University
stringclasses
19 values
Text
stringlengths
458
20.7k
Colorado School of Mines
Table A.6. Continued Bor Calci Potas Lithi Magne Sodi Stron Chlo Bro Nitr Sulf Sample Time Taken Sample on um sium um sium um tium ride mide ate ate number during Test Sample 4 stage 2 936 549. 4625 402.6 4996 980.8 5102 4 0 5.9 157 reject .6 1 2 957 1848 Sample 4 Perm 7 46.1 107.4 1673 38.8 1507 0.3 0 11.9 38.2 .1 7 930 2413 Sample 4 Perm 8 72.3 135.2 2185 53 1967 0.4 0 11.7 37.3 .5 9 973 102. 3005 Sample 4 Perm 9 178.5 2773 76.8 2535 0.6 0 11 36.7 .2 3 3 Sample 4 stage 3 101 688. 5514 524.1 6157 1298 7394 5.2 0 5.3 195 reject 4 8 8 917 1931 Sample 4 T200 60.9 126.7 1928 49.3 1752 0.4 0 0 37.6 .6 5 1084 8517 First brine 696 1723 798.3 8060 3552 13 0 130 422 4 9 130 949. 1036 7618 148. Final brine 659 7426 1720 7 0 247 6 5 3 2 1 27. First RO Perm -0.1 0.1 0.7 0 0.6 0 0.4 0 0 0 9 50. Second RO Perm -0.1 0 1.1 0 0.9 0 1.8 0 0.1 0.1 1 Third RO Perm 82 -0.1 0 2.8 0 2.3 0 8.9 0 0 0.1 167 Fourth RO Perm -0.1 0.2 3.5 0 2.8 0 15.2 0 0 0.1 .1 Permian Basin Produced Water Cycle 1, Step 1, First RO Perm 0.3 0 0.6 0 0 43.3 0 5.8 0 0 0 1 63 mins in Cycle 1, Step 2, 2nd RO Perm 2.2 0 1 0.2 0 83.1 0 80.4 0.4 0.3 0 2 60 mins in Cycle 2, Step 1, 3rd RO Perm 0.5 0 0.4 0.1 0 35.9 0 4.7 0 0 0 3 15 mins in Cycle 3, Step 2, 4th RO Perm 3.4 0 0.4 0.1 0 51.9 0 26 0.1 0.3 0 4 13 mins in 120
Colorado School of Mines
Table A.6. Continued Bor Calci Potas Lithi Magne Sodi Stron Chlo Bro Nitr Sulf Sample Time Taken Sample on um sium um sium um tium ride mide ate ate number during Test 60. 1477 2440 Sample 4 T150 66.2 165.1 20.6 14.4 14.6 75.6 0 28 4 6 2 61. 150. 3343 5125 Initial Feed Cycle 2 367.9 39.2 24.4 37.2 171.5 12 25 7 7 0 0 62. 1292 2088 Initial Feed Cycle 3 36.7 154.9 21.1 5.6 6 92.8 101 23.4 2 1 3 83. 197. 4692 6769 Sample 4 T100B 504 59.5 42.1 50.9 287.3 16.3 29.8 6 1 1 3 77. 1342 2318 Sample 4 T200 33.2 136.7 19.6 6.8 5.2 76.3 30.3 25.4 8 3 3 74. 5168 7709 262. Initial Feed Cycle 1 1232 701 22.4 625.3 464.5 345.2 0 3 4 3 2 Initial Feed Cycle 1 72. 5395 8178 258. 1136 688.8 23.2 610.7 446.3 329.9 5.5 Sample 2 3 1 8 3 Sample 4 1st stage 71. 2007 3349 95 238.9 29.8 20.5 22.2 149 55.3 203 reject 4 0 0 Sample 4 2nd stage 77. 119. 2478 5347 292.1 36.8 23.7 27.7 238 40.4 390 reject 8 2 9 6 Sample 4 3rd stage 80. 164. 4261 6560 393.6 47.4 33.9 39.9 292 32.1 509 reject 7 4 6 4 Sample 3 stage 3 65. 4204 6729 204 477.3 49.9 35.6 51.9 reject 6 8 8 96. 7528 1E+0 226 Cycle 1 Brine 2102 1001 78.7 1197 815.4 2370 6 1 5 4 557. 131. 7062 9269 Cycle 2 Brine 87 927.7 147.4 160.4 3470 742 8 6 6 7 140 264. 5867 7945 475. Cycle 3 Brine 758.8 88.1 62.6 78.6 2578 218 .1 4 6 4 8 122
Colorado School of Mines
ABSTRACT The MineSENTRY (Mine Safety and Rescue through Sensing Networks and Robotics Technology) research project has developed a robotic system designed to extend the range of wireless communications in mining environments. The robotic system was designed to assist disaster response teams by allowing the team to control teleoperated robots while remaining safely outside. The proof-of-concept system con- sists of a teleoperated vehicle and an Autonomous Mobile Radio (AMR). The AMR is tasked with maintaining equal radio signal strength between the teleoperated vehicle and the operator. System testing was conducted at the Colorado School of Mines’ Edgar mine. Sev- eral simple controllers were developed to guide the AMR during these tests with mixed results. Although the guidance controllers did not always perform well, the results and data gathered proved useful for further development. Despite these per- formance difficulties, the results confirmed the capability of the MineSENTRY design to maintain communication within a mining environment. To address problems encountered with the tested guidance controllers, a unique path-trackingcontrollerisproposedwhichtakesadvantageoftheinherentstructureof mining environments. The proposed controller departs from contemporary methods by combining the environment and path into a single description. Further devel- opment is necessary before the controller can be implemented on the AMR robot; however, the controller has been successfully tested in simulation with encouraging results. It was found that the controller may alleviate the need for accurate and expensive localization typical of current navigation methods. iii
Colorado School of Mines
CHAPTER 1 INTRODUCTION Robotics have gradually dispersed from the factory floor to commercial, private, and military applications. Within the last few years there has been a growing interest in applications for humanitarian missions such as search and rescue (SAR). Augment- ing SAR missions with robotics can potentially increase response time, efficiency, and safety. Rescue operations benefit from mobility and advanced sensor technologies allowing robots to reach or perceive environments that human rescuers cannot. 1.1 Motivation Due to the harsh environments in which SAR robots are intended to operate, development of SAR robotic systems has proven difficult and a number of key prob- lems have yet to be solved. Reliable communication between robots and operators is one of these key problems. Mining environments are particularly difficult as neither tethered nor wireless systems guarantee reliable communication even during normal mining conditions. Wire tethers can experience a number of physical conditions which result in either immobilization or communication loss. High frequency, high bandwidth radio signals suffer greatly from propagation losses, resulting in severely reduced range. Therefore, improving communication is a necessary component to successfully utilize robots in mine rescue operations. Improved communications would allow SAR robots to travel farther into mines while providing invaluable sensor data to the rescue workers outside. In particular, air quality must be known before rescue workers are permitted to enter the mine. If the mine’s air quality measuring systems fail during a disaster, borehole drilling is used to lower sensors from the surface into the mine—a time consuming process. Robots could be deployed quickly and provide extensive air quality information and 1
Colorado School of Mines
Figure 1.1: MineSENTRY Project Concept [1] allow rescue workers to make better informed decisions. Furthermore, robots could be teleoperated from outside the mine and used to search for victims long before human operators could safely enter. 1.2 MineSENTRY Project TheMineSENTRY(MineSafetyandRescuethroughSensingNetworksandRobotics Technology)projectwasaimedatdevelopinganddemonstratingamulti-agentrobotic platform for mine search and rescue operations as a solution to the inherent commu- nication problems. The research project was carried out at the Colorado School of Mines (CSM) and was funded by NIOSH Grant #1R01OH009612-01 through CSM’s Center for Automation, Robotics, and Distributed Intelligence (CARDI). The intent was to create an ad hoc wireless network utilizing multiple Autonomous Mobile Ra- dios (AMRs) which can dynamically adjust to maintain communication between the operator(s) and the lead teleoperated vehicle. To demonstrate the viability of this system, a robotic system was developed at CSM and tested at Edgar mine in Idaho Springs, Colorado—CSM’s experimental mine. Conceptually, the MineSENTRY robotic platform maintains communication be- tween a teleoperated leader vehicle, a modified Bobcat front-end loader, and the operator (Figure 1.1). The operator remains near the mine entrance while operat- ing the front-end loader located deeper within the mine, where it would otherwise 2
Colorado School of Mines
be outside the communication range of a direct wireless link. Several AMRs follow the front-end loader into the mine and position themselves to create a wireless mesh network. The AMRs act as nodes within the network, each relaying information to the next node until the information reaches its destination. The AMRs attempt to maintain the highest radio signal strength (RSS) possible by automatically readjust- ing their positions. By using autonomous, mobile relays, the MineSENTRY platform retains the freedom of wireless systems while drastically extending the robots reach into the mining environment. 1.3 Thesis Objectives To create the MineSENTRY robotic system, the MineSENTRY team had to de- sign, obtain, or modify the teleoperated leader vehicle, AMR, and radio systems. In particular,theAMRwasdevelopedwiththejointeffortofseveralMineSENTRYteam members. The author’s primary responsibilities involved the design and construction of the AMR, including actuation, hardware, power distribution systems, and controls, although the author assisted in other aspects as well. Originally, software develop- ment was undertaken by other team members; however, due to their departure prior to project completion, the author assumed responsibility for completing the control software. Theobjectiveofthis thesisistodetailthedevelopmentoftheAutonomousMobile Radio, with a focus on the actuation, power, software, and control systems. Specifi- cally,theguidancecontrollersusedduringproof-of-concepttestingaredescribedalong with observations regarding their performance. Motivated by these observations, a unique control approach is proposed for use with the AMR system; also, simulation results are presented and analyzed. Documentation is provided to allow others to continue, improve, or expand on this research. 3
Colorado School of Mines
1.4 Chapter Overviews To provide the aforementioned information, the thesis will cover each topic in the following chapters: Chapter 2 - Literature Review In this chapter, a brief description is given regarding the use of mobile robots in mining environments and SAR applications. Furthermore, an overview of the current state of mobile robot navigation research provides the reader basic background infor- mation needed to understand later topics. Chapter 3 - Development Details of the AMR development are provided in this chapter. The topics covered are AMR actuation, hardware, electrical, and software development. This chapter is not intended to be a complete description of the AMR systems; rather, it com- plements the theses of other MineSENTRY team members, [1, 2], to provide the documentation necessary to allow others to reconstruct the MineSENTRY systems. Chapter 4 - Proof-of-Concept Testing The results of several MineSENTRY tests, conducted at the Edgar mine, are pre- sented in this chapter. The results are focused on the guidance controller(s) used during the tests to guide the AMR through the Edgar Mine. While many difficulties were encountered that adversely affected performance, several successful tests were conducted resulting in useful experimental data. This data motivated the develop- ment of an alternate guidance control, described in Chapter 5. Chapter 5 - Controller The unique guidance controller proposed by the author for use with the Mine- 4
Colorado School of Mines
CHAPTER 2 LITERATURE REVIEW The MineSENTRY project seeks to develop a robotic system for use in mine search and rescue (SAR) operations. To gain a better understanding of the difficulties involvedandthereasonsforundertakingsuchaproject, afamiliaritywiththecurrent, germane research is necessary. Specifically, the current research on mobile robots, their application in mining environments, and their application in search and rescue operations must be evaluated. 2.1 Rescue Robots and Mines In recent years there has been a great deal of interest in using mobile robots in search and rescue (SAR) applications [3, 4]. The advantages of mobile robots and SAR applications are diverse. For example, robots can provide communication and sensor information while traversing terrain and environments which prove hazardous for human rescue workers. Mining environments are an excellent example of one such environment. In the event of a disaster, mines can quickly become inhospitable and dangerous for both the miners and search and rescue teams. Mine SAR operations would therefore benefit greatly from the capabilities of mobile robotic tools; however, mines themselves present a number of challenges for mobile robots. On January 2, 2006 an explosion occurred at the Wolf Run Mining Company’s Sago Mine located near Sago, West Virginia, hereafter referred to as the Sago mine disaster [5]. Approximately 20 hours after the explosion, the Mine Safety and Health Administration’s rescue robot arrived from a repair facility in Knoxville, Tennessee and was deployed in conjunction with a rescue team just a few hours later. The robot, nicknamed V2 (Figure 2.1), was sent in to measure carbon monoxide levels which would allow the rescue team to advance more quickly into areas where CO 7
Colorado School of Mines
Figure 2.1: MSHA’s mine rescue robot, a Remotec ANDROS Wolverine robot [6]. levels were safe. Unfortunately, after a few hours of use, an operator error resulted in damage to the robot’s wheels, disabling it for the remainder of the rescue operations. The Sago mine disaster is an example of how robots may be used during actual SARoperations. However, thisdisasteralsorevealsthechallengesinvolvedwithusing robotsinsuchaninhospitableenvironment. Someofthesechallengesincludemobility inroughterrain, control, powerrequirements, andcommunication[7]. MSHA’srescue robot utilizes a 5000 foot fiber-optic cable for communication which is susceptible to damage and limits the robot’s range. Other researchers exploring robotic solutions for mining environments have encountered similar difficulties with communication. Abandoned mines are another safety concern for which robotic solutions are being researched. In 2003, a robot nicknamed ‘Groundhog’ (Figure 2.2) was used to explore and map the main corridor of an abandoned mine in Mathies, Pennsylvania [8]. The robot was designed to operate autonomously outside of wireless communication, but experienced problems during testing. Intervention over the wireless link proved un- successful due to the weak signal strength. Similarly, Pilania and Chakravarty are focusing on communication in the development of their mine SAR robot [9]. 8
Colorado School of Mines
Figure 2.2: Groundhog, the abandoned mine mapping robot [10]. The goal of the MineSENTRY project was to develop a solution to the communi- cation problem encountered in mining environments. The solution is a wireless mesh network comprised of autonomous robots that dynamically adjust to maintain com- munication. Each node (robot) within the network relays received signals to adjacent nodes. In the MineSENTRY system, the operator transmits to the nearest AMR, and the signal is relayed to the teleoperated vehicle. This simultaneously solves both communication range and reliability issues, provided enough AMRs are available to create a solid mesh network. However, with or without communication all robots (i.e. the AMRs) are expected to have a certain degree of autonomy and operate indepen- dent from human control. Thus there is a need for autonomous navigation, which has its own set of problems that must be addressed for the MineSENTRY project to be successful. 2.2 Navigation The literature on mobile robot navigation is extensive and diverse. Although the research is extensive, no universal solution exists because each situation often 9
Colorado School of Mines
poses its own unique challenges. In general, navigation methods can be divided into landmark, beacon, dead reckoning, and map-based methods [11]. Map-based methods are of particular relevance to the MineSENTRY project and are frequently researched. To implement a map-based navigation system three challenges must be addressed: mapping, localization, and path planning [12]. Additionally, the process of following the planned path, referred to as path tracking, is a commonly researched topic. 2.2.1 Mapping and Localization Mapping is the process of exploring an environment and using sensor data to produce a map which is useful (e.g. for localization) [13]. The guidance controller proposedinChapter5isdesignedtoutilizesurveymapsthatarecommonlyassociated with active mines. Because a survey map for the mine being used in testing is readily available, nospecificmappingtechniquesareimplementedandthusnotechniqueswill be discussed. However, for the survey map to be useful, the map must be described in a unique fashion which will be discussed in Chapter 5. Localization is the process of determining the robot’s position and orientation (collectively known as pose) from map and sensor data [13]. When implementing or developing a localization algorithm, the absence of information known before and during run-time greatly increases the complexity—and therefore difficulty—of the localization process. For example, global localization is the process of localizing with no initial information; in other words, the robot begins lost and must use the map to determine its location. Additional complexity is encountered in the ‘kidnapped robot problem’, which is global localization that further requires the robot to recognize if it has been picked up and moved. Conversely, if the robot only needs to track its deviation from a known initial position, the localization process is known as path tracking [14]. Path-tracking localization is particularly important to the guidance 10
Colorado School of Mines
controller proposed in Chapter 5, which will be elucidated in Section 2.2.3. Originally mapping and localization processes were executed sequentially; how- ever, recent research focuses on simultaneous localization and mapping (SLAM) al- gorithms that perform mapping and localization processes simultaneously. The work of Antoni Burguera is of particular relevance to the AMR. His extensive research ex- tendsSLAMalgorithms(whichtypicallyrequirehighaccuracyanddatarichscanning laser sensors) to the relatively inaccurate and sparse data associated with ultrasonic range-finding (sonar) sensors—the sensor of choice for the AMR [15]. 2.2.2 Path Planning Path planning, also frequently referred to as motion planning, is the process of findingacollisionfreepaththrough2-Dor3-Dspace. Thisprocessisroughlydivisible into global and local path planning. Global planning involves finding paths over long distances to a goal location, typically with some sort of map; whereas local planning involves finding the immediate motions the robot must make. Early research into path planning generally focused on local methods, such as the potential field method [16]. However, these methods had the disadvantage of being easily trapped in local minima [17]. This disadvantage prompted research into other planning methods, such as the Vector Field Histogram (VFH) [18] or Generalized Voroni Graph (GVG) [19] methods. Other approaches to path planning compute paths by finding the configuration space (C-space) of the robot; then searching the C-space for acceptable solutions to reach the goal state [11]. Configuration-based methods have the disadvantage of being computationally intensive, but advances in computer technology have reduced the cost of such methods. For example, the Groundhog robot applied the A* search algorithm in C-space to plan its paths [8]. An advantage to configuration space methods is its applicability to both global and local path planning. 11
Colorado School of Mines
2.2.3 Path-Tracking Control Onceacollisionfreepathisfoundviaanyofthenumerouspath-planningmethods, a path-tracking controller is required to guide the robot along the desired path. Path- tracking control is a very diverse research topic. Path-tracking controllers use a large variety of techniques including fuzzy logic [20], neural networks [21], spatial methods [22], and many others. Often vehicle controllers focus on incorporating the kinematics (or dynamics) of the vehicle being controlled [23]. However, if accurate localization data is available, and the operating conditions allow the vehicle dynamics to be ignored, simple path-tracking controllers may be implemented. For instance, the Groundhog robot [8] utilized a simple Proportional-Derivative (PD) controller to track and follow the paths generated by its path planner. The guidance controller proposed in Chapter 5 is categorized as a path-tracking controller. However, the proposed controller adopts a unique approach to the path- tracking problem in an effort to reduce the need for accurate localization. To ac- complish this, the algorithm requires a unique way of describing the path. This path description is a key contribution of the thesis. 2.3 Summary There are many advantages to using mobile robots in mining environments; how- ever, there are also technical challenges that impede their implementation. MSHA’s mine rescue robot, V2, and the abandoned mine mapping robot, Groundhog, are ex- amples that exemplify both the advantages and challenges. Recognizing these chal- lenges, the MineSENTRY project seeks to address the problem of communication within mining environments. To accomplish this goal, the MineSENTRY research team sought to develop the Autonomous Mobile Relay (AMR) robot; which, as its namesake implies, requires a certain degree of autonomy. Current research into mo- bile robot navigation reveals many options that could have been used to implement 12
Colorado School of Mines
