Drive DevelopmentTest Drive Development
Test Drive Development
Ā 
Federation Lab and OpenID Connect
Federation Lab and OpenID ConnectFederation Lab and OpenID Connect
Federation Lab and OpenID Connect
Ā 
Strickland dvclub
Strickland dvclubStrickland dvclub
Strickland dvclub
Ā 

Viewers also liked

The Application of Formal Methods to Railway Signalling Software
The Application of Formal Methods to Railway Signalling SoftwareThe Application of Formal Methods to Railway Signalling Software
The Application of Formal Methods to Railway Signalling Software
AdaCore
Ā 
Ada 202x A broad overview of relevant news
Ada 202x A broad overview of relevant newsAda 202x A broad overview of relevant news
Ada 202x A broad overview of relevant news
AdaCore
Ā 
MISRA C ā€“ Recent developments and a road map to the future
MISRA C ā€“ Recent developments and a road map to the futureMISRA C ā€“ Recent developments and a road map to the future
MISRA C ā€“ Recent developments and a road map to the future
AdaCore
Ā 
Bounded Model Checking for C Programs in an Enterprise Environment
Bounded Model Checking for C Programs in an Enterprise EnvironmentBounded Model Checking for C Programs in an Enterprise Environment
Bounded Model Checking for C Programs in an Enterprise Environment
AdaCore
Ā 
Multi-Core (MC) Processor Qualification for Safety Critical Systems
Multi-Core (MC) Processor Qualification for Safety Critical SystemsMulti-Core (MC) Processor Qualification for Safety Critical Systems
Multi-Core (MC) Processor Qualification for Safety Critical Systems
AdaCore
Ā 
HIS 2015: Ivan Ellis - VISIUMCORE A High Integrity Processor for Safety Criti...
HIS 2015: Ivan Ellis - VISIUMCORE A High Integrity Processor for Safety Criti...HIS 2015: Ivan Ellis - VISIUMCORE A High Integrity Processor for Safety Criti...
HIS 2015: Ivan Ellis - VISIUMCORE A High Integrity Processor for Safety Criti...
AdaCore
Ā 
HIS 2015: Neil White - Advances in Practical Techniques for Critical Developm...
HIS 2015: Neil White - Advances in Practical Techniques for Critical Developm...HIS 2015: Neil White - Advances in Practical Techniques for Critical Developm...
HIS 2015: Neil White - Advances in Practical Techniques for Critical Developm...
AdaCore
Ā 
HIS 2015: Roderick Chapman - Murphy Vs Satan Why programming secure systems i...
HIS 2015: Roderick Chapman - Murphy Vs Satan Why programming secure systems i...HIS 2015: Roderick Chapman - Murphy Vs Satan Why programming secure systems i...
HIS 2015: Roderick Chapman - Murphy Vs Satan Why programming secure systems i...
AdaCore
Ā 
An Alternative Approach to DO-178B
An Alternative Approach to DO-178BAn Alternative Approach to DO-178B
An Alternative Approach to DO-178B
AdaCore
Ā 
HIS 2015: Prof. Phil Koopman - A Case Study of Toyota Unintended Acceleration...
HIS 2015: Prof. Phil Koopman - A Case Study of Toyota Unintended Acceleration...HIS 2015: Prof. Phil Koopman - A Case Study of Toyota Unintended Acceleration...
HIS 2015: Prof. Phil Koopman - A Case Study of Toyota Unintended Acceleration...
AdaCore
Ā 
Practical Application of Agile Techniques in Developing Safety Related Systems
Practical Application of Agile Techniques in Developing Safety Related SystemsPractical Application of Agile Techniques in Developing Safety Related Systems
Practical Application of Agile Techniques in Developing Safety Related Systems
AdaCore
Ā 
How should we build that? Evolving a development environment that's suitable ...
How should we build that? Evolving a development environment that's suitable ...How should we build that? Evolving a development environment that's suitable ...
How should we build that? Evolving a development environment that's suitable ...
AdaCore
Ā 
Mixed Criticality Systems and Many-Core Platforms
Mixed Criticality Systems and Many-Core PlatformsMixed Criticality Systems and Many-Core Platforms
Mixed Criticality Systems and Many-Core Platforms
AdaCore
Ā 
Mind your language(s), A Discussion about Languages and Security
Mind your language(s), A Discussion about Languages and SecurityMind your language(s), A Discussion about Languages and Security
Mind your language(s), A Discussion about Languages and Security
AdaCore
Ā 
HIS Conf 2014: An Insight into MISRA-C
HIS Conf 2014: An Insight into MISRA-CHIS Conf 2014: An Insight into MISRA-C
HIS Conf 2014: An Insight into MISRA-C
AdaCore
Ā 
HIS 2015: Prof. Mark Little - Open Source Challenges in the Enterprise
HIS 2015: Prof. Mark Little - Open Source Challenges in the EnterpriseHIS 2015: Prof. Mark Little - Open Source Challenges in the Enterprise
HIS 2015: Prof. Mark Little - Open Source Challenges in the Enterprise
AdaCore
Ā 
The Muen Separation Kernel
The Muen Separation KernelThe Muen Separation Kernel
The Muen Separation Kernel
AdaCore
Ā 
HIS 2015: Prof. Ian Phillips - Stronger than its weakest link
HIS 2015: Prof. Ian Phillips - Stronger than its weakest linkHIS 2015: Prof. Ian Phillips - Stronger than its weakest link
HIS 2015: Prof. Ian Phillips - Stronger than its weakest link
AdaCore
Ā 

Viewers also liked (18)