CHAPTER 3 DEVELOPMENT BeforediscussingthecontrolalgorithmsimplementedontheAMR,itisimportant to understand the platform upon which it was developed. As previously mentioned, the MineSENTRY research team built the AMR robot using a golf cart as the vehicle platform. In order to convert a golf cart into a robot, a number of systems had to be developed including actuation, hardware, electrical, and software. Each of these topics are discussed separately in the remainder of this chapter. 3.1 Actuation To transform a golf cart into the AMR robot, the control electronics must be able to control the steering, brake, and throttle. Thus, actuation was installed that allows electronic commands to be realized as mechanical motion. The steering and brake, both purely mechanical on the stock golf cart, required the addition of electrome- chanical actuators; however, the golf cart’s throttle was electromechanical initially, and only required additional circuitry to allow computer control. Before adding any actuation, several requirements were established to govern the design process. These requirements will be discussed in the following sections; however, a universal require- ment was to keep modification to the factory golf cart minimal. By reducing the amount of modification necessary, the design becomes nearly modular. Provided the necessary components as a kit, a small team of technicians could easily mount an identical system onto another golf cart with minimal time and effort. 3.1.1 Steering Overview The requirements for the steering actuation included the necessity to return the vehicle to fully manual steering. This capability is extremely important both during 15
Colorado School of Mines
softwareandhardwaredevelopment. Duringtesting, itoccasionallybecamenecessary to manually drive the vehicle back to the lab to fix software problems that would have otherwise rendered the vehicle immobile. Allowing for manual steering requires the steering shaft to be mechanically de- tached from the actuator. The mechanical disconnect is necessary because back- driving the servomotor’s gear box results in unneeded mechanical wear and could damage the gears; furthermore, back-driving the servomotor adds unneeded resis- tance to the steering during manual operation. Damage to the servomotor gear box became a primary concern because of the relatively low output and input torque limit specifications. The steering can be easily back driven by applying force at the wheels, creating concern that a solid impact at the wheel could cause a transient torque at the servomotor in excess of the gear box limit. The DC servomotor was also capable of exceeding the input as well as the output torque limit of the gear box. Several solutions for protecting the gear box were considered including commer- cially available friction clutches, friction-based mechanisms, and shear pins. Most commercial friction clutches had insufficient torque ratings given the design require- ments. Friction-based systems, such as a cone shaped friction clutch, could provide both gear box protection and a means of disengaging the steering. However, to pro- vide the torques required the clutch would either need to be prohibitively large or require high axial forces while engaged. Thus, the author decided to use a shear pin for the gear box protection due to its simplicity and reliability. In order to disengage the steering actuator, a positive locking assembly was designed to lock and unlock the driving pulley from the steering shaft. A full description of the final steering assembly as well as the actuator description and selection process is described below. 16
Colorado School of Mines
Figure 3.1: Modified Steering Column 3.1.2 Steering Assembly Before going into the details of the steering assembly, it’s necessary to describe the stock steering assembly of the golf cart. The stock golf cart steering assembly is very simple; consisting of a hollow steering column, a steering shaft, steering wheel, universal joint, and a rack and pinion drive. The steering column is a steel tube that bolts to the firewall and houses the steering shaft. The steering shaft is directly attached to the steering wheel and to a universal joint behind the firewall. Finally the universal joint is connected to a rack and pinion steering assembly (Figure 3.1). To minimize themodificationsrequiredtoaddactuatedsteering, theentire assem- bly is attached to the steering column near the steering wheel. The only modifications needed to attach the steering assembly are to shorten the steering column and add a Woodruff key seat to the steering shaft. The actuator assembly clamps to the end of the steering column and replaces the stock bushing used to stabilize the end of the steering shaft. AsshowninFigure3.2,thereareseveralcomponentsusedinthesteeringassembly. The servomotor which directly drives the drive pulley. The drive pulley is not directly 17
Colorado School of Mines
Figure 3.2: Steering Actuation Assembly fixed to the servomotor output shaft; rather, a steel sleeve is pinned to the servomotor output shaft and the drive pulley can freely rotate around the sleeve. The end of the sleeve is tapped and keyed. An end cap is notched to match the sleeve’s key and is fastened to the sleeve with a cap screw. The end cap rotates the drive pulley throughashearpin. Theshearpinprotectsthesteeringactuatorgearboxbybreaking if the torque on the output shaft exceeds a certain limit. The drive pulley drives the steering pulley through a timing belt. The steering pulley is mounted on the steering shaft but may freely rotate on the shaft. To drive the steering shaft, a spline assembly is keyed to the steering shaft. The spline assembly sits next to the drive pulley, and by virtue of the splines can rotate with the steering shaft and have some axial motion. The axial motion of the spline assembly is used to fix the steering shaft to the drive pulley via a steel pin. The geometry of the purchased steering pulley required the addition of an inset brass disk to provide the mating holes for the steel pin. By adjusting the spline assembly to engage or disengage the steering pulley, the servomotor may be mechanically disconnected from the steering column. This allows the golf cart to be driven manually without back-driving the 18
Colorado School of Mines
Figure 3.3: Brake Actuator Assembly requirement can be easily achieved. 3.1.5 Brake Assembly The selected brake actuator is a common linear actuator with potentiometer po- sition feedback. The stroke length, force limit, and linear speed were selected based on the previously mentioned specifications. To allow manual operation of the brake at all times, the brake actuator is not rigidly connected to the brake; rather, a sleeve is connected to the actuator piston and a push rod is mounted to the brake pedal lever (Figure 3.3). This configuration allows the actuator to push on the brake lever but retract independently of the brake. Note that if the brake actuator is left in an extended position while the golf cart control systems are turned off, the brake cannot be released manually. To resolve this, the golf cart control systems are set to automatically release the brake when placed in manual mode. The manual braking requirement created some small problems with the remote or automatic control modes. The stock golf cart has no mechanism to prevent the 21
Colorado School of Mines
Figure 3.4: Unmodified Golf Cart Throttle Sensor allows manual operation at any time. Unfortunately mimicking the sensor was not an easy task. The sensor itself es- sentially acts as a variable resistor which changes its resistance based on the position of the plunger. The difficulty arises from the fact that the sensor is not grounded but rather floats at some voltage above ground. Without access to the stock golf cart controller’s circuitry, or a schematic thereof, this behavior could not be reliably reproduced. Consequently to mimic the sensor, the throttle control circuit had to be electrically isolated from ground through an isolating transformer. Figure 3.5 shows the throttle control circuit, which is mounted underneath the seat near the golf cart controller. For a more detailed description of the throttle control circuit, please refer to [2]. 3.2 Hardware This section discusses the hardware required to mount or enclose the electrical components of the AMR, particularly sensors. In total, 24 sensors are mounted to the golf cart: fourteen ultrasonic range finders (sonars), four infrared range finders (IRs), four Hall effect encoders, one string potentiometer, and one brake switch. Detailed 23
Colorado School of Mines
Figure 3.8: Brake Switch enclosure that houses the Vehicle Controller, power supplies and distribution boards was carefully selected, modified, and mounted to the golf cart. The actuator control board, which provides the high-power drive circuitry and low-level feedback control for both actuators, was mounted in the front of the vehicle in a pre-existing storage compartment. The primary enclosure is a Bud Industries steel NEMA enclosure and was orig- inally selected to contain the Vehicle Controller (microcontroller board), actuator power supply, power distribution unit, and the Autonomous Controller (single board computer). Although the space was allocated, the single board computer was aban- donedinfavorofanetbookastheAutonomousControllerduetosoftwareissues. The enclosure is mounted using the golf bag rack on the golf cart (Figure 3.9). The bag rack has many pre-existing holes which may be tapped using a 1/4-20 tap. Simple mounting brackets were built to attach the primary enclosure and vibration dampers were used to reduce the shock loadings felt by the components mounted inside. A hole was cut on the bottom of the enclosure to allow cable routing and has an inset nylon brush grommet to help protect the enclosure from dust and debris. A hole was cut in the back of the enclosure to mount a cooling fan. The cooling requirements 27
Colorado School of Mines
The control electronics are organized such that lower-level functionality (e.g. com- municating with sensors) is handled by the Vehicle Controller which is a digital signal processing microcontroller from Microchip. The Vehicle Controller reads the sensor outputs and converts the raw electrical signals to integer values with appropriate units. For example, the sonars output an analog signal that the microcontroller con- verts to distance measurement in millimeters. The Vehicle Controller also handles communication with the actuator control board which drives the actuators. The actuator control board is a Roboteq AX3500 driver board that is capable of driving/controlling two actuators (Figure 3.10). The AX3500 implements a PID control loop and can accept a variety of position feedback signals. Both the brake actuator and the steering servomotor are controlled by this board. The servomotor uses an optical encoder for position feedback and the brake actuator uses an analog potentiometer for position feedback. The position setpoints are sent by the Au- tonomous Controller to the actuator control board via an RS-232 connection to the Vehicle Controller. Other than some low-level control functions, such as releasing the brake or calibrating steering, the Vehicle Controller simply relays brake and steering commands from the Autonomous Controller to the actuator controller. The Autonomous Controller is a netbook laptop running control software. The Autonomous Controller handles higher-level functions such as interpreting sensor sig- nals and guiding the robot through the environment. Additionally, the Autonomous Controller communicates to the other AMRs and the base station through the Rajant radiomeshnetwork. TheAutonomousControllercanreceiveandinterpretcommands from the base station that determine how the AMR should move to maintain radio signal strength. These operations are implemented using the high-level programming language Python. 33
Colorado School of Mines
3.4 Software Operation of the AMR requires a variety of software. There is software imple- mented on the base station which oversees and controls the mission objectives. The Autonomous Controller software communicates with the base station and determines the specific AMR control actions. Finally, there is firmware implemented on the Ve- hicle Controller which handles all the lower-level control functions of the AMR. The author did not contribute to the development of either the base station software or the microcontroller firmware, so neither will be discussed. The details of the base sta- tion software and microcontroller firmware may be found in [1] and [2], respectively. Initial development of the Autonomous Controller software was performed by Chris- ter Karlsson and Ken Anderson, but was completed by the author with contributions from Chris Meehan. The autonomous control software is implemented in the high-level programming languagePythonandmayberunfromaLinuxorWindowscomputer. Theuserinter- acts with the software through a custom graphical user interface (GUI), a screenshot of which is shown in Figure 3.13. Under Global Settings, the user must first select the communication port and perform a communication test to initiate a link with the Vehicle Controller. Currently, the communication is accomplished with a USB to serial adapter cable. If the Vehicle Controller is on and properly connected to the computer (Autonomous Controller), the communication test will connect to the Vehicle Controller and start passing data. Once the communication test is performed successfully the other GUI functionality becomes available. Most of the GUI’s screen real estate is used for monitoring sensor feedback and displaying status information. On the bottom edge of the window, a series of indica- tors display the AMR control mode, drive direction, and brake status. In the center of the window there are two graphing areas which can each plot data for one sensor. The graph source can be selected via the drop-down boxes under Global Settings, 34
Colorado School of Mines
communication method. Besides queues, flags are used to communicate the status of the threads. The flags are Boolean values and are primarily used to assist thread communication. For example, when the RC-Comm thread receives new data it checks the flags of the other threads to see if they are ready to receive more data. If the flag is cleared, RC-Comm puts data into the corresponding queue and sets the flag. When the receiving thread retrieves the data from the queue, it clears the flag to indicate it is ready for more data. In the case of the Rajant server, the control thread uses flags to indicate when it has completed the most recent command and is awaiting more commands. 3.5 Summary To summarize, the actuator assemblies allow manual, remote, and automatic con- troloperationofthevehicle. TheVehicleControllerhandlesalllow-leveltaskssuchas gathering sensor data, monitoring E-stops, and relaying information to/from the Au- tonomous Controller. The Autonomous Controller handles higher-level tasks such as communicating with the mesh network, guidance control, and user interface. Finally, the software defines the operation of both the Vehicle Controller and Autonomous Controller. With a basic understanding of the hardware, electronics, and software implemented on the AMR, we may now begin to discuss the guidance controller de- veloped on the AMR platform. 39
Colorado School of Mines
CHAPTER 4 PROOF-OF-CONCEPT TESTING The MineSENTRY team performed proof-of-concept testing at the Edgar mine in Idaho Springs, CO. For these tests, three simple guidance controllers were de- signed and implemented on the AMR’s Autonomous Controller with the intent of autonomously navigating a portion of the Edgar mine’s Army tunnel. While a fully functional guidance controller would be expected to control the speed, brake, and steering of the vehicle, these test controllers focused on controlling the AMR steering only. During the testing described in this chapter, the speed was set to a constant value (maintained by the Vehicle Controller); the MineSENTRY base station auto- matically commanded the AMR when and how far to move. The test controllers were: • A fuzzy logic controller designed to recognize key situations and react appro- priately. • Two basic wall-following controllers: – a center-drift wall-following controller designed to ignore side-passages (designated as Controller 1). – awall-followingcontrollerdesignedtoswitchbetweenleft,right,andcenter following (designated as Controller 2). Each guidance controller was tested within the hallways of CSM’s engineering building, Brown Hall, as well as the Edgar mine in Idaho Springs, CO. Detailed descriptions of the proof-of-concept testing, specifically regarding the radio signal strength results, may be found in [1]. The development, testing, and performance of the guidance controllers is detailed in the following text. 41
Colorado School of Mines
Figure 4.1: Brown Hall Test Path hallways. Because the infrared sensors are mounted in different locations this also required that the controller be trained with a new set of situations specifically for the IR range finders. Unfortunately, sensor data is unavailable for these tests because the Python control software was incomplete at this time. Despite the issues encountered, some successful results with this controller were obtained. While testing in the Brown building, the desired path for the robot was a straight line past a T-junction (Figure 4.1). After a few dry runs to tune the controller and adjust the threshold values for detecting passages, the controller successfully guided the robot past the T-junction to the opposite end of the hallway several times. However,itwasnotedthattheperformancearoundtheT-junctionwasnotcompletely reliable. Conversely, the performance in the straight sections of the hallway was excellent. Several test runs were conducted with the robot set initially to the right or left of the hallway or turned at angles from straight. In each instance, the robot successfully managed to navigate to the center of the hallway and straighten out. A significant amount of the controller tuning and adjustment was focused on obtaining the desired response at the T-junction. If the controller did not correctly identify the T-junction as a passage on the left, the robot would begin to turn left thendriveintotheoppositecorner. Even if thepassagewasdetected, therobotwould tend to veer to the left side and over-correct at the reappearance of the wall on the 44
Colorado School of Mines
Figure 4.2: Typical failures encountered while tuning fuzzy controller. left, or in some cases not correct at all (Figure 4.2). Once the controller was properly tuned, the performance near the T-junction became more reliable as long as the robot was nearly centered and driving straight. The tuned controller made several successful test runs, driving both East to West and vice versa, where the T-junction had almost no noticeable effect on the path of the robot. At this point, we determined that the fuzzy logic controller was ready for testing at the mine. 4.1.3 Experimental Results - Edgar mine OnMarch11, 2010theAMRwastransportedtoEdgarminetoperformtheproof- of-concept testing previously described. The fuzzy logic controller’s performance was mixed however and passage detection performed poorly. Even in the straight sections of the mine the controller would tend to veer to one side and the robot had to be stopped before impact. After debugging it was discovered that a few sonar sensors, including two of the 45◦ sonars important for passage detection, had been damaged in transport and were reporting fixed data readings (Figure 4.3). After discovering the damage to the sensors, the fuzzy-logic guidance controller was disabled. The proof- of-concept testing, of the base station and radio systems, continued with a human operator to steer; while the Autonomous Controller regulated the AMR’s speed as commanded by the base station. The MineSENTRY team returned to Edgar mine on April 2, 2010 for further test- 45
Colorado School of Mines
Sonar 2 Sonar 3 6 6 4 4 2 2 0 0 0 20 40 60 80 100120140160180 0 20 40 60 80 100120140160180 Time (sec) Time (sec) Sonar 5 Sonar 6 6 6 4 4 2 2 0 0 0 20 40 60 80 100120140160180 0 20 40 60 80 100120140160180 Time (sec) Time (sec) Figure 4.3: Plots showing sonars 3, 5, and 6 which were damaged during transport. Sonar 2 was working and is shown for comparison. The AMR was moving between 20-45 seconds and was stopped otherwise. The spikes seen in sonar 3’s data were due to communication errors that were resolved in later versions of the code. ing of the radio system. The failed sensors had been replaced and extra precautions were taken during transport to protect the AMR. Unfortunately, even with properly functioning sensors the controller was unable to navigate past side passages. Thus, theteststookplaceinastraightsectionoftheArmytunnelasindicatedinFigure4.4. The controller performance in the straight section of the mine mirrored the per- formance observed in Brown Hall. The AMR successfully followed the leader (a MineSENTRY team member with a Rajant radio) using radio signal strength (RSS) information relayed by the base station. The AMR repositioned five times during the test. While the AMR was stopped, the leader would reposition and the RSS signal strength information logged. The approximate path taken by the AMR as well as the sensor data are shown in Figure 4.5. The sensor data is split between the 45◦ sensors and the side facing sensors to compare the performance. Interestingly, the performance of the 45◦ sensors appear to be better than the side facing sensors in these tests, but the plot for the side facing sensors shows three sensors on either 46 )m( egnaR )m( egnaR )m( egnaR )m( egnaR