The Application of Formal Methods to Railway Signalling Software
The Application of Formal Methods to Railway Signalling SoftwareThe Application of Formal Methods to Railway Signalling Software
The Application of Formal Methods to Railway Signalling Software
Ā 
Ada 202x A broad overview of relevant news
Ada 202x A broad overview of relevant newsAda 202x A broad overview of relevant news
Ada 202x A broad overview of relevant news
Ā 
MISRA C ā€“ Recent developments and a road map to the future
MISRA C ā€“ Recent developments and a road map to the futureMISRA C ā€“ Recent developments and a road map to the future
MISRA C ā€“ Recent developments and a road map to the future
Ā 
Bounded Model Checking for C Programs in an Enterprise Environment
Bounded Model Checking for C Programs in an Enterprise EnvironmentBounded Model Checking for C Programs in an Enterprise Environment
Bounded Model Checking for C Programs in an Enterprise Environment
Ā 
Multi-Core (MC) Processor Qualification for Safety Critical Systems
Multi-Core (MC) Processor Qualification for Safety Critical SystemsMulti-Core (MC) Processor Qualification for Safety Critical Systems
Multi-Core (MC) Processor Qualification for Safety Critical Systems
Ā 
HIS 2015: Ivan Ellis - VISIUMCORE A High Integrity Processor for Safety Criti...
HIS 2015: Ivan Ellis - VISIUMCORE A High Integrity Processor for Safety Criti...HIS 2015: Ivan Ellis - VISIUMCORE A High Integrity Processor for Safety Criti...
HIS 2015: Ivan Ellis - VISIUMCORE A High Integrity Processor for Safety Criti...
Ā 
HIS 2015: Neil White - Advances in Practical Techniques for Critical Developm...
HIS 2015: Neil White - Advances in Practical Techniques for Critical Developm...HIS 2015: Neil White - Advances in Practical Techniques for Critical Developm...
HIS 2015: Neil White - Advances in Practical Techniques for Critical Developm...
Ā 
HIS 2015: Roderick Chapman - Murphy Vs Satan Why programming secure systems i...
HIS 2015: Roderick Chapman - Murphy Vs Satan Why programming secure systems i...HIS 2015: Roderick Chapman - Murphy Vs Satan Why programming secure systems i...
HIS 2015: Roderick Chapman - Murphy Vs Satan Why programming secure systems i...
Ā 
An Alternative Approach to DO-178B
An Alternative Approach to DO-178BAn Alternative Approach to DO-178B
An Alternative Approach to DO-178B
Ā 
HIS 2015: Prof. Phil Koopman - A Case Study of Toyota Unintended Acceleration...
HIS 2015: Prof. Phil Koopman - A Case Study of Toyota Unintended Acceleration...HIS 2015: Prof. Phil Koopman - A Case Study of Toyota Unintended Acceleration...
HIS 2015: Prof. Phil Koopman - A Case Study of Toyota Unintended Acceleration...
Ā 
Practical Application of Agile Techniques in Developing Safety Related Systems
Practical Application of Agile Techniques in Developing Safety Related SystemsPractical Application of Agile Techniques in Developing Safety Related Systems
Practical Application of Agile Techniques in Developing Safety Related Systems
Ā 
How should we build that? Evolving a development environment that's suitable ...
How should we build that? Evolving a development environment that's suitable ...How should we build that? Evolving a development environment that's suitable ...
How should we build that? Evolving a development environment that's suitable ...
Ā 
Mixed Criticality Systems and Many-Core Platforms
Mixed Criticality Systems and Many-Core PlatformsMixed Criticality Systems and Many-Core Platforms
Mixed Criticality Systems and Many-Core Platforms
Ā 
Mind your language(s), A Discussion about Languages and Security
Mind your language(s), A Discussion about Languages and SecurityMind your language(s), A Discussion about Languages and Security
Mind your language(s), A Discussion about Languages and Security
Ā 
HIS Conf 2014: An Insight into MISRA-C
HIS Conf 2014: An Insight into MISRA-CHIS Conf 2014: An Insight into MISRA-C
HIS Conf 2014: An Insight into MISRA-C
Ā 
HIS 2015: Prof. Mark Little - Open Source Challenges in the Enterprise
HIS 2015: Prof. Mark Little - Open Source Challenges in the EnterpriseHIS 2015: Prof. Mark Little - Open Source Challenges in the Enterprise
HIS 2015: Prof. Mark Little - Open Source Challenges in the Enterprise
Ā 
The Muen Separation Kernel
The Muen Separation KernelThe Muen Separation Kernel
The Muen Separation Kernel
Ā 
HIS 2015: Prof. Ian Phillips - Stronger than its weakest link
HIS 2015: Prof. Ian Phillips - Stronger than its weakest linkHIS 2015: Prof. Ian Phillips - Stronger than its weakest link
HIS 2015: Prof. Ian Phillips - Stronger than its weakest link
Ā 

Similar to Verification and Validation of Robotic Assistants

Rescue Robot CTIT.pptx
Rescue Robot CTIT.pptxRescue Robot CTIT.pptx
Rescue Robot CTIT.pptx
Rajpatel203800
Ā 
Robotics Introduction lecture
Robotics Introduction lectureRobotics Introduction lecture
Robotics Introduction lecture
cairo university
Ā 
Pick and Place Robotic Claw for Engineering Applications
Pick and Place Robotic Claw for Engineering ApplicationsPick and Place Robotic Claw for Engineering Applications
Pick and Place Robotic Claw for Engineering Applications
IRJET Journal
Ā 
verification of autonomous robotic system
verification of autonomous robotic systemverification of autonomous robotic system
verification of autonomous robotic system
ASJAYASURYA
Ā 
High Tech Careers series
High Tech Careers seriesHigh Tech Careers series
High Tech Careers series
Joe Parenteau
Ā 
Machine Vision On Embedded Platform -Report
Machine Vision On Embedded Platform -ReportMachine Vision On Embedded Platform -Report
Machine Vision On Embedded Platform -Report
Omkar Rane
Ā 
OCLR: A More Expressive, Pattern-Based Temporal Extension of OCL
OCLR: A More Expressive, Pattern-Based Temporal Extension of OCLOCLR: A More Expressive, Pattern-Based Temporal Extension of OCL
OCLR: A More Expressive, Pattern-Based Temporal Extension of OCLLionel Briand
Ā 
A Survey of functional verification techniques
A Survey of functional verification techniquesA Survey of functional verification techniques
A Survey of functional verification techniques
IJSRD
Ā 
Re-Evaluating the Value and Market Positioning of Industrial Cobots
Re-Evaluating the Value and Market Positioning of Industrial CobotsRe-Evaluating the Value and Market Positioning of Industrial Cobots
Re-Evaluating the Value and Market Positioning of Industrial Cobots
Lizzie Uhl
Ā 
Summer Training Program Report On Embedded system and robot
Summer Training Program Report On Embedded system and robot Summer Training Program Report On Embedded system and robot
Summer Training Program Report On Embedded system and robot
Arcanjo Salazaku
Ā 
利ē”Ø Lab View é€²č”Œę•“åˆå¼ę©Ÿå™Øäŗŗē³»ēµ±ę¦‚åæµę•™å­ø
利ē”Ø Lab View é€²č”Œę•“åˆå¼ę©Ÿå™Øäŗŗē³»ēµ±ę¦‚åæµę•™å­ø利ē”Ø Lab View é€²č”Œę•“åˆå¼ę©Ÿå™Øäŗŗē³»ēµ±ę¦‚åæµę•™å­ø
利ē”Ø Lab View é€²č”Œę•“åˆå¼ę©Ÿå™Øäŗŗē³»ēµ±ę¦‚åæµę•™å­ø
riobotics
Ā 
Applying Product Line Use Case Modeling ! in an Industrial Automotive Embedde...
Applying Product Line Use Case Modeling ! in an Industrial Automotive Embedde...Applying Product Line Use Case Modeling ! in an Industrial Automotive Embedde...
Applying Product Line Use Case Modeling ! in an Industrial Automotive Embedde...
Lionel Briand
Ā 
Development of Pick and Place Robot for Industrial Applications
Development of Pick and Place Robot for Industrial ApplicationsDevelopment of Pick and Place Robot for Industrial Applications
Development of Pick and Place Robot for Industrial Applications
IRJET Journal
Ā 
Innovative trends in robotics
Innovative trends in roboticsInnovative trends in robotics
Innovative trends in robotics
Design World
Ā 
IRJET- Criminal Recognization in CCTV Surveillance Video
IRJET-  	  Criminal Recognization in CCTV Surveillance VideoIRJET-  	  Criminal Recognization in CCTV Surveillance Video
IRJET- Criminal Recognization in CCTV Surveillance Video
IRJET Journal
Ā 
Advanced Robot Vision for Medical Surgical Applications
Advanced Robot Vision for Medical Surgical ApplicationsAdvanced Robot Vision for Medical Surgical Applications
Advanced Robot Vision for Medical Surgical Applications
DR.P.S.JAGADEESH KUMAR
Ā 
MODELING (mechanical) AND ANALYSIS OF ROBO-ARM FOR PICK AND PLACE OPERATION I...
MODELING (mechanical) AND ANALYSIS OF ROBO-ARM FOR PICK AND PLACE OPERATION I...MODELING (mechanical) AND ANALYSIS OF ROBO-ARM FOR PICK AND PLACE OPERATION I...
MODELING (mechanical) AND ANALYSIS OF ROBO-ARM FOR PICK AND PLACE OPERATION I...
ijsrd.com
Ā 
Quantum Computing ā€“ A Tech Story
Quantum Computing ā€“ A Tech StoryQuantum Computing ā€“ A Tech Story
Quantum Computing ā€“ A Tech Story
IRJET Journal
Ā 

Similar to Verification and Validation of Robotic Assistants (20)