Colorado School of Mines
Figure 4.4: Testing area during the April 2, 2010 tests. The AMR traveled from right to left and stopped at the turn. side. The variation observed in the side facing sensors is due to calibration inaccu- racy and signal filtering, resulting in slightly different reported distances on the three side facing sensors. In later experiments the sonars were re-calibrated and electronic filtering added which improved the reliability of the sensors. Table 4.1 summarizes the observed performance of the fuzzy logic controller. The issues with the sonar sensors create difficulty assessing the performance of the fuzzy logic controller. The controller may perform better if tested with properly calibrated, functioning sensors. However, it was decided the results of the April 2 testing was clear enough to pursue other controller solutions. Table 4.1: Guidance Controllers Performance Summary Controller Summary Location Controller Performance Summary Brown Hall Fuzzy Logic Successfully navigated T-junction, but is sensitive to tuningparameters. Excellentperformanceinthehall- way. Edgar Mine Testing on Mar. 11, 2010, controller failed due to Fuzzy Logic broken sonar sensors. TestingonApr. 2,2010,controllercouldnotnavigate side passages, but performed well in straight sections. 47
Colorado School of Mines
fixed number of the previous sensor values, the buffer is updated based on the odome- ter data. The buffered values represent average sensor readings taken in increments of 0.2 meters, and a history is maintained for the last four meters. The buffer also stores values indicating if the robot was left, right, or center following at the time the value was buffered. When a passage is encountered, the buffer is searched to determine what the setpoint distances were while the robot was still center following. Furthermore, the distances are computed differently from Controller 1. Controller 2 uses the six sensors which point directly to each side of the robot. The distance to the left or right wall is computed by taking a separate weighted average of the sensors for each side. The weighting is determined by the magnitude of the sensor values; the smaller sensor readings are weighted heavier than the larger sensor readings. Originally, the sensor values were averaged, but this was modified during testing in BrownHall. Theweightingwasimplementedtoensurethatsensorreadingsindicating close proximity to the wall were not ignored when averaged with a larger reading (e.g. when the robot is angled toward the wall). 4.2.2 Experimental Results - Brown Building As with the fuzzy logic controller, both of these controllers were tested in the first- floor hallway of Brown Hall. The desired path and desired response were also the same: drivepasttheT-junctionwhilemaintainingthestraightestpathpossible. Both controllers were tuned separately to achieve this goal and both performed slightly differently within the hallway. Because these tests were used to design and tune the controllers in preparation for testing at the Edgar mine, no sensor data was logged for later analysis. However, Figure 4.6 shows the difference between the 45◦ and side- facing sensors utilized by Controller 1 and Controller 2, respectively. The sensor data was logged at a later date while driving the AMR through the hallway manually. Controller 1 tended to veer towards the left when passing the T-junction. After 50
Colorado School of Mines
Figure 4.6: Comparison of the 45◦ and side-facing sonar sensors’ readings while driving the AMR in Brown Hall. passing the T-junction, it often settled into a low amplitude steady-state oscillation while following the center of the hallway. The simple passage detection performed very well, but due to the aforementioned problems with the 45◦ sonars detecting the smooth walls the control was jittery (i.e. the steering jerked frequently). Conversely, Controller 2 tended to follow the right wall more closely when the wall on the left disappeared at the T-junction. After passing the T-junction, it tended to over-correct but settled into following the center of the hallway steadily. Due to the averaging of multiple sonars, as well as the more consistent performance of the side-facing sonars, the control response was smoother than Controller 1. 4.2.3 Experimental Results - Edgar mine Both of these controllers were tested on November 9, 2010 before the the main proof-of-concept testing with the intention of using the better performer in the fully autonomous tests. The proportional control of both wall-following controllers needed to be tuned for the mine. In each case, the proportional gain had to be reduced. However, the performance characteristics of these controllers seemed to switch in the 51
Colorado School of Mines
(a) Edgar mine Map (b) Controller 1 (c) Controller 2 Figure 4.7: Plots showing approximate AMR path and sensor readings while navi- gating passed the cross-cut. Only the sensor readings from the six side facing sensors are shown for clarity. mine. Controller 1, which showed steady-state oscillation in the Brown Hall hallway showed little to no oscillation in the mine tunnels. On the other hand, Controller 2 showed a fair amount of steady-state oscillation in the straighter portions of the mine tunnels. The performance of the controllers at the Y just after the cross-cut, the locations of which are shown in Figure 4.7(a), changed. The cross-cut was believed to be the most difficult location for the controllers to navigate. However, both controllers managed to successfully navigate past this location in testing (Figure 4.7). The Y further down actually proved to be more difficult for both controllers. Controller 1 never successfully passed the Y in the mine. Upon entering the widened area, the trajectory of the robot carried too far to the right where it encountered the corner of the Y. Controller 2 also tended to do the same thing, but after a number of adjustments managed to bear left enough 52
Colorado School of Mines
Figure 4.8: AMR navigating using Controller 1 in the tunnel after the Y (moving from right to left). Only the sensor readings from the six side-facing sensors are shown. to pick up on the right wall again and continued through the tunnel. Unfortunately after passing the cross-cut, Controller 2 would often begin oscillating at some distance down the tunnel and would have to be stopped before hitting the wall (Figure 4.8). It is important to note that during the proof-of-concept tests the base station would command the AMR to stop around the Y. This could have been detrimental to Controller 1, which used buffered sensor values to account for side passages. Because thebufferingwasonlybasedontime, thebufferwouldfillwithreadingsfromthesame location. This problem should not have affected Controller 2 which buffered previous sensor values based on the distance traveled as opposed to time. Controller 2 had one successful navigation past both the cross-cut and the Y as shown in Figure 4.9. Unfortunately the radio signal strength information received from the base station was incorrectly calibrated for this test run. This caused the AMR to move in small increments of approximately 10 ft; thus, this particular test run was stopped short so adjustments could be made at the base station. 53
Colorado School of Mines
Figure 4.9: AMR successfully navigating past the cross-cut and the Y in the Army Tunnel. Despite the difficulties encountered with these controllers, a number of successful proof-of-concept tests were completed. Due to the difficulty of resetting the Bobcat leader for each test and the controller’s unreliable performance near the Y, the proof- of-concept test was divided into two parts. In the first part, the AMR started near the base station while the Bobcat was driven further down the Army tunnel. The AMR was unmanned and autonomously adjusted to maintain radio signal strength between the Bobcat and the base station. Once the AMR reached the Y, it was manually repositioned past the Y and the experiment continued. If the controller had proved capable of autonomously navigating past the Y consistently then no human intervention would be necessary for the entire duration of the test. Table 4.2 provides a summary of the performance for each of the tested guidance controllers. 4.3 Sonars in the Mine The performance of the ultrasonic range-finding sensors (sonars) within a mining environment is very important to consider while developing a controller for the AMR. 54
Colorado School of Mines
Table 4.2: Tested Guidance Controllers Performance Summary Controller Summary Location Controller Performance Summary Brown Hall Fuzzy Logic Successfully navigated T-junction, but is sensitive to tuningparameters. Excellentperformanceinthehall- way. Controller 1 Successfully navigated T-junction, but had steady state oscillation in the hallway. Controller 2 SuccessfullynavigatedT-junction,nosteadystateos- cillation in the hallway. Edgar Mine Testing on Mar. 11, 2010, controller failed due to Fuzzy Logic broken sonar sensors. TestingonApr. 2,2010,controllercouldnotnavigate side passages, but performed well in straight sections. Controller 1 No issues with cross-cut, but could not navigate passed Y afterwards. No steady state oscillation ob- served in straight tunnel sections. Controller 2 No issues with cross-cut, successfully navigated passed Y once. Steady state oscillations in straight sections required human intervention to prevent crashing. The data gathered during the tests on April 2 and November 9 of 2010 reveal some potential issues that should be addressed in future development of the MineSENTRY robotic system. Consider Figure 4.10 which shows the approximate path and sensor data for one of the November 9th tests. The sonars’ results have been separated for clarity and comparison. The plots for the 45◦ sonars indicate that, similarly to the results ob- tained in Brown Hall, the incident angle may cause a large variation in the reported distance. This result was unexpected because the walls within Edgar mine are far from smooth. The rock walls of the Edgar mine are ragged and broken and deviations from average wall position easily exceed 1 ft (≈ 300 mm). However, these errors only appear in the forward facing sensors (sonars 5 and 6) while the rear facing sensors (sonars 11 and 12) are actually quite stable (refer to Figure 4.11). The distances re- ported by the front sonars, especially in the region −40 m ≤ x ≤ 0 m, report distance 55
Colorado School of Mines
Figure 4.11: 45◦ angled sonar sensor plots for Nov. 9th Edgar mine test. readings up to three meters above the average value. The systematic positive error seems to indicate that the ultrasonic sound wave is not being reflected back to the sensor reliably. However, because the angled sensor in the rear are reporting reliably, electric noise on the sensor cables could also be the cause. The results of the side-facing sensors are far more reliable and, with some excep- tions, perfectly acceptable considering the variation in the mine walls being sensed. Please note that the readings on the far left side of the plot may have captured Mi- neSENTRY teams members at the end of the test. The readings for the right side of the robot (top, blue) have very little noise and in most regions all three sonars (4, 8, and 14) fall within an approximatley 0.5 meter range or less. These results are acceptable considering the natural variation of the mine wall is of the same order of magnitude. As shown in Figure 4.12, the right facing sonars produce very consis- tent readings with occasional spikes on the order of 1-2 m. These spikes are most likely caused by electrical noise and may be easily eliminated with software filtering. Unfortunately, the dsPIC microcontroller only samples the sonar analog output once per sonar update, thus increasing the susceptibility to electrical noise despite the low 57
Colorado School of Mines
Figure 4.12: Right side sonar sensor plots for Nov. 9th Edgar mine test. pass RC filters on the signal lines. The results for the left facing sonars (2, 10, and 13) are similar (Figure 4.13) except for the large amount of noise observed on sonar 10. The tendency for sonar 10 to return lower values is most likely due to the sensor being pointed at a slight downward angle. The MaxBotix LV-MaxSonar(cid:13)R-EZ3 sensors’ feature a beam pattern that can detect objects within a ≈ 40 cm radius of the sensors center line. Thus a slight downward angle may allow the sensor to detect rocks on the tunnel floor or the tunnel floor itself. Furthermore, the tunnel cross section is somewhat rounded and in many locations the width of the tunnel is narrower near the floor. It is expected that a simple mechanical adjustment could greatly improve the reliability of sonar 10’s readings. If this is the case, the variation in the left facing sonars are acceptable as well. Theforwardandrearfacingsonarspresentsomeproblems. Formostofthetesting the forward facing sonars (sonars 1 and 3) read a full 6 meters, but the rear facing sonars (7 and 9) were highly noisy (Figure 4.14). Although electrical noise may be present, the primary cause for the noisy readings is due to the sensing pattern for the 58
Colorado School of Mines
Figure 4.13: Left side sonar sensor plots for Nov. 9th Edgar mine test. forward/rear facing sensors. The original design intent was to use the forward and rear facing sensors for collision avoidance (i.e. to allow the vehicle to detect an object in its path). To fulfill this requirement, sonars with a wider sensing pattern were selected that could detect any object across the width of the AMR. Unfortunately, the sensors selected have too broad a sensing pattern (≈ 1 m radius from sensor center line) and often detect the floor or nearby walls. Tests within the hallways of Brown Hall indicated the front/rear facing sensors could detect door frames or even fire alarms on the walls. It would be beneficial to replace these sonars with the same model used for the side-facing sonars and, if needed, use one broad range sonar on the front and back of the vehicle for collision detection. 4.4 Summary TofullytesttheconceptssetforthbytheMineSENTRYresearchproject,guidance controllers for the AMR were designed and implemented. Although the controllers operated as intended within building hallways, the controllers performed inconsis- tently within Edgar mine’s rough, unordered tunnels. To a degree, each of the three 59
Colorado School of Mines
CHAPTER 5 PROPOSED CONTROLLER The unreliable performance of the guidance controllers presented in Chapter 4 proved that a simple guidance controller is not sufficient for successful AMR nav- igation. A more reliable controller able to navigate the more complex areas of the mine is necessary. However, the simple wall-following controllers’ successes within the straight sections of the mine should not be ignored. The guidance controller proposed in this chapter extends the wall-following approach of the Chapter 4 controllers and provides a unique approach to the navigation discussed in Chapter 2. 5.1 Controller Approach This chapter describes the development of a guidance (or path-tracking) controller that does not require highly accurate map data. Since active mines are typically documented with structurally detailed survey maps, a controller of this type would be very useful for quick deployment in an emergency situation. The controller proposed in this chapter attempts to address these requirements with a unique approach to the path-tracking problem. Recent research focused on mobile robot navigation typically relies on an abun- dance of sensor data to perform mapping and localization (SLAM). With accurate mapandlocalizationdata,therobotcanplanapaththroughtwoorthree-dimensional space and follow that path using a path-tracking controller. In Probabilistic Robotics, localization is described as the process of referencing the robot’s position with respect to an external reference frame [14]. This is the primary difference between current techniquesandthepathtrackingcontrollerpresentedinthischapter. Tobemorepre- cise, rather than referencing the map, path, and robot to a common reference frame, the path and robot position are referenced directly to the environment in which it is 61
Colorado School of Mines
Figure 5.1: Example of the variable resolution path sampling for a path around a simple right turn. the environment. The purpose of the cost function is to eliminate path samples that are indistinguishable from their nearest neighbors. In regions where the features are unchanging (e.g. a long tunnel) only one path sample is required to accurately describe that region. The design of the cost function necessarily depends on the sensors, robot, and the intended operating environment. The reduced set of path samples form a list of setpoints—so termed because they are the sensor range values the controller is attempting to achieve. To be clear, setpoints are path samples that are used to describe the path, whereas any individual path sample may or may not be used. 5.2 Structured Approach Using Singular Value Decomposition To utilize the structure of the environment for control purposes, a relationship between the sensor reading, the environment, and the robot’s motion is necessary. Consider Figure 5.2, in which the robot is following a predefined path and has not deviated from the path. The robot’s distance to the wall is defined as d and the w orientation of the wall is given by φ. To determine the sensor reading, as explained above, it is useful to place a coordinate system (reference frame) on the sensor with the y-axis aligned with the sensing direction. This coordinate system is referred to 63
Colorado School of Mines
y s Wall x s x w y r y w x r d w Figure 5.3: Reference frame placement for the robot, sensor, and wall. To apply this to the case shown in Figure 5.2 a reference frame is placed on the wall, the robot, and the sensor (Figure 5.3). It is important to note that all the parameters given in Figure 5.2 are measured with respect to the robot’s reference frame; therefore, it is convenient to find all the transformation matrices for mapping to the robot reference frame and then use (5.3) to reverse the mapping. Thus we have: ST = ST R T (5.5) W R W To represent the wall in the sensor’s FOR, both a point and direction are required. Although the point used is arbitrary, it is convenient to use the origin of the wall’s reference frame which is obtained using (5.6).     x 0 y = S T 0 (5.6) W 1 1 The direction is determined by using the rotation matrix S R. Because the x-axis W of the wall’s FOR lies parallel to the wall, the direction of the wall (as measured in the sensor’s FOR) is found by: (cid:20) (cid:21) (cid:20) (cid:21) n 1 x,w = S R (5.7) n W 0 y,w 65
Colorado School of Mines
sensor’s FOR is only dependent on the mounting position and orientation of the sensor. The sensor reading when the robot deviates from the path is then: d −s cos(δθ−φ)−δxcos(φ)+s sin(δθ−φ)−δysin(φ) w x y S = (5.10) dM cos(β +δθ−φ) Now we must consider how this information is used to generate control outputs. Following the approach outlined in Section 5.1, it is desired that the controller utilize control setpoints, where each control setpoint is a list of the expected sensor values. One possible approach is to use the difference between the expected, S , and mea- dE sured, S , sensor reading to determine the robot’s deviation from the defined path. dM Taking the difference between the expected and measured sensor reading yields: c = cos(β)+cos(β −2φ) a c = sin(β)−sin(β −2φ) b c = 2(s sin(β)−s cos(β)−d sin(β −φ)) c x y w c = 2d cos(β −φ) d w c = 1+cos(2(β −φ)) f c = sin(2(β −φ)) g c δx+c δy +c sin(δθ)+c cos(δθ)−c a b c d d S −S = (5.11) dM dE c sin(δθ)−c cos(δθ) g f At this point some interesting structure is noticeable. The coefficients c are de- pendent on two things: sensor configuration and the path/environment description. Now consider that S − S is equivalent to a standard control error signal (with dM dE opposite sign). The setpoint contains the expected sensor reading, S , when the dE robot follows the planned path. The measured sensor reading, S , are the sensor dM readings measured by the robot taken at some point which may or may not be on the planned path. By setting S −S = e and rearranging (5.11) the following is dM dE obtained: c δx+c δy +(c −c e)sin(δθ)+(c +c e)cos(δθ) = c (5.12) a b c g d f d 67
Colorado School of Mines
The equation is formatted to better show the structure. Provided the path/envi- ronment data is determined from map data, the only unknowns in the equation are δx, δy, and δθ. Given that this equation is only for one sensor, it is apparent that at least three sensors are necessary to resolve all the unknowns. However, this is not necessarily a complete description as more than one wall is required for all three variables to be solved. If only one wall is available only two variables can be com- puted, δθ and either δx or δy. Often only δx will be determinant because the path is typically parallel or near parallel to the wall (when only one wall or two parallel walls are available). Note that these equations represent a wall as an infinite line, so any bend or corner is minimally represented as two or more ‘walls’ within the equations. Most frequently the robot will have more than two range-finding sensors and operate within environments with at least two distinct walls. Thus, there is almost always enough information to solve for these three unknowns. To solve for these unknowns using all available sensor data, (5.12) is written for each sensor. The corresponding system of equations may be presented in matrix form as A(cid:48)x(cid:126)(cid:48) = b(cid:126)(cid:48): A(cid:48) x(cid:126)(cid:48) = b(cid:126)(cid:48)     c a,1 c b,1 c h,1(e 2) c i,2(e 2)  δx  c d,1 c a,2 c b,2 c h,2(e 2) c i,2(e 2)  δy  c d,2  . . . .    =  .  (5.13)  . . . . . . . .  sin(δθ)  . .      c c c (e ) c (e ) cos(δθ) c a,n b,n h,n n i,n n d,n c (e) = c −c e h c g c (e) = c +c e i d f noting that the number of sensors, n, must meet the requirement n ≥ 2. Methods for computing the minimum least squares solution for problems of this type are well known; however, this problem has non-linear constraints on the solution imposed by cos(δθ) and sin(δθ). Rather than solve the non-linear problem, a straight forward 68