Rescue Robot CTIT.pptx
Rescue Robot CTIT.pptxRescue Robot CTIT.pptx
Rescue Robot CTIT.pptx
Ā 
Robotics Introduction lecture
Robotics Introduction lectureRobotics Introduction lecture
Robotics Introduction lecture
Ā 
Pick and Place Robotic Claw for Engineering Applications
Pick and Place Robotic Claw for Engineering ApplicationsPick and Place Robotic Claw for Engineering Applications
Pick and Place Robotic Claw for Engineering Applications
Ā 
verification of autonomous robotic system
verification of autonomous robotic systemverification of autonomous robotic system
verification of autonomous robotic system
Ā 
High Tech Careers series
High Tech Careers seriesHigh Tech Careers series
High Tech Careers series
Ā 
Machine Vision On Embedded Platform -Report
Machine Vision On Embedded Platform -ReportMachine Vision On Embedded Platform -Report
Machine Vision On Embedded Platform -Report
Ā 
OCLR: A More Expressive, Pattern-Based Temporal Extension of OCL
OCLR: A More Expressive, Pattern-Based Temporal Extension of OCLOCLR: A More Expressive, Pattern-Based Temporal Extension of OCL
OCLR: A More Expressive, Pattern-Based Temporal Extension of OCL
Ā 
A Survey of functional verification techniques
A Survey of functional verification techniquesA Survey of functional verification techniques
A Survey of functional verification techniques
Ā 
Re-Evaluating the Value and Market Positioning of Industrial Cobots
Re-Evaluating the Value and Market Positioning of Industrial CobotsRe-Evaluating the Value and Market Positioning of Industrial Cobots
Re-Evaluating the Value and Market Positioning of Industrial Cobots
Ā 
Summer Training Program Report On Embedded system and robot
Summer Training Program Report On Embedded system and robot Summer Training Program Report On Embedded system and robot
Summer Training Program Report On Embedded system and robot
Ā 
利ē”Ø Lab View é€²č”Œę•“åˆå¼ę©Ÿå™Øäŗŗē³»ēµ±ę¦‚åæµę•™å­ø
利ē”Ø Lab View é€²č”Œę•“åˆå¼ę©Ÿå™Øäŗŗē³»ēµ±ę¦‚åæµę•™å­ø利ē”Ø Lab View é€²č”Œę•“åˆå¼ę©Ÿå™Øäŗŗē³»ēµ±ę¦‚åæµę•™å­ø
利ē”Ø Lab View é€²č”Œę•“åˆå¼ę©Ÿå™Øäŗŗē³»ēµ±ę¦‚åæµę•™å­ø
Ā 
Applying Product Line Use Case Modeling ! in an Industrial Automotive Embedde...
Applying Product Line Use Case Modeling ! in an Industrial Automotive Embedde...Applying Product Line Use Case Modeling ! in an Industrial Automotive Embedde...
Applying Product Line Use Case Modeling ! in an Industrial Automotive Embedde...
Ā 
Development of Pick and Place Robot for Industrial Applications
Development of Pick and Place Robot for Industrial ApplicationsDevelopment of Pick and Place Robot for Industrial Applications
Development of Pick and Place Robot for Industrial Applications
Ā 
Innovative trends in robotics
Innovative trends in roboticsInnovative trends in robotics
Innovative trends in robotics
Ā 
IRJET- Criminal Recognization in CCTV Surveillance Video
IRJET-  	  Criminal Recognization in CCTV Surveillance VideoIRJET-  	  Criminal Recognization in CCTV Surveillance Video
IRJET- Criminal Recognization in CCTV Surveillance Video
Ā 
Advanced Robot Vision for Medical Surgical Applications
Advanced Robot Vision for Medical Surgical ApplicationsAdvanced Robot Vision for Medical Surgical Applications
Advanced Robot Vision for Medical Surgical Applications
Ā 
MODELING (mechanical) AND ANALYSIS OF ROBO-ARM FOR PICK AND PLACE OPERATION I...
MODELING (mechanical) AND ANALYSIS OF ROBO-ARM FOR PICK AND PLACE OPERATION I...MODELING (mechanical) AND ANALYSIS OF ROBO-ARM FOR PICK AND PLACE OPERATION I...
MODELING (mechanical) AND ANALYSIS OF ROBO-ARM FOR PICK AND PLACE OPERATION I...
Ā 
FinalReviewReport
FinalReviewReportFinalReviewReport
FinalReviewReport
Ā 
Quantum Computing ā€“ A Tech Story
Quantum Computing ā€“ A Tech StoryQuantum Computing ā€“ A Tech Story
Quantum Computing ā€“ A Tech Story
Ā 
new anu resume
new anu resumenew anu resume
new anu resume
Ā 

More from AdaCore

RCA OCORA: Safe Computing Platform using open standards
RCA OCORA: Safe Computing Platform using open standardsRCA OCORA: Safe Computing Platform using open standards
RCA OCORA: Safe Computing Platform using open standards
AdaCore
Ā 
Have we a Human Ecosystem?
Have we a Human Ecosystem?Have we a Human Ecosystem?
Have we a Human Ecosystem?
AdaCore
Ā 
Rust and the coming age of high integrity languages
Rust and the coming age of high integrity languagesRust and the coming age of high integrity languages
Rust and the coming age of high integrity languages
AdaCore
Ā 
SPARKNaCl: A verified, fast cryptographic library
SPARKNaCl: A verified, fast cryptographic librarySPARKNaCl: A verified, fast cryptographic library
SPARKNaCl: A verified, fast cryptographic library
AdaCore
Ā 
Developing Future High Integrity Processing Solutions
Developing Future High Integrity Processing SolutionsDeveloping Future High Integrity Processing Solutions
Developing Future High Integrity Processing Solutions
AdaCore
Ā 
Taming event-driven software via formal verification
Taming event-driven software via formal verificationTaming event-driven software via formal verification
Taming event-driven software via formal verification
AdaCore
Ā 
Pushing the Boundary of Mostly Automatic Program Proof
Pushing the Boundary of Mostly Automatic Program ProofPushing the Boundary of Mostly Automatic Program Proof
Pushing the Boundary of Mostly Automatic Program Proof
AdaCore
Ā 
RCA OCORA: Safe Computing Platform using open standards
RCA OCORA: Safe Computing Platform using open standardsRCA OCORA: Safe Computing Platform using open standards
RCA OCORA: Safe Computing Platform using open standards
AdaCore
Ā 
Product Lines and Ecosystems: from customization to configuration
Product Lines and Ecosystems: from customization to configurationProduct Lines and Ecosystems: from customization to configuration
Product Lines and Ecosystems: from customization to configuration
AdaCore
Ā 
Securing the Future of Safety and Security of Embedded Software
Securing the Future of Safety and Security of Embedded SoftwareSecuring the Future of Safety and Security of Embedded Software
Securing the Future of Safety and Security of Embedded Software
AdaCore
Ā 
Spark / Ada for Safe and Secure Firmware Development
Spark / Ada for Safe and Secure Firmware DevelopmentSpark / Ada for Safe and Secure Firmware Development
Spark / Ada for Safe and Secure Firmware Development
AdaCore
Ā 
Introducing the HICLASS Research Programme - Enabling Development of Complex ...
Introducing the HICLASS Research Programme - Enabling Development of Complex ...Introducing the HICLASS Research Programme - Enabling Development of Complex ...
Introducing the HICLASS Research Programme - Enabling Development of Complex ...
AdaCore
Ā 
The Future of Aerospace ā€“ More Software Please!
The Future of Aerospace ā€“ More Software Please!The Future of Aerospace ā€“ More Software Please!
The Future of Aerospace ā€“ More Software Please!
AdaCore
Ā 
Adaptive AUTOSAR - The New AUTOSAR Architecture
Adaptive AUTOSAR - The New AUTOSAR ArchitectureAdaptive AUTOSAR - The New AUTOSAR Architecture
Adaptive AUTOSAR - The New AUTOSAR Architecture
AdaCore
Ā 
Using Tiers of Assurance Evidence to Reduce the Tears! Adopting the ā€œWheel of...
Using Tiers of Assurance Evidence to Reduce the Tears! Adopting the ā€œWheel of...Using Tiers of Assurance Evidence to Reduce the Tears! Adopting the ā€œWheel of...
Using Tiers of Assurance Evidence to Reduce the Tears! Adopting the ā€œWheel of...
AdaCore
Ā 
Software Engineering for Robotics - The RoboStar Technology
Software Engineering for Robotics - The RoboStar TechnologySoftware Engineering for Robotics - The RoboStar Technology
Software Engineering for Robotics - The RoboStar Technology
AdaCore
Ā 
MISRA C in an ISO 26262 context
MISRA C in an ISO 26262 contextMISRA C in an ISO 26262 context
MISRA C in an ISO 26262 context
AdaCore
Ā 
Application of theorem proving for safety-critical vehicle software
Application of theorem proving for safety-critical vehicle softwareApplication of theorem proving for safety-critical vehicle software
Application of theorem proving for safety-critical vehicle software
AdaCore
Ā 