Colorado School of Mines
5.3 Algorithm Application The equations developed in Section 5.2 are a mathematical description of the rela- tionship between the sensor readings, robot pose (i.e. position and orientation), and the environment with some simplifying assumptions. The equations were developed with the intention of determining the pose of the robot, directly relative to the desired location within the environment. Thus the following text will focus on applying these equations to determine the robot’s pose and the efficacy of these methods for control purposes. 5.3.1 Data Sources Using equations presented in Section 5.2 to determine the robot’s pose requires several data sources for each sensor: the sensor parameters (s , s , and β), the en- x y vironment data (d and φ), the expected sensor reading (S ), and the measured w dE sensor reading (S ). The sensor parameters are static for the AMR because each dM sonar is mounted in a fixed position and direction which is common for many mobile robots. The variables describing the environment, d and φ, can be calculated from w setpoint, sensor, or map data. The expected sensor reading, S , is stored in the dE setpoint. Finally, the measured sensor reading, S , is provided by the AMR while dM it is navigating and sensing the environment. Of these data sources, it is prudent to further discuss the environment variables due to the varied approaches to determining their values. Environment Data Thevariablesusedtodescribeeachwalltherobotsenses,d andφ,arenotdirectly w observable nor is there any easy methods to measure them. As previously mentioned, these values can be determined either from setpoint, sensor, or map data. Accord- 70
Colorado School of Mines
estimate/measurement of φ. By using live sensor data to compute φ we can elimi- nate errors caused by discrepancies between the map and environment. The errors in measuring φ from real-time sensor data is easier to quantify than the errors incurred from the map. Lastly, d and φ can be generated directly from the map data. In early versions w of the code, only the sensor data was determined from the map; but computing the d and φ using the calcdwphi function is a rather indirect means of using the map to w determine the wall information. Thus the path sampling code also generates the val- ues for d and φ and saves them with the setpoint information. As with the estimates w obtained from expected sensor values, this approach is susceptible to differences be- tween the map and actual environment. Position Estimation AsdescribedinSection5.2, theangleδθ issampledbeforecomputingthedisplace- ment values δx and δy with least squares minimization. How this angle is determined is very important, because it can have a large effect on the accuracy of the position estimate. In general, two techniques were considered for determining the angle. The first technique is to sample a range of angles and uses the angle which yields the smallest (cid:96) norm (5.16). Because sampling δθ requires the minimization problem to 2 be solved multiple times, this technique requires significantly more processing power. To reduce the processing time required, the second technique determines δθ di- rectly by comparing the φ values produced by the expected sensor readings (setpoint) with the values obtained using real-time sensor readings. This is done by using the calcdwphi function on both the expected and live sensor data. The result is two φ estimates for each ‘wall’ the sensors see, one referenced from the desired position and one from the robot’s current position. An estimate of δθ is obtained by subtracting the observed (current) φ from the desired φ values and averaging the results. 72
Colorado School of Mines
Once an estimate of the robot’s pose (δx, δy, δθ) is known, a pose controller is implemented to correct for the position error. The pose controller may be any controller of suitable type (e.g. PID, fuzzy logic, et cetera). It is worth mentioning that, from the perspective of the pose controller, the variables δx and δθ are the error signals. The pose controller adjusts the robot’s speed and steering to drive these error signals to zero. At this point it seems that the algorithm presented in Section 5.2 is a type of localization algorithm, and in many ways it is similar. But unlike localization algorithms, the robot’s position, the map, and the path are not referenced to a common coordinate system. This algorithm localizes the robot directly with respect to the desired path, which is itself referenced to the environment (or walls) via the expected sensor readings. Thus this algorithm is a generalized wall- following algorithm where the desired sensor values are provided, in a similar manner to the wall-following controllers described in Chapter 4. Unlike those controllers, the proposed algorithm does not distinguish between left, right, and center-following techniques. 5.3.2 Algorithm Implementations The different methods for calculating the environment variables and robot ori- entation were developed while coding and testing the algorithm. For example, the slow computation time associated with sampling the robot’s orientation compelled the author to find a better means of determining δθ. This search resulted in the φ comparison technique, which utilizes the calcdwphi function. When the speed of the (cid:126) (cid:126) codeimprovedremarkably, theauthorconsideredusingthed andφ(thevectornota- w tion denotes the d and φ for all range-finding sensors) computed from the live sensor w data instead of the map generated values. Thus, several different implementations of the algorithm were tested with different results. Three primary implementations of the algorithm were tested in depth and are described herein. 73
Colorado School of Mines
Figure 5.8: Simple turn simulation used for baseline comparisons. the desired path. The pose controller used in each simulation uses a proportional- integral-derivative (PID) controller which closes the loop around the angular (δθ) and displacement (δx and δy) errors estimated by the algorithm. The pose controller was initially tuned using the ‘true’ errors computed by the simulator. A proportional controller reduces the simulated robot’s speed when large errors occur and completes the pose controller. Because the estimated δθ affects the estimates of both δx and δy, the different methods for determining δθ should be carefully analyzed. 5.4.1 Angle Estimation Thereweretwomethodstestedforestimatingtheangleerror,δθ. Thefirstmethod (cid:126) samples different angles to determine which best minimizes ||A(cid:126)x−b|| . The second 2 (cid:126) (cid:126) method compares φ and φ computed with the calcdwphi function. Figure 5.8 E M shows the simulation used for the baseline comparison and Figure 5.9 shows the angle estimated for the sampling and φ comparison methods, respectively. From the graphs it can be seen that the φ comparison method produces more accurate δθ estimates for the simulation shown. In contrast, the sampling method underestimates the initial large displacement until the robot is within 15◦ of the desired orientation. Within a range of ±15◦ degrees the sampling method yields 77
Colorado School of Mines
Sampling Based δθ Estimation 0.8 Actual δθ 0.6 Estimated δθ 0.4 b 0.2 a 0.0 0.2 c 0.4 0.6 0 5 10 15 20 Time (sec) Theta Sampling at (a) Theta Sampling at (b) Theta Sampling at (c) 16 14 25 14 12 20 12 10 8 15 10 6 10 8 4 6 2 5 4 0 0 100 50 0 50 100 100 50 0 50 100 100 50 0 50 100 Angle (degrees) Angle (degrees) Angle (degrees) Figure 5.10: Least squares minimization results shown at different locations. reasonable results except for three large spikes. These spikes in δθ estimates coincide with changes in sensor readings going in or out of saturation; in this case, the front sensors pointing east and northeast (assuming the front of the robot is north). In order to better understand why the theta sampling method yields these results, a closer look at the least squares minimization at the sampled angles is beneficial. As shown in Figure 5.10, the results of the LS minimization at each point provide (cid:126) a great deal of insight. At point a, the minimization of ||A(cid:126)x−b|| is more sensitive to 2 angles in the direction of the offset. This is likely due to the increase of the incident angle for the majority of the sensors. It is also notable that the minimum is not definitive, the cusp of the graph is much wider than the better estimation shown at point b. 79 )m( b xA 2|| − || )snaidar( elgnA )m( b xA 2|| − || )m( b xA 2|| − ||
Colorado School of Mines
Theminimizationplotforpointb isdistinctandthesensitivityoftheminimization is nearly equal across the range of angles. It has been observed that the sensitivity of the plot on either side of the minimum is related to the sign of the minimum angle. As the minimum angle changes, the v-shape of the graph tilts. Thus when the minimum angle is positive, the minimization graph becomes less sensitive to angular changes in the negative direction and more sensitive to angles in the positive direction. However, this does not necessarily hold true in environments with more complex geometry. The minimization plot at point c has two nearly equivalent minimums. The appropriate theta estimate should be approximately zero degrees, and it should be noted that the minimums appear to straddle this value. The minimization graphs at these spikes all have multiple minimum values, and although there is typically a distinct global minimum the theta estimate is poor regardless. These results indicate that the solution with the lowest (cid:96) norm, with respect to the orientation, δθ, is not 2 necessarily the best solution. On the other hand, the φ comparison method uses a weighted average which is focused on reducing the effect of extreme δθ estimates. A non-weighted average causes the δθ estimation to be sensitive to changes in sensor readings that result from objects entering or exiting the sensor’s range. For example, Figure 5.11 shows the δθ estimation results when direct averaging is used. As shown in Figure 5.11, as the vehicle turns to the correct heading, the wall on the left abruptly enters the range of sonar 5 (refer to Figure 5.12 for sonar positions). Shortly thereafter, the wall on the right exits sonar 3’s range. Between these events, a non-existent wall is assumed to be between these two sensors. This results in an extreme φ estimates which skews the δθ average. The other eight sensors, however, M detect existing walls that yield coinciding angular estimates. By weighting the angle estimates appropriately the δθ estimate is improved over direct averaging. Now that the performance of the two δθ estimation methods has been discussed, a 80
Colorado School of Mines
S S S 3 1 S 5 6 S S 2 4 S S 13 14 S S 10 8 S S 11 12 S S 7 9 Figure 5.12: Approximate Sonar Positions on the AMR close look at the computation of δx and δy is required to further explain the proposed controller’s process. 5.4.2 Estimating Translation A path-tracking controller cannot function without knowledge of the translational distance to the desired path. As defined in Section 5.2, the perpendicular distance to the desired path is expressed as δx and the distance traveled along the path (with respecttoapathsample)isrepresentedasδy. Aninherentproblemexistswhiletrying to estimate δy within a tunnel environment which is known as the ‘infinite hallway’ problem. As viewed by the range-finding sensors, there are few if any distinct features which can be used to determine progress along the path (δy). Because every point along the hallway (tunnel) appears the same to the sensors, they are not sufficient to determinedistancealongthepath. Duetothisproblem, manylocalizationalgorithms depend heavily on dead-reckoning methods in these regions. An inherent feature of the algorithm presented in this chapter is its ability to quantify the reliability of the δy estimate. 82
Colorado School of Mines
TheSVDdecompositionofmatrixAyieldsthesingularitymatrixΣ, whichinthis case is a 2x2 diagonal matrix containing the singular values of A. These two values indicate how close the solution of equation 5.16 is to a singularity. Furthermore, each of these singular values relates to how sensitive the solution is to errors within the (cid:126) vector b. Finally, the matrix V indicates how sensitive the estimates of δx and δy are to σ and σ respectively. The closer σ or σ is to zero, the closer the solution is to 1 2 1 2 a singularity. For example, if the robot is traveling straight down an infinite hallway, the matrices V and Σ will appear as: (cid:20) (cid:21) (cid:20) (cid:21) −1 0 σ 0 V = , Σ = 1 (5.18) 0 1 0 σ ≈ 0 2 where σ is a positive non-zero number. However, because the matrix V is a diagonal 1 matrix for this situation, the solution for δx is independent of σ , and thus decoupled 2 from the solution to δy, which is indeterminate (infinite solutions). The least squares solution is determined by replacing the 1/σ place within Σ† with zero and only 2 solving for δx. By using the values within Σ and V, the ability of the algorithm to yield stable estimates of δx and δy can be determined. Due to the intended use of the algorithm for control within mine tunnels, only the value for δx will typically be determinant. Figure 5.13 shows the δx estimation corresponding to the δθ estimation shown in Figure 5.9(a). In this example, δθ is estimated by sampling. The initial error of approximately 200 mm is caused by the sampling method’s underestimation of δθ initially. The first and last ‘spikes’ in the δx estimate are caused by the δθ estimate spikesatapproximately12secand18sec,respectively. Thesmallerrorspikesbetween 12 sec and 18 sec are expected to be caused by a variety of error sources which will be discussed in Section 5.4.3. The primary δx estimation errors incurred using Method 1 are due to errors in estimatingδθ; however, accurateδθ estimatesdonotguaranteeaccurateδxestimates. 83
Colorado School of Mines
Error in δx Estimation 300 200 100 0 100 200 300 0 5 10 15 20 Time (sec) Error in δθ Estimation 0.8 0.6 0.4 0.2 0.0 0.2 0.4 0.6 0 5 10 15 20 Time (sec) Figure 5.13: δx Estimation Error using Method 1 Method 2 produces the δx estimate shown in Figure 5.14. Although the δθ estimate error is approximately zero for the first 12 seconds, the δx estimate varies between ±0.15 meters in the first four seconds. Initially the algorithm estimates the vehicle is 0.1 meters right of the desired position, this indicates a bias towards the sensors aiming towards the left of the vehicle, which are currently reporting larger distances on average due to the vehicle pose. This behavior only occurs if the error in the robot’s pose has an angular component. If the robot is displaced ±1 meter to the right or to the left of desired, the δx estimate will be correct until the robot incurs an angular displacement while trying to get back on path. The abrupt changes in the error from positive to negative correspond to two of the sensors exiting saturation (indicating a wall entered the sensors’ range). The first change corresponds to sensor 12 exiting saturation. This results in an imbalance between left/right facing sensors being used by the algorithm, with one more right facing sensor than the left. The algorithm’s bias shifts to the right facing sensors until sensor 5 exits saturation. Method 3 utilizes the real-time sensor data to determine the values of d and φ. w 84 )mm( rorrE )snaidar( rorrE
Colorado School of Mines
Error in δx Estimation 400 300 200 100 0 100 200 0 5 10 15 20 Time (sec) Error in δθ Estimation 0.2 0.1 0.0 0.1 0.2 0 5 10 15 20 Time (sec) Figure 5.14: δx Estimation Error using Method 2 Thus, the robot estimates the structure from its current position then determines the best action to drive the sensor readings towards the desired values (based upon the map). Figure 5.15 shows the δx and δθ estimation error using this method in the simple turn simulation. It is interesting to note that results of Method 3 do appear better than the first twomethods. Theinitialerrorisless, brieflyapproaching−0.15metersinthehallway before the turn, and limited to a maximum of -0.25 meters during the turn. There is a great deal of similarity in the δx estimate plots between Method 2 and 3; however, the corresponding errors are attenuated using Method 3. As mentioned in Section 5.3, the output of Method 3 must be adjusted using (5.17) which incorporates both δx and δy. It may seem unusual to incorporate δy in the calculation, because it was indeterminate using the first two methods within the straight hallway section. One might expect that the attenuation is due to δy being estimated as zero, resulting in a loss of information. However in Method 3, V takes the form: 85 )mm( rorrE )snaidar( rorrE
Colorado School of Mines
Sonar 4 6 5 4 3 2 1 0 0 5 10 15 20 Time (sec) Sonar 14 6 5 4 3 2 1 0 0 5 10 15 20 Time (sec) Figure 5.16: Simulated sensor readings for sonar 4 and 14 in the simple turn simula- tion. 5.4.3 Error Sources As was previously mentioned, there are a number of small estimation errors that occur near the turn. This is because the algorithm was defined assuming straight line paths and walls. Because the path around the turn is an arc, it must be approximated by a greater number of path samples. The ‘true’ angular error computed by the simulator is defined against the setpoint being used rather than the actual path. This is why the plots are not continuous functions as one would expect—when the setpoint changes the desired angle jumps. Another problem arises because the sensor values change drastically within this region due to the low sampling rate. Figure 5.16, shows the sensor values for sensors 4 and 14 (both facing right). Dur- ing the turn the incident angle between these sensors and the wall changes quickly resulting in large changes in the distance seen by the sensor. The simulation ac- curately reflects the update rate and order of the ultrasonic sensors. New sensor readings are taken every 50 ms with each sensor updating once every 200 ms. At any one update, the algorithm is using anywhere between 10-12 old and 2-4 updated 87 )m( egnaR )m( egnaR
Colorado School of Mines
sensor values. As seen in Figure 5.16, some of the sensor readings change as much as 1 meter between updates and regularly change as much as 0.1-0.2 meters while the robot is turning (between 12-15 seconds). Considering the errors within the sensor readings used by the algorithm, the error in the δx estimation, while still undesirable, is not unreasonable. Although each Method presented produced different estimation results, each was able to successfully navigate the turn utilizing the pose controller described in Sec- tion 5.4. The simple turn simulation was chosen specifically to display some of the differences between Methods, but was not the only environment/path simulated. Ap- pendix C.4 shows other environments used while developing the proposed controller. In all of these simulations, the path was first sampled and specific path samples were selected to be used as setpoints. How these setpoints are selected including the effect on the performance of the proposed controller is an important factor that must be addressed before a complete implementation can be achieved. 5.4.4 Setpoint Frequency The Methods presented above have been compared using the accuracy of the δx and δθ estimation within simulation. Because the ultimate goal of the algorithm is to provide path-tracking data, it could be described as a type of feedback filter within the control loop. Because a wide variety of control algorithms (e.g. PID, fuzzy logic, et cetera) could be employed, the focus thus far has been to generate accurate feedback data. However, all of the experiments thus far assume the algorithm is being given the correct setpoints that define the path it is tracking—the role of the localization algorithm. If the algorithm requires frequent and accurate setpoints to perform, accurate localization becomes the primary barrier to implementation. If the algorithm can perform with infrequent or inaccurate setpoints, the requirements of a localization algorithm are greatly reduced. 88
Colorado School of Mines
Consider Figure 5.17 which compares the robot’s simulated path with three differ- ent setpoints, each using the Method 2. The simulations in the first column use the same number of setpoints as the previous simulations (n=19), the second shows n=7 setpoints, and the last shows n=1 setpoints (the robot is never provided the second setpointshown). Interestinglytherobotinitiallyfails tonavigatethe turnusingseven setpoints, but succeeds using only one setpoint. Figure 5.17(g) and Figure 5.17(h) in the first two columns shows the same simulation with a slight modification: when the robot reaches the turn, the algorithm is fed the next setpoint rather than the current setpoint. By providing the robot some look-ahead information, the overshoot is nearly eliminated in both the n=19 and n=7 simulations. There is little difference between the path taken between the two simulations; however, the accuracy of the δx and δθ estimations in the n=7 simulation suffers. This reflects the sparse setpoints’ inaccurate representation of the environment. The pose estimation for the n=1 simu- lation is almost useless, only the region before and after the turn are accurate because only these regions match the setpoint used. But, the ability to navigate the turn with only one setpoint suggests the possibility to navigate with very infrequent setpoints. Lastly consider Figure 5.18, which shows two simulations of a much more complex environment: a hallway on the first level of the Brown Hall building on the Colorado School of Mines campus. The first simulation uses a total of 89 setpoints and the second simulation uses 16 setpoints (with look-ahead at the turn). In both cases the robot successfully navigated the environment. In each case the robot will barely clip the opposing wall at the turn due to overshoot, but the principle cause in this case is the path and environment. The hallway itself is small compared to the AMR, and the defined path leaves little room for error in either defining or following the path. From these simulations it is clear that the algorithm can be tolerant to sparse, and thus often inaccurate, setpoints if some adjustments are made to provide look- ahead information in particular regions. The ability to navigate with sparse setpoints 89
Colorado School of Mines
benefits the MineSENTRY project. The lower the setpoint frequency, the smaller the burden on the localization algorithm. Consequently, the map detail and computing power required is also reduced. Lower-detail maps will be easier to update on-the-fly which is likely to be necessary in a mine disaster situation. Furthermore, reduced computing power allows the use of smaller, low-wattage processing technology. The benefits of this are not immediately apparent unless the logistics of the MineSEN- TRY system are considered. The deeper communications are extended into the mine the greater the number of AMRs required. It would be difficult to transport and launch a large number of golf-cart-sized robots. However, smaller robots can carry less on-board power which also limits available processing power. The extent to which the proposed algorithm can fulfill these statements will largely depend on the per- formance of a full implementation. For example, the effect the setpoints have on the performance of the simulated algorithm/controller requires further investigation. An improved cost function for choosing setpoints could greatly improve the performance of the proposed algorithm, but will require far more testing and analysis beyond the scope of this thesis. 5.5 Summary The algorithm presented is a unique approach to the path-tracking control prob- lem due to the unique combination of the environment, path, and sensor information into a single equation. The solution to this equation provides the tracking infor- mation necessary for the robot to follow the path within a mine environment. Un- like the guidance controllers of Chapter 4, the proposed algorithm is a generalized wall-following approach that does not specifically distinguish between left, right, and center-following techniques. Several methods of implementing the proposed algorithm were tested in simula- tion. The results indicate that the algorithm can provide accurate pose estimation 92
Colorado School of Mines
CHAPTER 6 CONCLUSIONS The MineSENTRY research project set out to develop a multi-robot system that solves the problems associated with wireless communication in mining environments. To create this system, a single Autonomous Mobile Relay was created using a golf cart as the vehicle platform. AMR construction required a number of subsystems to be designed, built, and tested. Proof-of-concept testing, conducted at the Colorado School of Mines’ Edgar mine, confirmed the effectiveness of the MineSENTRY design, but the AMR guidance controllers were lacking. A unique controller was developed as a proposed solution to the guidance problem. The controller was tested using a variety of simulations. Although the simulations yield promising results, further development is necessary before the controller can be implemented on the AMR. 6.1 Recommendations for Future Work With respect to the AMR robotic platform detailed in Chapter 3, the modified golf cart performed admirably well as a test platform. The primary recommendations for improving the AMR system are itemized below: • Improve protection from the environment – Cover steering servo system. – Paint/cover steel components. – Seal electronic/sensor enclosures. • Improve actuator assemblies – Add easily accessible lever for steering disconnect. – Replace brake actuator with higher power unit. 95
Colorado School of Mines
• Improve sonar reliability. As shown in Chapter 4, the sonars can provide very reliable data within the mine. It is expected rather simple adjustments could be made to greatly improve reliability. The controller proposed in Chapter 5 requires some work before a full implemen- tation can be realized. However, relatively little work is required before live exper- imentation can begin. It is recommended that future work focus on the following topics: • Improving the pose estimation during turns. • Improving sensor-based calculations for d and φ (calcdwphi function). w • Analyze the effect of setpoint frequency and an associated method for choosing setpoints. • Developing a method to choose setpoint during navigation. • Testing how poor map data affects controller. In particular, a means of choosing the correct setpoint is necessary for any large- scale experiments. Small-scale experiments could be performed nearly immediately for single setpoint paths, although some code alteration would be required before the controller could be used outside of the simulator. As a final recommendation, efforts to streamline and optimize the AMR control software would be very beneficial. 6.2 Implications of Research The controller proposed in Chapter 5 has potential to provide mobile robot nav- igation at a lower cost. By incorporating the environment structure into the con- troller the need for accurate localization is reduced. In turn, this lowers the need for expensive sensor systems and high performance computing. With respect to the 96
Colorado School of Mines
for the VC to fully enter autonomous control mode. The AC’s query packet requests sensor data, and the command packet requests a control action as well as sensor data. The VC responds to both the query and command packets with a sensor response packet, which includes the sensor data requested. The emergency stop packets for both controllers are unique. If the AC sends an emergency stop (set E-stop) packet to the VC, the VC will cut throttle and allow the AMR to coast. The VC will return a status packet in response. The AC uses another emergency stop (release E-stop) packet to release the E-stop condition. The VC’s emergency stop packet is the only packet the VC will send without prompting. The VC sends an emergency response packet to the AC to indicate that a mechanical E-stop on the AMR has been pressed. The VC reacts the same way to both a software (AC) E-stop and a mechanical E-stop. The E-stop can only be released by releasing the source of the E-stop (i.e. Mechanical E-stops cannot release software E-stops or vice-versa). The data is transferred via an RS-232 synchronous data stream with 8 bits, 1 start bit, 1 stop bit, and no parity at 57600 Baud. All data is represented with ASCII characters – numbers are represented in hexadecimal format followed by the carriage return character. Please note, the following tables are common to the MineSENTRY project, and thus may appear in other MineSENTRY documentation and Theses. 111
Colorado School of Mines
ABSTRACT Autonomous Haulage Systems (AHS) in mining began trials in the 1990’s but have only become widely accepted in the last five years. Mine operators with AHS deployments are reporting greater than 20% increases in utilization of trucks and reductions of hourly operating costs as compared to manned fleets. Future deployments of AHS could be improved through the implementation of a more complex and systematic approach to safety risk assessment than is currently utilized within the mining industry. This dissertation describes the development of a methodology for the safe selection and/or reconfiguration of an AHS’s Safety Instrumented Systems, which follows the process prescribed by IEC 61508 but was adapted to the specific situation of mining. The derived new methodology is accomplished by developing a generic fault tree to define exposures and failure modes of an AHS. Representative scenarios simulating various mining environments and situations are utilized to define the typical exposures in an AHS deployment. Through the implementation of a systematic safety risk analysis specifically tailored for AHS, acceptable levels of risk can be achieved while reducing undue process interruption associated with safety systems. This novel analysis includes determination of the maximum tolerable risk, likelihood of an event, and the required safety systems to mitigate those risks. A theoretical determination of the safety ratings of the systems utilized in the commercial deployments was undertaken by comparing the AHS deployments to autonomous automobiles. Final analysis presents an idealized autonomous haul truck safety system to meet the demands of the model mine presented in the functional safety analysis of an AHS. iii
Colorado School of Mines
LIST OF ACRONYMS AND ABBREVIATIONS ADAS Advanced Driver Assistance Systems AEB Automatic Emergency Braking AHS Autonomous Haulage System AHT Autonomous Haulage Truck ALARP As Low As Reasonably Possible AOZ Autonomous Operating Zone ASAM Autonomous or Semi-Autonomous Machine ASAMS Autonomous or Semi-Autonomous Machine System ASI Autonomous Solutions Inc. ASIL Automotive Safety Integrity Level BPCS Basic Process Control System CAN Control Area Network CDC Center for Disease Control DMIRS Department of Mines, Industry Regulation and Safety ECU Engine Control Unit EMESRT Earth Moving Equipment Safety Round Table EN European Standards ESR Electronically Scanning Radar Euro NCAP European New Car Assessment Programme FTA Fault Tree Analysis GMG Global Mining Guidelines Group GNSS Global Navigation Satellite System GPS Global Positioning System HARA Hazard Analysis and Risk Assessment HME Heavy mining equipment IEC International Electrotechnical Commission IMU Inertial Measurement Unit IPL Independent Protection Layer ISO International Organization of Standardization LiDAR Light Detection and Ranging LTE Long Term Evolution LTI Lost Time Incident LO Local Object LV Light vehicle MMM Manned Monitored Machines MSHA Mine Safety and Health Administration MTFR Maximum Tolerable Failure Rate NHTSA National Highway Traffic Safety Administration NIOSH National Institute for Occupational Safety and Health ODS Object Detection System OEM Original Equipment Manufacturer OHS Occupational Health and Safety PFD Probability of Failure on Demand PL Protection Layer ix
Colorado School of Mines
INTRODUCTION Automation is an emerging key value driver within the mining industry. Automation was used extensively within mineral processing and metallurgical functions prior to even the use of solid-state electronics. However, Autonomous Haulage Systems (AHSs) only began field testing in open pit mines in the early 1990s. Commercial adoption occurred nearly 20 years later in 2008. Technologies for vehicle autonomy advanced rapidly in recent years and effectively moved the automation of mining fleets within reach of many mining operations. Onboard systems of an Autonomous Haulage Truck (AHT) differ very little from any autonomous vehicle, including a Google Car or Tesla’s system. An autonomous vehicle system requires a vehicle control unit that takes in sensory perception, facilitates communication, and outputs the appropriate vehicle controls to the actuators within the vehicle system. Typical sensors utilized in autonomous vehicles include radio detection and ranging (Radar), light detection and ranging (LiDAR), high precision Global Navigation Satellite System (GNSS), cameras, odometers, and inertial monitoring units (IMUs). Typically, actuators utilized in autonomous vehicles are already onboard a manned vehicle. They are accessed via a Controller Area Network (CAN) bus, an internationally accepted standard designed to allow microcontrollers and devices to communicate with each other in applications without a host computer. Most modern on and off-road vehicles are primarily drive-by-wire devices. They take inputs from a sensor that the operator/driver controls and then electronically controls vehicle functions such as steering, throttle, and braking. AHSs are more than trucks and onboard sensors. AHSs consists of: mining trucks equipped with commercial and proprietary electronic devices; software to command, control, and track vehicle movements and interactions; a communications network with complete coverage to all active mining areas; high precision GNSS transponders; and a team of control room operators and site support staff to manage vehicles, devices, and the network. Integration of AHSs at a mine is a complex task that includes many of the safety hazards of a conventional surface mine as well as the specific safety risks associated with AHSs. Prior to 1
Colorado School of Mines
implementation of an AHS, risk analysis and risk mitigation must be undertaken during development of the system. Risk analysis and mitigation must continually occur during commercial operation and improvement of AHSs. Today, AHSs are operating safely and effectively within the Pilbara District of Western Australia as well as at sites in Chile and Canada. Safety incident and accident data show very few events and are primarily limited to human errors, such as failing to yield to traffic or failure to follow operational procedures (Department of Mines and Petroleum 2017). While AHSs show production improvements exceeding 30% over manned fleets (Fotescue Metals Group 2016), reliance on the current safety instrumented systems (SIS) introduces process interruptions that limit productivity improvements. For instance, the primary engineering control of Caterpillar’s Site Awareness – the process where vehicles communicate their bearing and velocity to all other vehicles – requires uninterrupted network communication. This wireless connection is often difficult and expensive to maintain in a mining environment. The principle wireless connection difficulty is the complex terrain associated with mining that creates areas shadowed from wireless coverage. Process interruptions due to network connectivity issues could be mitigated by restructuring SISs. Other process interruptions may occur due to false detections from the object detection systems (ODS). The current hierarchy of controls is unchanged from the first commercial introduction of AHSs. Hierarchy of Controls is a system applied across many industries to categorize, minimize, and/or eliminate hazard exposure (National Institute for Occupational Safety and Health 2016). It is possible that the legacy system hierarchy could be restructured and SISs could be removed or modified dependent on site specific conditions to reduce process delay impacts associated with poor SIS performance while maintaining appropriate risk reduction factors. An existing example of a system hierarchy reduction can already be seen when comparing Caterpillar and Komatsu AHS trucks. Due to licensing constraints, the LiDAR utilized by Caterpillar is not available for Komatsu to use in a mining application. Komatsu determined their AHS trucks meet their internal safety requirements without the use of LiDAR for object detection. 2
Colorado School of Mines
To safely reconfigure an AHS’s safety systems, the process prescribed by International Electrotechnical Commission (IEC) 61508 Standard “Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems” can be applied to analytically set safety integrity targets for a mining operation or portions of the operation. From these targets, the appropriate safety systems can be selected based on the anticipated failure modes from risk analysis. Safety Integrity Level (SIL) rating methodology can then be utilized to ensure that safety systems provide sufficient risk reduction factors to meet safety integrity targets. SIL is rated in probability of failure on demand (PFD) and is expressed in terms such as 1 in 1,000. A SIL rating is a ranking of a safety systems performance. The SIL rating system has four discrete levels: SIL 1, SIL 2, SIL 3, and SIL 4. The higher the SIL rating, the higher the safety level and the lower the PFD. This methodology is commonly used within highly automated industries, such as automotive, transportation, medical, manufacturing, power generation, mineral processing, and chemical refining. Reduction or simplification of SISs within AHSs will not likely be driven by equipment manufacturers and must be driven by the mining company. Original equipment manufacturers’ (OEM) business models are not driven by production improvements in the same way that a mining company is. In fact, based on experience within the AHS sector, it is likely that reduction of safety systems will be actively resisted by the OEM’s. A rigorous analysis of the SISs must be managed by a mining company, with the support of the OEM, to drive future productivity gains or implementations of AHSs into more complex mining environments. 1.1 Problem Statement The expansion of worldwide AHS will require implementation of a more complex and systematic approach to safety risk assessment than is currently available through the process described by International Organization for Standardization (ISO) 31000 “Risk Management.” The addition of AHS components to the haulage, loading, and ancillary fleets must be treated with rigor to ensure safety as well as acceptable performance. Commercial developments of AHS have taken the approach of continually adding layers of SISs to make AHS as safe as possible. It is likely the combined SIL rating of those systems exceeds the demands of a mining 3
Colorado School of Mines
environment. It is also likely some SISs are unnecessarily redundant with limited additional protection, yet these SISs add process interruptions due to false positives in the SIS. Through the implementation of a systematic safety risk analysis specifically tailored for AHS, acceptable levels of risk reduction can be achieved while reducing undue process interruption associated with SISs. 1.2 Thesis Statement IEC 61508 was developed during the transition of the process industry from human control to computer control. This transition added significant complexity and potential risks that could not be quantified through traditional risk assessment methods. IEC 61508 prescribed a method to analyze the systematic risk of programmable safety related systems. IEC 61508 is currently adapted through specific standards for process, automotive, railway, medical device, manufacturing, and nuclear industries. In this dissertation, the process prescribed by IEC 61508 Standard is adapted to analytically set the maximum tolerable risk and safety integrity targets for a mining operation. 1.3 Research Objectives The primary research objective is the development of a methodology for the safe selection and/or reconfiguration of an AHS’s SISs, which follows the process prescribed by IEC 61508. The derived new methodology is accomplished by developing a generic fault tree to define exposures and failure modes of an AHS. Representative scenarios simulating various mining environments and situations are utilized to define the typical exposures in an AHS deployment. The methodology requires the following steps be taken: 1) Determine the maximum tolerable risk for a mine site. 2) Analyze the exposure of the typical roles within an AHS deployment. From these exposures, safety integrity targets can be calculated for each scenario; and 3) From these targets, the appropriate SIS(s) can be selected based on anticipated failure modes from risk analysis and provide sufficient risk reduction factors that meet the safety integrity targets. 4
Colorado School of Mines