More from AdaCore (18)

RCA OCORA: Safe Computing Platform using open standards
RCA OCORA: Safe Computing Platform using open standardsRCA OCORA: Safe Computing Platform using open standards
RCA OCORA: Safe Computing Platform using open standards
Ā 
Have we a Human Ecosystem?
Have we a Human Ecosystem?Have we a Human Ecosystem?
Have we a Human Ecosystem?
Ā 
Rust and the coming age of high integrity languages
Rust and the coming age of high integrity languagesRust and the coming age of high integrity languages
Rust and the coming age of high integrity languages
Ā 
SPARKNaCl: A verified, fast cryptographic library
SPARKNaCl: A verified, fast cryptographic librarySPARKNaCl: A verified, fast cryptographic library
SPARKNaCl: A verified, fast cryptographic library
Ā 
Developing Future High Integrity Processing Solutions
Developing Future High Integrity Processing SolutionsDeveloping Future High Integrity Processing Solutions
Developing Future High Integrity Processing Solutions
Ā 
Taming event-driven software via formal verification
Taming event-driven software via formal verificationTaming event-driven software via formal verification
Taming event-driven software via formal verification
Ā 
Pushing the Boundary of Mostly Automatic Program Proof
Pushing the Boundary of Mostly Automatic Program ProofPushing the Boundary of Mostly Automatic Program Proof
Pushing the Boundary of Mostly Automatic Program Proof
Ā 
RCA OCORA: Safe Computing Platform using open standards
RCA OCORA: Safe Computing Platform using open standardsRCA OCORA: Safe Computing Platform using open standards
RCA OCORA: Safe Computing Platform using open standards
Ā 
Product Lines and Ecosystems: from customization to configuration
Product Lines and Ecosystems: from customization to configurationProduct Lines and Ecosystems: from customization to configuration
Product Lines and Ecosystems: from customization to configuration
Ā 
Securing the Future of Safety and Security of Embedded Software
Securing the Future of Safety and Security of Embedded SoftwareSecuring the Future of Safety and Security of Embedded Software
Securing the Future of Safety and Security of Embedded Software
Ā 
Spark / Ada for Safe and Secure Firmware Development
Spark / Ada for Safe and Secure Firmware DevelopmentSpark / Ada for Safe and Secure Firmware Development
Spark / Ada for Safe and Secure Firmware Development
Ā 
Introducing the HICLASS Research Programme - Enabling Development of Complex ...
Introducing the HICLASS Research Programme - Enabling Development of Complex ...Introducing the HICLASS Research Programme - Enabling Development of Complex ...
Introducing the HICLASS Research Programme - Enabling Development of Complex ...
Ā 
The Future of Aerospace ā€“ More Software Please!
The Future of Aerospace ā€“ More Software Please!The Future of Aerospace ā€“ More Software Please!
The Future of Aerospace ā€“ More Software Please!
Ā 
Adaptive AUTOSAR - The New AUTOSAR Architecture
Adaptive AUTOSAR - The New AUTOSAR ArchitectureAdaptive AUTOSAR - The New AUTOSAR Architecture
Adaptive AUTOSAR - The New AUTOSAR Architecture
Ā 
Using Tiers of Assurance Evidence to Reduce the Tears! Adopting the ā€œWheel of...
Using Tiers of Assurance Evidence to Reduce the Tears! Adopting the ā€œWheel of...Using Tiers of Assurance Evidence to Reduce the Tears! Adopting the ā€œWheel of...
Using Tiers of Assurance Evidence to Reduce the Tears! Adopting the ā€œWheel of...
Ā 
Software Engineering for Robotics - The RoboStar Technology
Software Engineering for Robotics - The RoboStar TechnologySoftware Engineering for Robotics - The RoboStar Technology
Software Engineering for Robotics - The RoboStar Technology
Ā 
MISRA C in an ISO 26262 context
MISRA C in an ISO 26262 contextMISRA C in an ISO 26262 context
MISRA C in an ISO 26262 context
Ā 
Application of theorem proving for safety-critical vehicle software
Application of theorem proving for safety-critical vehicle softwareApplication of theorem proving for safety-critical vehicle software
Application of theorem proving for safety-critical vehicle software
Ā 

Recently uploaded

Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
UiPathCommunity
Ā 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
Ā 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
Ā 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
Ā 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
Ā 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
Ā 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
Ā 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
Ā 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
Ā 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
Ā 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
Ā 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
Ā 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
Ā 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
Ā 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
Ā 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
Ā 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
Ā 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
Ā 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
Ā 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
Ā 

Recently uploaded (20)

Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Ā 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Ā 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Ā 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Ā 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
Ā 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
Ā 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Ā 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Ā 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Ā 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Ā 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Ā 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
Ā 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Ā 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Ā 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
Ā 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
Ā 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Ā 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
Ā 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
Ā 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Ā 

Verification and Validation of Robotic Assistants

  • 1. Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions Veriļ¬cation and Validation of Robotic Assistants Clare Dixon Department of Computer Science University of Liverpool 1 University of Liverpool (UoL) 2 University of Hertfordshire (UoH) 3 Bristol Robotics Lab (BRL) www.robosafe.org Farshid Amirabdollahian2 Kerstin Dautenhahn2 Anthony Pipe3 Kerstin Eder3 Maha Salem2 Michael Fisher1 Joe Saunders2 Dejanira Araiza Illan3 Matt Webster1 Kheng Lee Koay2 David Western3 Clare Dixon Veriļ¬cation and Validation Robotic Assistants 1 / 23
  • 2. Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions Robotic Assistants Robotic assistants are being developed to help, or work closely with humans in industrial, domestic and health care environments (e.g. RI-MAN, Pearl, Wakamaru, . . . ) The robots will need to be able to act autonomously and make decisions to choose between a range of activities. In addition they will need to operate close to, or in collaboration with humans. How do we make sure they are trustworthy, safe, reliable and do what they are supposed to? Wakamaru image by Nesnad (Own work) [CC BY-SA 3.0 (http://creativecommons.org/licenses/by-sa/3.0) or GFDL (http://www.gnu.org/copyleft/fdl.html)], via Wikimedia Commons Clare Dixon Veriļ¬cation and Validation Robotic Assistants 2 / 23
  • 3. Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions What is Trustworthiness and Safety? Safety involves showing that the robot does nothing that (unnecessarily) endangers the person. There are ISO safety requirements and guidelines for industrial robots (ISO 10218, 2011), personal care robots (ISO 13482, 2014), and for collaborative robots (ISO 15066, 2016). Trustworthiness involves social issues beyond pure safety. It is not just a question of whether the robots are safe but whether they are perceived to be safe, useful and reliable. There are also legal (and ethical) issues such as what happens when the robot spills a hot drink on someone; the robot doesnā€™t remind the person to take their medicine; the robot doesnā€™t go to the kitchen when told? Clare Dixon Veriļ¬cation and Validation Robotic Assistants 3 / 23
  • 4. Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions Robots in the Workplace and at Home Currently many robots used in industry or domestic use operate in limited physical space or have limited functionality. This helps assure their safety. Robotsā€™ industrial environments are limited so they can only move in a ļ¬xed area and have limited interactions with humans e.g. welding or paint spraying robots. Small or limited capability domestic robots, e.g., vacuum cleaning robots, robot lawn mowers, pool cleaning robots etc Clare Dixon Veriļ¬cation and Validation Robotic Assistants 4 / 23
  • 5. Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions Trustworthy Robotic Assistants Project The EPSRC funded Trustworthy Robotic Assistants Project develops three different approaches to veriļ¬cation and validation of robotic assistants. Each approach is aimed at increasing trust in robotic assistants. Formal Veriļ¬cation (Liverpool) Simulation-based Testing (Bristol Robotics Laboratory) End-user Validation (Hertfordshire) Clare Dixon Veriļ¬cation and Validation Robotic Assistants 5 / 23
  • 6. Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions Robotic Assistants We consider two use cases, domestic and manufacturing. A personal robot assistant (the Care- O-bot R ,) located in a domestic house in the University of Hertfordshire. A co-operative manufacturing task with BERT a robot at Bristol Robotics Lab. 8 Journal Title XX(X) ā€¢ System model inaccuracies. All the veriļ¬cation techniques use models of the real-world. The models might have been constructed erroneously, or may be inconsistent with the real world, or relative to one another. ā€¢ Requirement model inaccuracies. In our approach, the real-world requirements of the system are con- verted into textual requirements, assertions and prop- erties for veriļ¬cation. These requirements models may not have been correctly formulated. ā€¢ Tool inaccuracies. It is possible that numerical approximations affect the veriļ¬cation results. In addition, third party tools can contain bugs that are unknown to us. We could now proceed to perform ā€œExperiments.ā€ As before, we may ļ¬nd a problem with the textual require- ments or the physical system during experimentation. At Figure 2. BERT 2 engaged in the handover task. robot. BERT 2 then picks up a nearby object, and holdsClare Dixon Veriļ¬cation and Validation Robotic Assistants 6 / 23
  • 7. Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions Formal Veriļ¬cation A mathematical analysis of all behaviours using logics, and tools such as theorem provers or model checkers. We focus on temporal veriļ¬cation using automatic tools and techniques that do not require user interaction. Model checking is a fully automatic, algorithmic technique for verifying the temporal properties of systems. Input to the model checker is a model of the system and a property to be checked on that model. Output is that the property is satisļ¬ed or a counter example is given. Model Checker Property holds or counter example Property eg "always p" Clare Dixon Veriļ¬cation and Validation Robotic Assistants 7 / 23
  • 8. Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions Robot Architectures and Veriļ¬cation We assume an architecture where there is a separation between the high level decision making layer and the low level control layer. etc Control System Sense and act High level choices Rational Agent Low level control Decision making Avoidance Reactive Goal selection Plan selection Prediction etc We aim to represent and verify the decision making layer and we donā€™t deal with low level control such as movement etc. Clare Dixon Veriļ¬cation and Validation Robotic Assistants 8 / 23
  • 9. Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions Simulation Based Testing This is an exhaustive testing methodology widely used in the design of micro-electronic and avionics systems. These appeal to Monte-Carlo techniques and dynamic test reļ¬nement in order to cover a wide range or practical situations. Tools are used to automate the testing and analyse the coverage of the tests. over Scenario Clare Dixon Veriļ¬cation and Validation Robotic Assistants 9 / 23
  • 10. Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions End User Validation This approach involves experiments and user evaluations in practical robotic scenarios. Scenarios relating to robot human interaction are developed to test some hypothesis and experiments with users carried out. This helps establish whether the human participants indeed view the robotic assistants as safe and trustworthy. Clare Dixon Veriļ¬cation and Validation Robotic Assistants 10 / 23