1.4 Research Methodology The proposed research methodology is presented below. 1) Review of the current regulations and standards that may apply to AHS deployments. 2) Perform a risk analysis following the adapted IEC 61508 methodology of common exposure within a mine site utilizing an AHS. 3) Risk analysis to be performed utilizing the fault tree analysis method. 4) Determine appropriate safety integrity targets to mitigate risks to reach maximum tolerable failure rate as defined by IEC 61508. 5) Theoretically determine the limits of the SIL rating of existing SIS utilized in AHS. 6) Evaluate existing systems utilizing IEC 61508. 7) Develop of an idealized SISs for AHS. The methodology developed through this research can be utilized by a mining company to evaluate a mine or a portion of a mine prior to the development and deployment of an AHS by an OEM to optimize both its safety and productivity based on site specific conditions and the technology deployed by the OEM. The method can also be utilized on existing deployments to improve productivity within an autonomous operating zone (AOZ) by reducing impacts from SIS without negatively impacting the safety requirements of the site. 1.5 Originality of Work While AHSs were trialed for over two decades, widespread adoption of AHS is just beginning. Independent layers of protection were introduced by OEMs throughout the commercial development of AHS but are rarely removed. The original contribution associated with this research is the adaptation of a systematic approach to risk analysis utilized in other industries and is now applied to AHS. While this approach is not new to other industries, it was previously not developed for and currently is not publicly utilized within AHS. By conducting a rigorous analysis of the SISs with the support of OEMs, a mining company can drive future productivity gains or implementations of AHSs into more difficult mining environments. 5
Colorado School of Mines
1.6 Dissertation Organization This dissertation is organized to provide the required AHS background prior to adapting IEC 61508 to create a generic fault tree for an AHS installation and ultimately define a potential alternate safety hierarchy for an AHS deployment. Chapter 1: Introduction Chapter 1 develops the problem statement, thesis statement, research objectives and process of the research. A discussion of the originality of work is included. Chapter 2: Regulations and Standards Chapter 2 explores the existing regulations and standards utilized to govern AHS deployments. Most AHS deployments are implemented under guidelines issued by the State of Western Australia, but the recent deployments in Alberta, Canada are under actual regulations issued by the Country’s Occupational Health and Safety department. Chapter 3: Safety Integrity Targets of a Model Mine Chapter 3 calculates the required safety integrity targets of a model mine through the adapted IEC 61508 process. The maximum tolerable risk for an AOZ is determined. Calculations of the exposure for various roles within an AOZ are utilized to calculate a sitewide exposure. From these calculations, the safety integrity targets of the AOZ are determined. Chapter 4: Theoretical SIL Ratings of Current AHS Deployments Chapter 4 provides a theoretical calculation of the SIL ratings of the current AHS systems again following IEC 61508. As actual data for each mine site’s systems remains proprietary, the mining systems are compared to systems utilized in the autonomous automobile industry to provide theoretical limits to the safety of the AHS deployments. Chapter 5: Idealized AHT System Architecture Chapter 5 defines an idealized AHT system architecture to meet safety integrity targets of a model mine. The idealized system architecture looks to maintain appropriate levels of safety while minimizing the potential for process interruptions due to false positives from the SISs. 6
Colorado School of Mines
REGULATIONS AND STANDARDS Australia, Chile, and Canada are the only countries with commercial-scale AHS deployments. Unlike the United States, mine safety in those countries are governed by state level regulations. Western Australia has approximately 80% of the worldwide autonomous deployments, but the Department of Mines, Industry Relations and Safety (DMIRS) only provides a guideline for compliance rather than enforceable regulations. Alberta, Canada’s Occupational Health and Safety (OHS) recently developed regulations are the first enforceable regulations for AHS and are the first to reference international standards. Worldwide pressure from industry groups like Global Mining Group (GMG) show the need for the adoption of international standards such as Functional Safety. With the roll-out of the Alberta OHS regulations, international standards are becoming an enforceable document. Those standards already govern many of the aspects of the base haul trucks. The addition of functional safety into the enforceable standards will enable a quantitative or semi-quantitative process to evaluate a very complex system. Key definitions and processes from within those standards are explored through their application on AHS. 2.1 Layers of Protection Woven into an AHS operation are several safety systems or controls arranged in the Hierarch of Controls format (National Institute for Occupational Safety and Health 2016). This hierarchy concept assumes that the control methods at the top of Figure 2.1 are potentially more effective and protective than those at the bottom which are more reliant on human behavior rather than systematic controls. In the case of AHS, elimination of risks associated with human error is one of the greatest benefits. Through the removal of truck operators, the risk to those operators is eliminated. However, loading unit operators, ancillary unit operators, drilling operators, and technical services staff still remain within the AOZ. Safety impacts to the maintenance employees does not change within the maintenance workshop. However, field repairs will expose them to AOZ risks. Therefore, it is recommended by the DMIRS that additional primary controls, such as 8
Colorado School of Mines
elimination and substitution, be put in place to reduce risks to these employees (Department of Mines and Petroleum 2014). Typical controls may include remove the risk by isolating or providing alternative access for personnel not directly involved with the autonomous activity; reduce the likelihood of the risk by restricting functions and activities to authorized personnel and additional technology. Figure 2.1 NIOSH Hierarchy of Controls (National Institute for Occupational Safety and Health 2016). Engineering controls remain the second control tier to mitigate risk. Engineering controls are arranged as layers of protection from most effective to least effective as perceived by system designers. Current AHS implementations utilize the layers of protection in Figure 2.2. An AHS provides protection via the object detection systems on each AHT, situational awareness that provides positioning and orientation(pose) information of all machines within the AOZ, and the ability to stop some or all the machines within an AOZ. If a hazard is not mitigated by site procedures that eliminate the risk, layers of protection provided by AOZ access control systems, situational awareness, object detection systems, and All-Stop systems should provide an acceptable level of risk. If those layers do not provide sufficient risk reduction, administrative controls such as site procedures or PPE in the form of the remote stop system should be added. 9
Colorado School of Mines
Figure 2.2. AHS Layers of Protection increasing left to right. 2.2 DMIRS Code of Practice The Western Australia Mines Safety and Inspection Act 1994 (the Act) governs mining within the state. A Code of Practice, as issued by the DMIRS, is a practical guide to achieving the health and safety standards of the Act (Department of Mines and Petroleum 2014). The code applies to those with a duty of care in the circumstances described in the code. Following the code of practice, in most cases, would achieve compliance with the regulations. “Safe mobile autonomous mining in Western Australia” (the Code) is designed to provide guidance on: mobile autonomous and semi-autonomous systems used in surface and underground mines; developing and evaluation of safe work procedures for those systems; the control of autonomous loaders, trucks and other mobile equipment, such as drills and dozers; and identifying the unique risk profiles in relation to mobile autonomous mining systems. Rather than the prescriptive rules applied by the United States Mine Safety and Health Administration (MSHA), the DMIRS utilizes risk management techniques as required by the 1994 Mines Safety and Inspections Act (State of Western Australia 1994). ISO 31000 defines 10
Colorado School of Mines
risk as the probability and consequence of occurrence of loss, injury, or illness. Analysis prescribed under ISO 31000 analyzes the frequency of the risk, as well as the consequences of the risk. 2.3 Alberta OHS Approval Process of AHS In January of 2019, Alberta OHS issued a draft version of their approval process for AHS. This standard was developed through cooperation with Western Australian AHS sites and specifically calls out ISO 17757 “Earth-Moving Machinery and Mining - Autonomous and Semi- Autonomous Machine System Safety.” The approval process is site specific and may vary based on unique parameters of the mine site, technology, systems, and site operator’s experience with AHS system. Unlike the DMIRS Guide, the OHS process is a set of specific regulations rather than a guide. Within these regulations are prescriptive requirements of international standards that must be met. A required portion of the application is a compliance letter either from the manufacturer or an Alberta Professional Engineer indicating that the applicable requirements of ISO 17757 are met. 2.4 United States AHS Deployments Under MSHA Currently, only one AHS trial is under the jurisdiction of the MSHA. MSHA does not have any published regulations or guidelines for AHS. The current trial is regulated under an Experimental Permit issued to Barrick in 2018 at their Arturo Joint Venture operation in Nevada. One of the earliest Caterpillar trials occurred under MSHA jurisdiction at the Navajo Kayenta Coal Mine in 2014. 2.5 Relevant International Standards Standards are generally not mandatory in comparison to regulations unless that standard is referenced in a regulation, such as ISO 17757 in the Alberta OHS Regulation. Additional standards required for all manned operations will still be required for AHS sites. An example of a required standard for manned sites that would also be required for an AHS is European Standard (EN) ISO 12100 “Safety of Machinery – General Principles for Design – Risk Assessment and Risk Reduction” which describes the requirements safe design principles. 11
Colorado School of Mines
ISO and IEC standards follow a hierarchical system, where the tip of the pyramid (Type A standards) represents the basic design and analysis principles. Figure 2.3 is a graphical representation of the hierarchy of standards that often is utilized by ISO and IEC, Figure 2.3. The middle of the pyramid is built from group safety standards (Type B standards) that provide standards for general safety aspects (Type B1 standards) and special protective devices (Type B2 standards). The base of the pyramid is built from specialist standards (Type C standards) that specify safety features for individual machine families. Standards are developed by a committee often made up of consortia of national and regional regulators, business within a marketplace, and non-governmental agencies such as Australasian Institute of Mining and Metallurgy (AusIMM), Society for Mining, Metallurgy and Exploration (SME). The definition of a standard from ISO is a document established by consensus and approved by a recognized body, that provides, for common and repeated use, rules, guidelines or characteristics for activities or their results, aimed at the achievement of the optimum degree of order in a given context (International Organization for Standardization 2020). Figure 2.3. Hierarchical Organization of the IEC, ISO, EN Standards. Adpated from common sources. Table 2.1 lists many of the standards that would apply to an AHS and their corresponding Hierarchical Organization Type classification. Each standard is relevant to risk 12
Colorado School of Mines
analysis required for the deployment of AHS at a mine site and should not be considered an exhaustive list. Additional standards are also applied to manned and AHS sites. Table 2.1 Relevant Standards. Standard Title Type ISO 31000 Risk Management Package A IEC 60204 Safety of Machinery – Electrical Equipment of Machines B1 IEC 61025 Fault Tree Analysis A IEC 61310 Safety of Machinery – Indication, Marking and Actuation B1 IEC 61508 Functional Safety of Electrical/Electronic/Programmable Electronic A Safety-Related Systems IEC 61511 Functional Safety – Safety Instrumented Systems for the Process B Industry Sector IEC 62061 Safety of Machinery – Functional Safety of Safety-Related Electrical, C Electronic and Programmable Electronic Systems ISO 9001 Quality Management Systems – Requirements A ISO 12100 Safety of Machinery – General Principles for Design – Risk A Assessment and Risk Reduction ISO 13849 Safety of Machinery – Safety-Related Parts of Control Systems B1 ISO 14121 Safety of Machinery – Principles for Risk Assessment A ISO 15998 Earth-Moving Machinery – Machine-Control Systems (MCS) Using B1 Electronic Components – Performance Criteria and Tests for Functional Safety ISO 16001 Earth-Moving Machinery – Object Detection Systems and Visibility C Aids – Performance Requirements and Tests ISO 17757 Earth-Moving Machinery and Mining – Autonomous and Semi- C Autonomous Machine System Safety ISO 19014 Earth-Moving Machinery – Functional Safety C SO 20474-1 Earth-Moving Machinery – Safety – Part 1: General Requirements B1 ISO 21815 Earth-Moving Machinery – Collision Warning and Avoidance C ISO 26262 Road Vehicles – Functional Safety A 2.6 ISO 17757: Autonomous Machine System Safety The recently approved ISO 17757 formalizes the definitions and requirements of an autonomous mining machine. This standard is explicitly referenced in the Alberta OHS regulations for AHS. ISO 17757 requires a risk assessment process for Autonomous and Semi- Autonomous Machine System (ASAMS), which conforms to the principals of ISO 12100. All identified risks shall be mitigated to acceptable risk levels as part of the risk assessment process. ISO 17757 also requires that safety-related parts of control systems shall comply with the 13
Colorado School of Mines
appropriate functional safety performance level. Examples include: ISO 13849 “Safety of Machinery – Safety-Related Parts of Control Systems;” ISO 19014 “Earth-Moving Machinery – Functional Safety;” IEC 62061 “Safety of Machinery – Functional Safety of Safety-Related Electrical, Electronic and Programmable Electronic Systems;” or IEC 61508. 2.7 IEC Functional Safety Standards Functional Safety is defined by IEC 61508 as “the safety parameters control systems provide to an overall process or plant.” Functional safety standards were developed to improve confidence in safety systems. This requirement is due to the complexity in modern safety systems that are now predominantly electrical, electronic, or programmable systems. The process plant environment bred many of the development standards used today in autonomous systems. This new approach to reducing risk deviates from previous standards that were prescriptive in nature by focusing on quantitative risk reduction. The functional safety approach greatly differs from the prescriptive approach taken by MSHA regulators with the mandate of no allowable risk. Functional safety engineering seeks to identify specific hazardous failures that can lead to serious consequences. It then establishes a maximum tolerable frequency target for each mode of failure. If the failure of a piece of equipment contributes to the identified hazards, it is referred to as “safety related.” A “safety function” is further defined as the function of safety related equipment which maintains a safe state or brings it to a safe state in response to a hazard. Functional safety addresses both random hardware failures and systematic failures. The former is often quantified and assessed in terms of failure rates while the later cannot be easily quantified and must rely on conformance to acceptable development standards. Systematic failures most often occur when software is involved in the safety related function. Basic Process Control System IEC 61511 “Functional safety - Safety instrumented systems for the process industry sector” defines a basic process control system (BPCS) as the system that continuously monitors and controls the process in a day-to-day plant operation. A BPCS is typically considered as an independent protection layer (IPL) preceding the SIS. 14
Colorado School of Mines
IEC 61511 Part F.9 states the criteria to qualify a Protection Layer (PL) as an IPL are the protection provided reduces the identified risk by a large amount, for instance 10-1, and the protective function is provided with a high degree of availability (90% or greater). An IPL should be designed solely to prevent or to mitigate the consequences of one potentially hazardous event (i.e. a runaway reaction, release of toxic material, a loss of containment, or a fire). Multiple causes may lead to the same hazardous event; therefore, multiple event scenarios may initiate action of one IPL. An IPL must also be designed to facilitate regular validation of the protective functions also known as auditability. Only those protection layers that meet the tests of availability, specificity, independence, dependability, and auditability are classified as independent protection layers. Typically, a BPCS is a relatively weak IPL due to limited redundancy in components, limited built-in testing capability, and limited security against unauthorized changes to the internal programming. The latter of these may have the greatest impact to effectiveness due to human error. IEC 61511 limits the combined PFD to not less than 1 × 10-1 for all the BPCS IPLs that can be applied to a unique initiating event-consequence pair. However, some companies use a PFD equal to 1 × 10-1 for each BPCS IPL if analysis indicates that the configuration, maintenance, and regular testing of the BPCS ensures that each IPL BPCS is truly independent. For the analysis presented in this study, the PFD of the BPCS is assumed to be 100 due to the complexity of the system. Safety Instrumented System A safety system provides functional safety if the safety system – including logic solvers, sensors, and actuators – achieves a tolerable level. IEC defines tolerable risk (International Electrotechnical Commission 2016) as, “The aim of functional safety is to bring risk down to a tolerable level and to reduce its negative impact; however, there is no such thing as zero risk. Functional safety measures risk by how likely it is that a given event will occur and how severe it would be; in other words: how much harm it could cause.” A SIS is a system designed to prevent or mitigate hazardous events by taking the process to a safe state when specific conditions are violated. A SIS is comprised of at least one Safety Instrumented Function (SIF) composed of various combinations of logic solvers, sensors, and 15
Colorado School of Mines
actuators. SIFs must be functionally independent from the BPCS. Signals can be shared between the SIF and BPCS only if the PFD is not affected. Typically, SISs utilize logic solvers with multiple redundant processors, power supplies, signal paths, sensors, and actuators. Ideally, this redundancy is achieved by more than one or duplicate components. An example of non-duplicate redundant sensors is Caterpillar’s use of Radar and LiDAR in their perception system. Additionally, each SIS will use self-diagnostics to detect and communicate sensor, logic solver, and final control element faults. Each SIF will have a SIL rating. A SIL rating is a ranking of a safety systems performance. It is rated as PFD and can be expressed in terms such as 1 in 1,000. The SIL rating system has four discrete levels: SIL 1, SIL 2, SIL 3, and SIL 4, as shown in Table 2.2. Table 2.2: SIL Level, Risk Reduction Factor, Probability of Failure on Demand. Annotated from (International Electrotechnical Commission 2016). Risk Reduction SIL Level PFD Rigor Factor SIL 4 100,000 to 10,000 10-5 to 10-4 State of the art and usually avoided. Less rigorous than SIL 4, but still SIL 3 10,000 to 1,000 10-4 to 10-3 requiring sophisticated techniques. Requires good design and operating SIL 2 1,000 to 100 10-3 to 10-2 practice such as in ISO 9001 “Quality Management Systems – Requirements.” The minimum level requiring good design SIL 1 100 to 10 10-2 to 10-1 and practice. The higher the SIL rating, the higher the safety level or the lower the probability of failure on demand. Individual components do not have SIL ratings; instead, components are determined to be suitable for different SIL environments. Use of components suitable to a SIL rating does not ensure that a system has that SIL rating. The actual SIL rating is dependent on the implementation of SIL appropriate logic solvers, sensors, and actuators. The selection of a SIL rating for a SIS utilized in a process is based on risk analysis of the situation. This risk analysis follows the same process as that described in the DMIRS’s code. Risk analysis will result in a risk profile for the process. If that risk is too high, a risk reduction and mitigation plan must be prepared that could include SISs. The SIL ratings of the SISs would 16
Colorado School of Mines