  • 11. Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions Overall Approach Clare Dixon Veriļ¬cation and Validation Robotic Assistants 11 / 23
  • 12. Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions A Domestic Robot Assistant Here we apply model checking to the high level behaviours controlling the (commercially available) Care-O-bot R , manufactured by Fraunhofer IPA. It is based on the concept of a ā€œrobot butlerā€ which has been developed as a mobile robotic assistant to support people in domestic environments. It has a manipulator arm, an articulated torso, stereo sensors serving as ā€œeyesā€, LED lights, a graphical user interface, and a moveable tray. The robotā€™s sensors monitor its current location, the state of the arm, torso, eyes and tray. Its software is based on the Robot Operating System. Clare Dixon Veriļ¬cation and Validation Robotic Assistants 12 / 23
  • 13. Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions Care-O-bot and Robot House This is deployed in a domestic-type house (the robot house) at the University of Hertfordshire. The robot house is equipped with sensors which provide information on the state of the house and its occupants, such as whether the fridge door is open and whether someone is seated on the sofa. Low-level robot actions such as movement, speech, light display, etc., are controlled by groups of high-level rules that together deļ¬ne particular behaviours. 3 Fig. 2. A plan view of the ground ļ¬‚oor of the University of Hertfordshire Robot House. Numbered boxes show the locations of sensors. models, and their formal veriļ¬cation, are described in Section IV. ā€¢ Figs. 2 and 3 have been added to provide additional information on the Robot House and the user activity within it. move_tray_and_wait(lowered_position) set_light(white) wait() set(tray_is_raised,false) set(tray_is_lowered,true)Clare Dixon Veriļ¬cation and Validation Robotic Assistants 13 / 23
  • 14. Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions Care-O-bot Decision Making: Behaviours The Care-O-botā€™s high-level decision making is determined by a set of behaviours of the form precondition ā†’ action (each a sequence of rules). Examples of high-level rules can take the form ā€œlower trayā€, ā€œmove to sofa area of the living roomā€, ā€œsay ā€˜The fridge door is openā€™ ā€, set a ļ¬‚ag, check a sensor etc. Only one behaviour executes at once. Each behaviour has a priority (integer between 0 and 90). Higher priority behaviours are executed in preference to lower priority behaviours. Each behaviour is ļ¬‚agged as interruptible or not. Once it has started executing, a behaviour will execute to completion, if it is not interruptible. Users can add new behaviours. Clare Dixon Veriļ¬cation and Validation Robotic Assistants 14 / 23
  • 15. Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions The S1-alertFridgeDoor Behaviour Behaviours (a set of high level rules) take the form: Precondition-Rules -> Action-Rules 27 Fridge Freezer Is *ON* AND has been ON for more than 30 secs 31 ::514:: GOAL-fridgeUserAlerted is false 32 Turn light on ::0::Care-o-Bot 3.2 to yellow 34 move ::0::Care-o-Bot 3.2 to ::2:: Living Room and wait for completion 35 Turn light on ::0::Care-o-Bot 3.2 to white and wait for completion 36 ::0::Care-o-Bot 3.2 says ā€˜The fridge door is open!ā€™ and wait for completion 37 SET ::506::GOAL-gotoCharger TO false 38 SET ::507::GOAL-gotoTable TO false 39 SET ::508::GOAL-gotoSofa TO false 40 ::0::Care-o-Bot 3.2 GUI, S1-Set-GoToKitchen, S1-Set-WaitHere 41 SET ::514::GOAL-fridgeUserAlerted TO true Its priority is 60 and it is not interruptible. Clare Dixon Veriļ¬cation and Validation Robotic Assistants 15 / 23
  • 16. Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions Models and Properties We need to abstract away from some of the timing details included in the database to obtain a model that is discrete, ļ¬nite and not too large. We developed a (by hand) model in the input language for the model checker NuSMV and later developed a tool (CRutoN) to automatically translate from behaviours to NuSMV input. We also need a set of properties of the system to check over the model. Ideally these would come from a speciļ¬cation or standards documents about what is expected of the robot with respect to functionality, safety etc. Here we focus on issues relating to the scheduling of behaviours, priorities and interruptions (which at least provide a sanity check). Clare Dixon Veriļ¬cation and Validation Robotic Assistants 16 / 23
  • 17. Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions Sample Properties and Model Checking Results 1 ((fridge_freezer_on āˆ§ Ā¬goal_fridge_user_alerted) ā‡’ ā™¦(location = livingroom āˆ§ ā™¦say = fridge_door_open)) 2 ((fridge_freezer_on āˆ§ Ā¬goal_fridge_user_alerted āˆ§ schedule = schedule_alert_fridge_door) ā‡’ ā™¦(location = livingroom āˆ§ ā™¦say = fridge_door_open)) Property Output Time (sec) 1 FALSE 11.1 2 TRUE 12.3 The model had 130,593 reachable states. We did ļ¬nd a small bug in the behaviours (a ļ¬‚ag was wrongly set) but this was by inspection of the behaviours. It would be better to try properties relating to the requirements of the robot. Clare Dixon Veriļ¬cation and Validation Robotic Assistants 17 / 23
  • 18. Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions Discussion CRutoN allowed us to translate from different databases of behaviours into input for a model checker, setting parameters to control particular aspects of the translation. CRutoN uses an intermediate representation so that input to different model checkers can potentially be generated. Understanding the semantics of the robot execution cycle took a lot of close work and interaction with UoH. The state explosion problem means we have to ļ¬nd a balance between the level of detail/abstraction and veriļ¬cation times (timing details were not well represented). We could deal better with uncertainty or timing constraints by applying a different model checker. The model of a person in the robot house was not represented but this could be incorporated showing their location for example. Clare Dixon Veriļ¬cation and Validation Robotic Assistants 18 / 23
  • 19. Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions Experiments with Trust and Reliability In the robot house UoH experimented using two scenarios where the robot appeared faulty or not. In both scenarios the person was asked to carry out a task with the robot. Results suggested that although errors in a robotā€™s behavior are likely to affect participantā€™s perception of its reliability and trustworthiness, this doesnā€™t seem to inļ¬‚uence their decisions to comply with instructions (or not). Their willingness to comply with the robotā€™s instructions seem to depend on the nature if the task, in particular, whether its effects are irrevocable. Clare Dixon Veriļ¬cation and Validation Robotic Assistants 19 / 23
  • 20. Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions The Manufacturing Scenario: Veriļ¬cation The focus was on a table leg handover task. The gaze, hand location and hand pressure of the human should be correct before the handover takes place. Journal Title XX(X) All the veriļ¬cation -world. The models oneously, or may be , or relative to one s. In our approach, he system are con- assertions and prop- quirements models mulated. ble that numerical ļ¬cation results. In ontain bugs that are ā€œExperiments.ā€ As the textual require- experimentation. At formal veriļ¬cation e compared against cover that one of the ed testing or formal ents. In this case we assets, as explained e between the dif- cover the cause of isons are indicated Formal Veriļ¬cationā€ ulation-based Test- Figure 2. BERT 2 engaged in the handover task. robot. BERT 2 then picks up a nearby object, and holds it out to the human. The robot announces that it is ready to handover. The human responds verbally to indicate that they are ready to receive. (For practical reasons, human-to- robot verbal signals were relayed to the robot by a human operator pressing a key.) Then, the human is expected to pull gently on the object while looking at it. BERT 2 then calculates three binary sensor conditions: ā€¢ Gaze: The humanā€™s head position and orientation relative to the object are tracked using the Vicon R motion-tracking system for an approximate measure of whether he/she is looking at the object. 11 RobotController_3S Modelling was carried out using Probabilistic Timed Automata and veriļ¬cation via the PRISM probabilistic model checker. Clare Dixon Veriļ¬cation and Validation Robotic Assistants 20 / 23
  • 21. Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions Manufacturing Scenario: Simulation and Experiments Simulation based testing and real robot experiments (BRL) 12 code to be used in simulation and in the actual robot, providing consistency between simulations, experiments, and deployed use. A screenshot of the ROS/Gazebo simulation can be seen in Figure 5. For the simulator, additional ROS nodes were con- structed in Python, to simulate BERT 2ā€™s sensor sys- tems and embedded actuation controllers. The pre-existing URDF ļ¬le describing BERT 2 was extended as described previously for use in Gazebo. The simulated human behaviour was controlled by a ROS node written in Python, driving a simpliļ¬ed physical model of the head and hand. Figure 5. Screenshot of the simulated handover task. The human head and hand are represented in orange. The object to be handed over is shown in blue. A testbench was incorporated into the simulator. The testbench comprised a test generator, a driver, a checker and a coverage collector. Achieving the exploration of meaningful and interesting sequences of behaviours from the robot and its environment in an HRI task is a challenging task. For this reason, we stimulate the robotā€™s code in the simulation indirectly through stimulating its environment (e.g., the personā€™s behaviour) instead, and we use a combination of model-based and pseudorandom test generation. Also, to alleviate the complexity of generating and timing different types of system inputs, the test generator is based on a two-tiered approach (Araiza-Illan et al. 2016) where an abstract test is generated ļ¬rst and then concretized by instantiating low-level parameters. The high-level actions of the human in the simulator include sending signals to the robot, or setting abstract parameters for gaze, location and pressure. Low-level parameters include the robotā€™s initial pose and the poses and force vectors applied by the human during the interaction. For example, we computed an abstract test of high-level actions for the human, by exploring the model in UPPAALā‡¤ā‡¤ , so that the robot an pressure gaze, pr released the hum The simulato monitor describe Finally, triggerin The s 5.2.1 assertio in Pyth If the machine to deter postcon For e both ini if (sens wait asse Note th be diff same t misinter The collecte veriļ¬ed The nu triggere coverag 5.3 E 5.3.1 imental custom in Figur of a sy unbiase environ to repro safety c quently, be inac such as ā‡¤ā‡¤http: ā€ ā€ https Prepared using sagej.cls We carried out a small user valida- tion study with 10 participants each carrying out 10 handover tasks. Clare Dixon Veriļ¬cation and Validation Robotic Assistants 21 / 23
  • 22. Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions The Manufacturing Scenario: Discussion A number of properties checked inspired by the ISO requirements, e.g. ā€œAt least 95% (60%) of handover attempts should be completed successfullyā€. Disagreement between outcomes from some of the techniques meant further investigation and reļ¬nement of the models was needed: simulation based testing revealed that the robot sometimes dropped the table leg accidentally (gripper failure) which was not modelled in the formal veriļ¬cation; real experiments revealed false negatives for the pressure sensor and location sensor (they were wrongly reported as too low/incorrect hand position) not represented elsewhere. Some of the techniques were not suitable for verifying some of the requirements, for example for aspects such as speed or closeness formal veriļ¬cation may not be the best technique to use. Clare Dixon Veriļ¬cation and Validation Robotic Assistants 22 / 23
  • 23. Introduction Techniques and Approach The Domestic Scenario The Manufacturing Scenario Conclusions Concluding Remarks We gave an overview to the research carried out on the project Trustworthy Robotic Assistants and discussed approaches to trust and safety for robotic assistants. We advocate the use of a suite of veriļ¬cation and validation techniques at different levels of abstraction and coverability to help gain assurance of the robotā€™s safety, reliability and functional correctness. We considered the combination of formal veriļ¬cation (model checking), simulation-based testing, and user validation in experiments with real robots in a domestic and collaborative manufacturing scenario. Papers available at www.robosafe.org Clare Dixon Veriļ¬cation and Validation Robotic Assistants 23 / 23