be dependent on the desired risk reduction factor. For example, a process industry company may only accept SIS designs up to SIL 2. If the risk analysis indicated a requirement for a SIL 3 SIS, a redesign of the process to lower the intrinsic risk would occur rather than implementing a SIL 3 SIS. This change in process would be during the elimination or substitution step of the hierarchy of controls. A typical SIS/SIF/SIL example case is a pressure vessel containing a flammable liquid. If this pressure vessel’s process control system fails and allows the vessel to be subjected to an overpressure condition, the SIS will act to prevent or mitigate the hazardous condition resulting from the overpressure event. The SIS may include a pressure transducer, a logic solver to control the system behavior, and a solenoid valve to vent the vessel into a safe location. If the risk reduction factor required by the risk analysis is a factor of 100, then a SIL 2 level SIF would be specified. This one SIF may constitute the entire SIS, or the SIS may be composed of multiple SIFs to mitigate additional unacceptable process risks. Human Independent Protection Layers Human IPLs rely on operators to take action to prevent an undesired consequence in response to an event. It is worth noting that most well-known major incidents, such as Three Mile Island and Chernobyl, involved complex systems interacting with humans. The effectiveness of humans in performing routine tasks under low or high stress conditions is limited. Overall, human performance is less reliable than engineering controls. The Center for Chemical Processes and Safety has extensively studied human failure rates. Routine tasks typically have PFDs in the 10-2 to 10-3 range, while complicated non-routine tasks under timing limitations have PFDs approaching 100 (Center for Chemical Process Safety 2001). Maximum Tolerable Risk Counter to many of the catch phrases used in the mine health and safety community, there is no such thing as zero risk. Public perception and those involved in the health and safety of mines often call for zero risk; however, this is not practical. Table 2.3 demonstrates the everyday risk of death from various causes. Data is compiled from Center for Disease Control (CDC), DMIRS, and MSHA. 17
Colorado School of Mines
Table 2.3: Probability of Risk of Death. Compiled from CDC, MSHA, and DMIRS data souces. Cause Probability Source All causes (mid-life including medical) 7 × 10-3 (Centers for Disease Control and Prevention 2020) Unintentional Injuries 5 × 10-4 (Centers for Disease Control and Prevention 2020) Traffic Accidents 1 × 10-4 (Centers for Disease Control and Prevention 2020) Working at a USA Coal Mine (2018) 1 × 10-4 (Mine Safety and Health Adminstration 2019) Work at a USA mine (2018) 8 × 10-5 (Mine Safety and Health Adminstration 2019) Working at a Western Australia mine (2018) 3 × 10-5 (Department of Mines, Industry Regulation and Safety 2019) Natural disasters 6 × 10-6 (Centers for Disease Control and Prevention 2020) The tolerable degree of risk varies based on degree of control of the circumstances, the voluntary or involuntary nature of risk, and the number of persons at risk. However, 10-5 per annum (pa) is often considered a broadly acceptable level of risk within mining and industrial activities, such as oil & gas. Tolerable risks in the 10-6 range are typically only utilized for scenarios that present a risk to communities outside of an operational area. Maximum Tolerable Failure Rate For simple systems, the maximum tolerable failure rate is calculated by dividing the maximum tolerable risk by external IPLs. Typically, most of these IPLs reduce the exposure rate 18
Colorado School of Mines
of an individual. Reduction in staffing, AOZ access control, and site procedures are the reducing factors specific to AHS. For example, factors that might be experienced at an AHS site are shown in Table 2.4. Table 2.4: Factors used to calculate maximum tolerable failure rate. Factor Value Source 7000 operating hours/ 8760 total hours per Portion of time system can offer risk 80% year 2000 working hours/8760 total hours per Person at risk 23% year Probability of Fatality from Incident 80% Judgement Daily exposure to an AHT (<30m Estimated exposure based on operational 5% separation) conditions Based on Table 2.4, a requirement of a maximum 1.4 × 10-3 pa PFD is calculated in Equation 2.1. The calculated PFD results in a safety integrity level requirement of SIL 3. This means that a single SIL 3 safety system is required to meet the tolerable degree of risk for an AHT. However, a single SIL 3 system is not a preferred solution due to the difficultly in creating those individual systems; however, a combination of SIL 1 and SIL 2 systems can achieve the risk reduction factor of a SIL 3 system. All current AHS implementations have numerous layers of protection. 1 × 10 pa (2.1) = 1.4 10 pa (0.80 × 0.23 ×− 05.75 × 0.05) −3 𝑥𝑥 As Low As Reasonably Possible (ALARP) It is insufficient to end functional safety analysis at the determination of a SIL target based on an acceptable level of risk. It is also necessary to establish if further improvements to the system can be undertaken to reach as low as reasonably possible (ALARP) risk target. Ideally, a system would reach a state of safety where the risk lies below the broadly acceptable risk limit of 10-6. 19
Colorado School of Mines
An example of an ALARP calculation is presented below: 1) A $2,000,000.00 USD cost per life saved target is used in a particular industry; 2) A maximum tolerable risk target of 10-4 pa was set for a particular hazard that is likely to cause two fatalities; 3) The proposed system was assessed and a predicted risk of 8 × 10-5 pa was obtained. Given that the negligible risk is taken as 10-6 pa, the application of ALARP is required; 4) For a cost of $6,000.00 United States Dollars (USD), additional instrumentation and redundancy will reduce the risk to just above the negligible region (2 × 10-6 pa); 5) The plant life is 30 years; 6) A gross disproportionality factor of 10 is used; 7) The cost per life saved criteria is becomes 10 × $2,000,000 USD = $20 M USD; 8) The cost per life saved is calculated by the cost of the proposal divided by the number of lives saved of the plant life, as follows: $6,000 [(8 × 10 −5 2 × 10 ) ×2 ×30] = $1.3 M USD ⁄ − −6 Based on this calculation, the cost per saved life is less than the cost per life saved criteria; therefore, the safety improvement should be implemented. The application of ALARP to a mine model should evaluate more than just the cost of the system. The cost of additional IPLs is negligible to the cost per human life; however, the process interruptions due to false positives does have a significant impact. Typical operating costs of an AHT varies between $500/hr. and $800/hr. (USD). Typically, process interruptions from a loss of communications or a false detection of the ODS results in a chain reaction across the AHT fleet that shuts down the entire fleet until the interruption is resolved. In a small fleet of 20 trucks, process interruption could cost $10,000-$16,000 USD per hour. In more a common sized fleet of 50 trucks, process interruption could cost $25,000-$40,000 USD per hour. Meeting the Requirements of IEC 61508 Based on the Alberta OHS regulations on AHS and movement within the regulatory environment of Western Australia, it is likely that AHSs will at some point be required to 21
Colorado School of Mines
demonstrate conformance to the requirements of IEC 61508. An active topic within the Global Mining Group Guidelines focuses on the application of Functional Safety to AHS (Global Mining Group 2019). Their problem statement, “The industry is not aligned. Available international standards applicable for mine autonomy are not clearly defined and the requirements for managing functional safety are therefore unclear,” demonstrates the lack of clarity on the application of the standard. However, Alberta OHS has already included ISO 17757 in their regulations for AHS. Certification under IEC 61508 takes two forms: certification of the organization creating the product or system and certification of the system. It is not credible to expect certification of a product without verification of the organization producing the product. Many of the companies associated with AHS cleared or could clear the burden of ISO 9001 “Quality Management Systems.” However, the situation with IEC 61508 is different and less well developed. Self- certification is not precluded in IEC 61508. IEC 61508 includes a provision for a system to be “Proven in Use.” As an alternative to the rigorous process of Parts 1 and 2, statistical data from field applications may be used to satisfy IEC 61508. Due to their large number of trucks, Caterpillar and Komatsu could argue that their AHSs achieved a ‘proven in use’ demonstration. In November 2018, Caterpillar announced they hauled one billion tonnes and traveled 35 million kilometers under AHS (Caterpillar 2018). Assuming the average speed of their trucks is 20 km/hr, the result is 1.75 million hours of operation. AHS trucks operate approximately 7,000 hours per year, which means that Caterpillar has approximately 250 years of operation without a lost time incident (LTI) or fatality. Because truck numbers are climbing and a majority of operating hours occurred in the last few years, it is likely that Caterpillar could claim a SIL 3 rating within the next couple of years under the “Proven in Use” path. While many of the requirements to meet IEC 61508 are the responsibility of the manufacturer, the implementation strategy and supporting documentation are critical to the success of the deployment as well as the potential certification of the system. Implementation philosophies, restrictions, and limitations will contribute to an effective and practical implementation of AHS and are also critical in the certification of a system under IEC 61508. An 22
Colorado School of Mines
adaptation of a Functional Safety “V” diagram presented in ISO 26262 “Road Vehicles Functional Safety” shows the stages of the Functional Safety process that should be the sole or shared responsibility of the mine site (Figure 2.5). 2.8 IEC 61025: Fault Tree Analysis (FTA) The more complex scenario of an AHT is better represented by a fault tree. Fault Tree Analysis (FTA) is a deductive failure analysis that uses Boolean logic to combine a series of lower level events. FTA is commonly used in high hazard industries, such as aerospace, nuclear power, chemical process, pharmaceutical, and petrochemical. IEC 61025 “Fault Tree Analysis” is the international standard that covers FTA. The undesired event is taken as the top event of the logic tree. FTA works backwards from this event to determine the causes of the event and failures of the layers of protection of the system. FTA assumes failure of the functionality of a product or process and then identifies all potential root causes of the assumed failure. Each system or subsystem failure is evaluated one at a time and can combine multiple causes by identifying causal chains. Results of the FTA are schematically represented in the form of a tree of fault nodes. At each level of the tree, combinations of fault modes are described by logical Boolean operators (AND, OR, etc.). Basic symbols are shown and described in Figure 2.6. 23
Colorado School of Mines
( ) = ( B) = P(A) × P(B) (2.4) An OR gate𝑃𝑃 co𝐴𝐴rr𝑎𝑎es𝑎𝑎p𝑎𝑎on𝐵𝐵ds to 𝑃𝑃a s𝐴𝐴et∩ union: ( ) = ( B) = P(A) + P(B) - ( B) (2.5) 𝑃𝑃As𝐴𝐴 th𝑜𝑜e𝑜𝑜 f𝐵𝐵ailure𝑃𝑃 pr𝐴𝐴ob∪abilities used in FTA𝑃𝑃 ten𝐴𝐴d∩ to be less than 0.1, ( B) becomes a very small term and the output can be conservatively approximated by using an assumption that 𝑃𝑃 𝐴𝐴∩ the inputs are mutually exclusives events, therefore: ( ) = ( B) = P(A) + P(B) (2.6) Figur𝑃𝑃e 2𝐴𝐴.7𝑜𝑜 r𝑜𝑜ep𝐵𝐵resen𝑃𝑃ts 𝐴𝐴a g∪eneric single event fault tree and layers of protection of an AHT. The layers of protection of an AHT are broken out to the terms defined by ISO 17757. In addition to the safety systems identified by ISO 17757, BPCS from the pose system was added. The pose system provides a double redundant process to verify location via dual antennas, odometry, and an IMU. While this would not qualify as a SIS, it certainly provides a layer of protection. A generic event is also represented within the diagram. 2.9 Earth Moving Equipment Safety Round Table The Earth Moving Equipment Safety Round Table (EMESRT) was formed in 2005 and was driven by the desire to fill the knowledge gap between customers and OEMs with regard to understanding operational and maintenance risks. EMESRT is a global initiative involving major mining companies that made valuable risk evaluation frameworks for vehicle interaction systems that are relevant to the implementation of AHS. The Vehicle Interaction Systems document is a performance requirement developed to augment the interpretation of the EMESRT design philosophy and machine operation controls within various potential unwanted event scenarios. Performance requirement objectives serve to prevent a person or equipment (machine or vehicle) event resulting in injury or equipment damage including equipment to person, equipment to equipment, equipment to environment, and loss of control of equipment. 26
Colorado School of Mines
SAFETY INTEGRITY TARGETS OF A MODEL MINE By rigorously defining safety integrity targets of an AOZ, the safety requirements of the AHS and AHTs can be defined. Those requirements can be utilized to select the appropriate SISs to provide sufficient risk reduction without burdening the system with redundant or unnecessarily complicated systems. The process prescribed in IEC 61508 has been adapted to meet the demands of an AOZ. The first step described in IEC 61508 is to analytically set a safety integrity target for the model mine. This target will generally align with the industry standard of 10-5 fatalities per annum. The maximum tolerable failure rate is then determined by applying the risk reductions associated with external IPLs. The primary external IPL is the limited exposure that all personnel within the AOZ experience. Exposure values are developed by evaluating the risks for various roles within the AOZ. The resultant maximum tolerable failure rate is then utilized to calculate the required SIL for the AHT safety system(s). 3.1 Risk in the AOZ A generic fault tree, Figure 2.7, is divided in half with one side representing the internal layers of protection while the other half focuses on the exposure to fault conditions or conditions that could result in a fatality in an AOZ. The latter half of the fault tree sets the integrity target of functional safety analysis which is the focus of IEC 61508 Part 1. Fault events are evaluated relative to the risk they present to an individual. This allows for evaluation of the fault risk by role within the AOZ. The fatality risk associated with AHS is limited to AHT-to-MMM collisions in this study. There is some minimal risk associated with AHS and personnel not in a vehicle; however, the rates of exposure are likely one to two orders of magnitude lower than vehicle collisions due to site procedures and limited permitted activities outside of a vehicle. Risk of collision only occurs when an MMM and an AHT are near each other (<30 m) and in a position for the AHT to collide with a manned machine. The EMESRT surface vehicle interaction scenarios provide a set of vehicle interactions that may result in an incident (Figure 2.8). Potential interactions anticipated in an AOZ are show in Table 3.1. Interactions are limited to plausible scenarios that occur or have the potential to occur in an AOZ. Four 31
Colorado School of Mines
interaction scenarios are anticipated to occur: oncoming, dovetailing, intersections, and HME- AHT interactions during work. Oncoming interactions occur when an AHT passes an MMM in the opposite direction in an adjacent lane. Dovetailing interactions occur within the same lane and are limited to AHTs approaching too closely from the rear of an MMM. Intersection interactions occur when an MMM fails to comply with the hierarchy of vehicles utilized within the AOZ. The hierarchy of vehicles typically means that the larger/heavier vehicle has the right of way. When this procedure is utilized within an AOZ, all AHTs are located at the top of the hierarchy regardless of their actual size. The last interaction type occurs while an HME is performing its function. This interaction is limited to the loading units, dozers, and motor graders. Scenarios are compared to the EMESRT list and include the anticipated machine type that would be exposed to the scenario. Primarily exposures occur within the static lanes of the AOZ, such as the haul roads and ramps. Dynamic lane zones (loading or dumping) are typically off-limits to manned machines with the exception of loading units and dozers. This exclusion removes many of the risks associated with the AHTs and for all MMM other than loading units and dozers. Table 3.1: Interaction Scenarios in an AOZ. Machine Type Exposed EMESRT Scenario Definition to Scenario Scenario Oncoming Oncoming traffic in an All L1, L5, L8, C1, adjacent lane V4 Dovetailing Traffic within the All L4, C2, V4 same lane approaching from the rear Intersections MMM failing to All T1, T2, T3, T4, comply with hierarchy V4 of vehicles at an intersection HME-AHT HME working within Loading Unit, Dozer, L2, L3, L6, L7, their operating area. Motor Grader C3, V4 3.2 Maximum Tolerable Risk The maximum tolerable risk is the value a mining company should determine as part of their corporate policy. Heavy industry, which includes mining, generally sets the maximum 32
Colorado School of Mines
• clearing/confirming AHT object detections; • introduction to manned machine systems; • safe work procedures in the AOZ (loading, dumping, maintenance, etc.); and • manual operation of an AHT. Typical training to reach this level of competence takes multiple weeks. Training reduces exposure to AHT hazards by first reducing the number of people allowed within the AOZ and secondly, by allowing only highly training individuals within the AOZ. Typically, an AOZ sees a significant reduction in staffing in comparison to a manned site. This reduction is not only limited to truck operators but includes a reduction in non-critical employees within the AOZ as compared to a manned site. A calculation of Maximum Tolerable Failure Rate (MTFR) will be calculated only for the classes of workers expected to be within the AOZ. Each class has a calculated exposure time based on their role and responsibility. The following classes will be investigated for specific risks, exposure time, and consequences: • AHS Pit Supervisor; • Loading Unit Operator; • Motor Grader Operator; • Water Cart/Truck Operator; • Dozer Operator (Dump); • Dozer Operator (Loading Unit Clean-up); • AHS Pit Technician & Mechanic/Fitter; • AHS Service Technician and Wi-Fi Service Technician; and • Serviceman (Fuel bay). There are other roles that occur within an AOZ; however, their exposure is considerably lower than the roles listed above and might include mine services, technical services, and other support functions. These roles are generally escorted within the AOZ or allowed only to operate within exclusions zones within the AOZ. 34
Colorado School of Mines
Autonomous and manned mines have operating procedures in place to limit human exposure to large mobile equipment. A common term for this type of rule is the 50/30 rule and is enforced when a LV or a person on foot intends to approach a piece of heavy mining equipment (HME). Prior to entering within 50 meters of an HME, personnel must establish positive two- way communication with the HME operator to indicate their request to enter within 50 meters of the HME. The LV or person must wait until they are granted permission to approach by the HME operator. Other than where segregated by a physical barrier and prior to entering within 30 meters of an HME, positive two-way communication must be established, the HME must be parked, all ground engaging tools are grounded, and the operator’s hands must be away from the controls of the HME. Similar procedures exist for autonomous vehicles but require positive two- way communication with the control room and direct evidence of the change in the AHT’s operating state as shown by its signal lights. A few large mining companies have implemented LV only roads to remove the potential for interactions between LVs and HME. This adoption obviously has a significant impact on the exposure of LV occupants to the risk of AHS. Even without separated lanes, the interactions around AHTs are heavily controlled. Static lanes have more limited Safe Work Procedures (SWPs) compared to the dynamic areas due to their increased complexity and risks. A major contributor to external IPLs at a mine site is SWPs. SWPs originated in Australia and now serve as risk management protocol throughout multiple industries within the country. Outside Australia, SWP are often referred to as Standard Operating Procedures (SOP). A SWP is a step-by-step description of a process or task when deviation from the task could result in a loss, i.e. damage to equipment, injury, or fatality. The risk control document is unique and is created by teams within a mine site to describe the safest and most efficient way to perform a task. 3.4 Cause of Event Human error stands out as the most probable cause of an incident within a manned or AHS mine. If loss of control events are excluded from the DMIRS AHS incident data, all reported incidents are a result of human error alone and sometimes accompany a mechanical failure (Department of Mines, Industry Regulation and Safety 2019). DMIRS data indicates that notifiable incidents occur at a rate of 25-45 incidents per million hours worked. Assuming that 35
Colorado School of Mines
an average miner works 2000 hours per annum, the average of the DMIRS range converts to an annual incident rate of 7.0×10-2 pa. The Center for Chemical Process and Safety recommends a range of 10-1 to 10-3 per opportunity with the most commonly used value of 10-2 for analysis (Center for Chemical Process Safety 2001). Data used in the fault tree analysis is in units of per annum. Conversion from per opportunity to per annum requires that an estimate of the number of times per year that a demand is placed on the operator. The number of incidents requiring human intervention is difficult to predict; however, the combination of annual incident rate and the rate of human PFD can be represented as the annual incident rate. Therefore, 7.0×10-2 pa was utilized for the fault tree analysis presented here. While no metal on metal incident was recorded as a result of a loss of control incidents, it should be included in the fault tree analysis as a potential incident type. Generally, DMIRS loss of control incidents are related to a loss of traction due to wet roads. In all incidents, the BPCS brought the vehicle to safe stop. In some cases, the stop occurred outside the assigned travel lane but within a few meters of the travel lane. From 2017-2019, an average of 2.3 loss of control incidents occurred within AHSs of Western Australia. During that period, more than 200 AHTs were in operation within the Pilbara. Based on these assumptions, the annual incident rater per AHT is approximately 1.1×10-2 pa. This value was utilized for the fault tree analysis. While no incident related to a failure of the BPCS has been reported, there is still a potential for a fatality related to a BPCS failure. IEC 61511 limits the combined PFD to not less than 1 × 10-1 pa for all the BPCS IPLs that can be applied to a unique initiating event- consequence pair. However, some companies use a PFD of 1 × 10-1 for each BPCS IPL only if analysis indicates that the configuration, maintenance, and regular testing of the BPCS ensures that each IPL BPCS is truly independent. Therefore, 1.0×10-1 pa was utilized for the fault tree analysis. 3.5 Definition of the Model AOZ A model AOZ has been developed following the path described in IEC 61508. First the maximum tolerable risk of the AOZ is defined utilizing industry norms. A simplified scheme of a fleet comprised of sub-fleets is then imagined representing a typical mine. This scheme is 36
Colorado School of Mines
utilized to determine cause and probability of a failure/fatality. The predominant driver of risk within the AOZ is the exposure time of an individual to the AHTs. These exposures occur in two prime scenarios: brief passing within travel lanes and longer exposures at loading and dumping points. While the loading and dumping points have much longer exposure intervals, their probability of fatality due to collision is much lower than interactions between light vehicles and AHTs within the travel lanes. The risks to individuals are combined into a resultant factor, that when combined with the maximum tolerable risk, represents the SIL requirements of the safety system(s). 3.6 Model Assumptions To evaluate the exposure rates within an AOZ, the ideal solution would be time-in- motion studies of an active AOZ or a simulation of a complex AOZ within traffic modeling software. An ideal study would generate an average exposure time where a manned monitored machine is within 30 meters of an AHT and able to collide with that machine. Unfortunately, that data and process are not readily available; but a simple mine model can be developed to assess a typical AOZ. To simplify the calculation of exposure rate, it is assumed that sub-fleets do not interact with each other. A single sub-fleet is represented in Table 3.2. It should be noted that half units are shared between sub-fleets. The result of this assumption is that exposures for motor grader, water cart/truck, and service truck operators assumes full utilization, but the machine is shared across multiple sub-fleets with similar exposures. If multiple sub-fleets are considered, the impact from their addition will vary from zero if the sub fleets do not interact within the same haulage cycle to a multiple of the sub-fleets using the entirely the same haulage cycle. 37
Colorado School of Mines
Table 3.2: Model AOZ Sub-Fleet. Machine Type Units Haul Truck 5 Shovel/Excavator 1 Dozer 1 Wheel Loader/Dozer 1 Motor Grader 0.5 Water Truck/Cart 0.5 Service Truck 0.5 LV (Supervisor) 1 LV (Pit Tech) 2 LV (Wi-Fi Tech) 1 A simplified model of a waste haul route from a loading unit to a dump is utilized to define the haul path of an AHT (Figure 3.2). The model mine assumes that an AHT is loaded and then travels out of the loading zone. The AHT then progresses along the pit floor, up the pit ramp, across a surface haul road, up a dump ramp, across the dump bench, and into the dump zone. The truck then dumps its load and returns along the same path to the loading unit. The model only assumes waste haulage; however, the risk profile of a haul to a run-of-mine stockpile or crusher is a reduction in exposure due to typically shorter distance traveled and the removal of a dozer within the dump zone. Dump Zone Empty AHT Dump Bench Surface Road Loading Zone Full AHT Pit Floor 38
Colorado School of Mines
Table 3.3: Model AOZ Segments. Segment Length (m) Speed (kph) Opposing Speed (kph) Duration(s) Load NA NA NA 240 Loading Area 200 30 30 24 Pit Floor 300 50 50 22 Pit Ramp 1,000 15 30 240 Surface Road 500 50 50 36 Dump Ramp 300 15 30 72 Dump Bench 300 50 50 22 Dump Area 200 30 30 24 Dump NA NA NA 180 Dump Area 200 30 30 24 Dump Bench 300 50 50 22 Dump Ramp 300 30 15 36 Surface Road 500 50 50 36 Pit Ramp 1,000 30 15 120 Pit Floor 300 50 50 22 Loading Area 200 30 30 24 AHT Frequency is utilized to calculate the number of interactions between an AHT and an MMM. Three types of AHT-MMM exposures occur within the model: oncoming traffic, dovetail traffic, and AHT-MMM working interactions. The latter type of exposure is modeled in two ways: loading or dozing and tramming or grading. Loading or dozing is modeled by multiplying the AHT frequency, the total shifts that an operator is onsite in a year, length of shift, and the time that a machine is within 30 meters until it comes to a stop. The exposure from an AHT backing towards a RO is then reduced by the risk of fatality and portion of a shift that an operator is present in the machine. = 𝐹𝐹𝑎𝑎𝜆𝜆𝑎𝑎𝐶𝐶𝑇𝑇𝜆𝜆𝐶𝐶𝑊𝑊𝑒𝑒𝑇𝑇𝑆𝑆ℎ𝜆𝜆𝑒𝑒𝑎𝑎𝐸𝐸𝑥𝑥𝐸𝐸𝑜𝑜𝑚𝑚𝐸𝐸𝑜𝑜𝑒𝑒𝐿𝐿𝐷𝐷𝐷𝐷𝑆𝑆𝐷𝐷𝐷𝐷𝐿𝐿𝐷𝐷𝐷𝐷𝐷𝐷𝐷𝐷𝐷𝐷𝐷𝐷𝐷𝐷𝐿𝐿 × × × (3.5) × 𝐴𝐴𝐴𝐴𝑇𝑇𝐹𝐹𝐷𝐷𝐿𝐿𝐹𝐹𝐷𝐷𝐿𝐿𝐷𝐷𝐹𝐹𝐹𝐹 𝑆𝑆ℎ𝑇𝑇𝑖𝑖𝜆𝜆𝑚𝑚𝑇𝑇𝐷𝐷𝜆𝜆𝐷𝐷𝑇𝑇 𝑆𝑆ℎ𝑇𝑇𝑖𝑖𝜆𝜆𝑈𝑈𝜆𝜆𝐷𝐷𝑇𝑇𝐷𝐷𝐷𝐷𝐿𝐿𝑆𝑆𝑇𝑇𝐷𝐷𝑆𝑆𝐿𝐿 𝑇𝑇𝑇𝑇𝑆𝑆𝑒𝑒𝐵𝐵𝐷𝐷𝐹𝐹𝐵𝐵𝐷𝐷𝑆𝑆 𝑅𝑅𝑇𝑇𝑚𝑚𝑅𝑅𝐹𝐹𝐷𝐷𝜆𝜆𝐷𝐷𝑇𝑇𝐷𝐷𝜆𝜆𝐹𝐹 𝑆𝑆ℎ𝑇𝑇𝑖𝑖𝜆𝜆𝐿𝐿𝐿𝐿𝐷𝐷𝐿𝐿𝜆𝜆ℎ Tramming of loading units and dozers is handled in the same way that a motor grader working within a segment is handled. By multiplying the frequency of AHTs and the time spent within the haulage path of the AHTs, a total time of exposure can be calculated. The buildup of 40
Colorado School of Mines
the exposure is nearly identical to the previous equation with the backup time replaced by an average exposure time within the haulage cycle. Average exposure time is a weighted average of the AHS exposure by segment times. The average is weighted by the segment duration. = 𝐹𝐹𝑎𝑎𝜆𝜆𝑎𝑎𝐶𝐶𝑇𝑇𝜆𝜆𝐶𝐶𝑊𝑊𝑒𝑒𝑇𝑇𝑆𝑆ℎ𝜆𝜆𝑒𝑒𝑎𝑎𝐸𝐸𝑥𝑥𝐸𝐸𝑜𝑜𝑚𝑚𝐸𝐸𝑜𝑜𝑒𝑒𝑇𝑇𝐷𝐷𝐷𝐷𝑆𝑆𝑆𝑆𝐷𝐷𝐷𝐷𝐿𝐿𝐷𝐷𝐷𝐷𝐺𝐺𝐷𝐷𝐷𝐷𝑆𝑆𝐷𝐷𝐷𝐷𝐿𝐿 × × × (3.6) × 𝐴𝐴𝐴𝐴𝑇𝑇𝐹𝐹𝐷𝐷𝐿𝐿𝐹𝐹𝐷𝐷𝐿𝐿𝐷𝐷𝐹𝐹𝐹𝐹 𝑆𝑆ℎ𝑇𝑇𝑖𝑖𝜆𝜆𝑚𝑚𝑇𝑇𝐷𝐷𝜆𝜆𝐷𝐷𝑇𝑇 𝑆𝑆ℎ𝑇𝑇𝑖𝑖𝜆𝜆𝑈𝑈𝜆𝜆𝐷𝐷𝑇𝑇𝐷𝐷𝐷𝐷𝐿𝐿𝑆𝑆𝑇𝑇𝐷𝐷𝑆𝑆𝐿𝐿 𝐴𝐴𝐴𝐴𝑇𝑇𝑊𝑊𝐿𝐿𝐷𝐷𝐿𝐿ℎ𝜆𝜆𝐿𝐿𝑆𝑆𝐴𝐴𝐴𝐴𝐿𝐿𝐷𝐷𝐷𝐷𝐿𝐿𝐿𝐿𝐸𝐸𝐸𝐸𝑆𝑆𝐷𝐷𝐸𝐸𝐷𝐷𝐷𝐷𝐿𝐿 𝑅𝑅𝑇𝑇𝑚𝑚𝑅𝑅𝐹𝐹𝐷𝐷𝜆𝜆𝐷𝐷𝑇𝑇𝐷𝐷𝜆𝜆𝐹𝐹 𝑆𝑆ℎ𝑇𝑇𝑖𝑖𝜆𝜆𝐿𝐿𝐿𝐿𝐷𝐷𝐿𝐿𝜆𝜆ℎ The remaining exposures are related to travel time spent within the haulage cycle. When in a haulage cycle, oncoming exposure is calculated in a similar way to the other exposures. It is calculated by multiplying the frequency of AHT interactions by the exposure time within a segment. Because the AHT and RO are both moving, the issue of dilation due to the Doppler Effect must be addressed. Conceptually, the AHT frequency behaves as if it is the emitter or source frequency in a doppler calculation. The speed of the medium in the doppler calculation is the opposing speed of the segment. The RO is exposed to the source frequency and is travelling towards the source frequency at the speed of the segment. The result of this calculation is an increased relative AHT frequency. The total exposure for the segment is then calculated by multiplying the relative AHT frequency by the duration of the segment and the AHT exposure by segment. The sum of the exposure segments results in the total exposure per haulage cycle. And the total exposure is calculated by the total number of cycles expected for each role. = 𝐴𝐴𝐴𝐴𝑇𝑇𝑅𝑅𝐿𝐿𝑇𝑇𝐷𝐷𝜆𝜆𝐷𝐷𝐴𝐴𝐿𝐿𝐹𝐹𝐷𝐷𝐿𝐿𝐹𝐹𝐷𝐷𝐿𝐿𝐷𝐷𝐹𝐹𝐹𝐹 + × (3.7) 𝑆𝑆𝑒𝑒𝑆𝑆𝑆𝑆𝑒𝑒𝑎𝑎𝜆𝜆𝑂𝑂𝑆𝑆𝑆𝑆𝐷𝐷𝐸𝐸𝐸𝐸𝐷𝐷𝐷𝐷𝐿𝐿𝑆𝑆𝑆𝑆𝐿𝐿𝐿𝐿𝑆𝑆 𝑆𝑆 𝑒𝑒𝑆𝑆𝑆𝑆𝑒𝑒𝑎𝑎𝜆𝜆𝑆𝑆𝑆𝑆𝐿𝐿𝐿𝐿𝑆𝑆 𝐴𝐴𝐴𝐴𝑇𝑇𝐹𝐹𝐷𝐷𝐿𝐿𝐹𝐹𝐷𝐷𝐿𝐿𝐷𝐷𝐹𝐹𝐹𝐹 𝑆𝑆𝑒𝑒𝑆𝑆𝑆𝑆𝑒𝑒𝑎𝑎𝜆𝜆𝑂𝑂𝑆𝑆𝑆𝑆𝐷𝐷𝐸𝐸𝐸𝐸𝐷𝐷𝐷𝐷𝐿𝐿𝑆𝑆𝑆𝑆𝐿𝐿𝐿𝐿𝑆𝑆 41
Colorado School of Mines
= 𝐹𝐹𝑎𝑎𝜆𝜆𝑎𝑎𝐶𝐶𝑇𝑇𝜆𝜆𝐶𝐶𝑊𝑊𝑒𝑒𝑇𝑇𝑆𝑆ℎ𝜆𝜆𝑒𝑒𝑎𝑎𝐸𝐸𝑥𝑥𝐸𝐸𝑜𝑜𝑚𝑚𝐸𝐸𝑜𝑜𝑒𝑒𝑂𝑂𝐷𝐷𝐹𝐹𝐷𝐷𝑆𝑆𝐷𝐷𝐷𝐷𝐿𝐿 × × ×𝑇𝑇𝑜𝑜𝜆𝜆𝑎𝑎𝐶𝐶𝐶𝐶𝐶𝐶𝐶𝐶𝐶𝐶𝑒𝑒𝑚𝑚 (3.8) 𝐴𝐴𝐴𝐴𝑇𝑇𝑅𝑅𝐿𝐿𝑇𝑇𝐷𝐷𝜆𝜆𝐷𝐷𝐴𝐴𝐿𝐿𝐹𝐹𝐷𝐷𝐿𝐿𝐹𝐹𝐷𝐷𝐿𝐿𝐷𝐷𝐹𝐹𝐹𝐹 𝐴𝐴𝐴𝐴𝑇𝑇𝐸𝐸𝐸𝐸𝑆𝑆𝐷𝐷𝐸𝐸𝐷𝐷𝐷𝐷𝐿𝐿𝑏𝑏𝐹𝐹𝑆𝑆𝐿𝐿𝐿𝐿𝑆𝑆𝐿𝐿𝐷𝐷𝜆𝜆 𝑆𝑆𝑒𝑒𝑆𝑆𝑆𝑆𝑒𝑒𝑎𝑎𝜆𝜆𝐷𝐷𝐷𝐷𝐷𝐷𝐷𝐷𝜆𝜆𝐷𝐷𝐷𝐷𝐷𝐷 � 𝑅𝑅𝑇𝑇𝑚𝑚𝑅𝑅𝐹𝐹𝐷𝐷𝜆𝜆𝐷𝐷𝑇𝑇𝐷𝐷𝜆𝜆𝐹𝐹 Dovetailing exposure is calculated by determining the average distribution of AHTs within the haulage cycle and multiplying it by the weighted average exposure from AHTs. This represents the portion of a haulage cycle within 30 meters of an AHT. The total cycles of a role are then multiplied by this exposure to determine the total exposure which is then reduce by the risk of fatality. = 𝐹𝐹𝑎𝑎𝜆𝜆𝑎𝑎𝐶𝐶𝑇𝑇𝜆𝜆𝐶𝐶𝑊𝑊𝑒𝑒𝑇𝑇𝑆𝑆ℎ𝜆𝜆𝑒𝑒𝑎𝑎𝐸𝐸𝑥𝑥𝐸𝐸𝑜𝑜𝑚𝑚𝐸𝐸𝑜𝑜𝑒𝑒𝐷𝐷𝐷𝐷𝐴𝐴𝐿𝐿𝜆𝜆𝐷𝐷𝐷𝐷𝑇𝑇𝐷𝐷𝐷𝐷𝐿𝐿 × × × (3.9) 𝑇𝑇𝑜𝑜𝜆𝜆𝑎𝑎𝐶𝐶𝐶𝐶𝐶𝐶𝐶𝐶𝐶𝐶𝑒𝑒𝑚𝑚 𝐶𝐶𝐶𝐶𝐶𝐶𝐶𝐶𝑒𝑒𝑇𝑇𝑇𝑇𝑆𝑆𝑒𝑒 𝐴𝐴𝐴𝐴𝑇𝑇𝐹𝐹𝐷𝐷𝐿𝐿𝐹𝐹𝐷𝐷𝐿𝐿𝐷𝐷𝐹𝐹𝐹𝐹 𝐴𝐴𝐴𝐴𝑇𝑇𝑊𝑊𝐿𝐿𝐷𝐷𝐿𝐿ℎ𝜆𝜆𝐿𝐿𝑆𝑆𝐴𝐴𝐴𝐴𝐿𝐿𝐷𝐷𝐷𝐷𝐿𝐿𝐿𝐿𝐸𝐸𝐸𝐸𝑆𝑆𝐷𝐷𝐸𝐸𝐷𝐷𝐷𝐷𝐿𝐿 𝑅𝑅𝑇𝑇𝑚𝑚𝑅𝑅𝐹𝐹𝐷𝐷𝜆𝜆𝐷𝐷𝑇𝑇𝐷𝐷𝜆𝜆𝐹𝐹 Intersections are included on the fault tree but were not included in this model. This model represents a simplified closed loop system. The addition of a more complex system of roads will increase the exposures experienced within an AOZ; however, the increase is not anticipated to be significant. The impact to exposure can be explored by envisioning a duplicate parallel set of segments and their impact on exposures. This scenario would double the number of exposures within the AOZ. The opposite hypothetical scenario would be a set of segments 90 degrees to the initial modeled segments. This would result in only one crossing. This single crossing could be represented as a single 30-meter-long segment with double the frequency of AHT interactions. The overall impact to AHT exposure in the 90-degree case would be minute in comparison to all interactions experienced along the entire haul route. Therefore, it was assumed that intersections do not materially affect the AHT exposures. The combination of the cause of event or incident and the fatality weighted exposure within the AOZ can be expressed as a fault tree Figure 3.3. The fault tree is specific for each role and should be calculated to determine the minimum level of risk mitigation necessary to reach the maximum tolerable risk for the site. 42
Colorado School of Mines
short while the AHT passes a manned machine. The exception is during the loading or dumping phase of the haulage cycle; however, this exposure is offset by the reduced risk of interactions between AHTs and loading units or dozers due to size and area geometries. All calculations result in the fatality weighted exposure for the role. Loading Unit Operator Role: Loading unit operators operate shovels, excavators, and large front-end loaders within the mine. Typically, shovels and excavators operate within a relatively limited area while front end loaders can more quickly traverse the mine site. Exposure: The loader’s principal exposure to the AHTs is during loading operations. They also experience limited exposure during their travel from the loading unit during shift changes and breaks. It is assumed that a loading unit operator makes four trips through the AOZ per shift for shift change and breaks. The chance of a fatality if an incident occurs while traveling in a LV is greater than while operating an HME, but the exposure period is much lower. During production, the operator would be exposed to EMESRT scenario class L2. While tramming a loading unit to another location, the operator would be exposed to the following EMESRT scenario classes: L1, L2, L4, L5, L6, L7, C1, C2, T2, T3, and T4. Tramming is expected to happen a few times per month and was assumed to represent 5% of an average shift. Consequence: For excavators loading from a bench above the AHT, the consequence is very limited due to difficulty in reaching the excavator. For shovels loading on the same bench as an AHT, the consequence is also very limited due to size differences. An AHT does not even reach the cab of the shovel. It is assumed that the chance of a fatality due to an AHT and a loading unit collision is 5%. DMIRS and MSHA fatalities databases indicate incident rates were non-existent or too infrequent to provide useful insight. The consequence of a collision while being transported in a LV to the loading unit would likely be a fatality. The assumed chance of fatality is 90%. Motor Grader Operator Role: The motor grader operator’s primary task is maintenance of the haul roads. In static lane sections of the AOZ, the operator will maintain sections of the haul road adjacent to AHTs. 48
Colorado School of Mines
The lane segment adjacent to the motor grader will be treated as a single lane to allow the machine to pass maintenance activities. Exposure: Motor grader operators are exposed to the risk of AHTs passing them in the opposing lane and AHTs overtaking them from behind. During maintenance operations, the operator may be exposed to the following EMESRT scenario classes: L1, L4, L5, L6, L7, C1, C2, C3, T2, T3, and T4. During tramming to another location, the operator may be exposed to the following EMESRT scenario classes: L1, L2, L4, L5, L6, L7, C1, C2, T2, T3, and T4. During a typical shift, it is assumed that motor grader operators spend 60% of their time maintaining static autonomous lanes and make four trips through the AOZ tramming between work areas. Consequence: The consequence of a collision of an AHT with a motor grader is much lower than with a LV, but higher than a loading unit. It is assumed that the chance of a fatality due to an AHT and a motor grader collision is 50%. Water Cart/Truck Operator Role: The water truck/cart operator role is to apply water to the roadways to minimize dust and improve road reliability. Typically, a water truck/cart collects a load from outside the AOZ, or from within an exclusion zone within the AOZ, and then applies water to the static lanes of the AOZ. If they were required to apply water to a dynamic zone within the AOZ, an exclusion boundary would be utilized to isolate the water truck/cart from any AHTs. Exposure: Water truck/cart operators are primarily exposed to AHTs while they water the static lanes of an AOZ. During operations, the operator would be exposed to the following EMESRT scenario classes: L1, L2, L4, L5, L6, L7, C1, C2, T2, T3, and T4 (Figure 2.8). It is assumed that during a shift a water cart/truck completes twenty haulage cycles per average shift. Consequence: The consequence of a collision of an AHT with a water cart/truck is much lower than with a LV, but higher than a loading unit. It is assumed that the chance of a fatality due to an AHT and a water cart/truck collision is 20%. 49
Colorado School of Mines
Dozer Operator (Dump) Role: Dozer operators located at a dump are tasked with spotting dump loads, pushing off loads, and maintaining the dump area. Depending on specific site operating procedures, dozers may operate within the dynamic lane area of a dump or may be precluded from entering an active dump area. Exposure: If dozers are allowed to operate within the dynamic lane portion of the dump, the operator’s principal exposure to the AHTs is during dumping operations. They also have limited exposure during travel to and from their dozer during shift changes and breaks. During production, the operator would be exposed to the following EMESRT scenario classes: L1, L2, L4, L5, L6, L7, C1, C2, and C3. During tramming of a dozer to another location, the operator would be exposed to the following EMESRT scenario classes: L1, L2, L4, L5, L6, L7, C1, C2, T2, T3, and T4; but this scenario may only happen a few times per month. Consequence: The consequence of a collision of an AHT with a dozer is much lower than with a LV, but higher than a loading unit. It is assumed that the chance of a fatality due to an AHT and a dozer collision is 20%. Wheel Loader/Dozer Operator (Clean-up) Role: Wheel Loader/Dozer operators tasked with clean-up near a loading area generally operate within an exclusion zone. The clean-up dozer typically operates on the opposite side of the loading unit. They are utilized to clean-up the area utilized by trucks being loaded by the shovel. Exposure: When a dozer trams from one location to another, the operator would be exposed to the following EMESRT scenario classes: L1, L2, L4, L5, L6, L7, C1, C2, T2, T3, and T4 (Figure 2.8). It is assumed that a clean-up dozer makes four LV trips through the AOZ, spends 10% of an average shift tramming, and 20% of its working time exposed to passing AHTs. Consequence: The consequence of a collision of an AHT with a dozer is much lower than with a LV, but higher than a loading unit. It is assumed that the chance of a fatality due to an AHT and a dozer collision is 20%. 50
Colorado School of Mines
AHS Pit Supervisor, Pit Technician, and Wi-Fi Technician Role: All three roles continually patrol the AOZ to address and correct issues within the AOZ. They also often function as a shuttle driver for HME operators for shift changes, breaks, and hot seating. Exposure: The principal exposure of these roles to AHTs is during their drive within or between locations. When an they drive from one location to another, they would be exposed to the following EMESRT scenario classes: L1, L2, L4, L5, L6, L7, C1, C2, T2, T3, and T4 (Figure 2.8). These roles experience minimal risk while parked and observing a production area. They are following procedure and are maintaining a sufficient buffer or barrier from haulage ways. It is assumed that these roles each make ten full haulage cycles worth of travel each shift. This is half the number of trips of a water cart/truck and about a third of the number of trips that each AHT makes. Consequence: The consequence of a collision would likely be a fatality due to the location of the supervisor in a LV. The assumed chance of fatality is 90%. Fitter/Mechanic (Service Truck) Role: The fitter/mechanic will travel throughout the AOZ servicing and repairing HME. Actual servicing occurs within an exclusion zone of the AOZ and greatly reduces the exposure to AHT risks. Exposure: A fitter/mechanic’s principal exposure to the AHTs is during their drive between service locations. They would be exposed to the following EMESRT scenario classes: L1, L2, L4, L5, L6, L7, C1, C2, T2, T3, and T4 (Figure 2.8). They have minimal risk while parked as long as they follow procedure and are maintaining a sufficient buffer or barrier from the haulage ways. It is assumed that these roles each make 5 full haulage cycles worth of travel each shift. Consequence: The consequence of a collision would likely be a fatality due to the fitter/mechanic being in an LV. The assumed chance of fatality is 90%. However, fitter/mechanics are rarely operating outside an exclusion zone. 51
Colorado School of Mines
3.9 Calculated Exposures and SIL Requirements by Role Table 3.5 details the factors and exposures by role within the AOZ. All LV-only-use from AHS Supervisors, Pit Technicians, and Wi-Fi technicians were combined. From the exposure rates, the cause of event rates, and a maximum tolerable failure rate of 10-5 pa, maximum PFDs was calculated for each primary role within the AOZ. Additional roles were not calculated; however, their exposure hours would be much less than the listed primary roles. Additionally, a SIL requirement based on the broadly acceptable risk (10-6 pa) was calculated for each role. The results are shown in Table 3.4. Table 3.4: Required SIL based on Role. Machine Type Annual Risk Max. Failure Rate Required SIL ALARP SIL Shovel/Excavator 5.0×10-4 7.1×10-2 SIL 2 SIL 3 Motor Grader 3.5×10-4 3.4×10-2 SIL 2 SIL 3 Water Truck/Cart 1.3×10-4 1.3×10-1 SIL 1 SIL 2 Dump Dozer 5.0×10-4 6.4×10-2 SIL 2 SIL 3 Cleanup Dozer 5.0×10-4 6.4×10-2 SIL 2 SIL 3 LV Only 2.9×10-4 5.7×10-2 SIL 2 SIL 3 Service Truck 1.5×10-4 3.4×10-2 SIL 2 SIL 3 3.10 Modifications to an AOZ to Reduce Integrity Targets Modifications to an AOZ could reduce the SIL requirements. The furthest extreme would be complete removal of personnel from the AOZ and would effectively remove the risk to life. Risk would still be associated with equipment or environmental damage. A more reasonable change would be stricter limits on the exposure of manned machines to AHTs. If the rate of exposure is reduced sufficiently, the required SIL could be reduced to a SIL 1. This could allow for the removal of one or more SIS on the AHT. The more subtle change to risk associated with removal of LVs from autonomous zones would not reduce the required SIL level but may reduce the complexity of achieving a SIL 2 rating with the existing SIS. 52
Colorado School of Mines
THEORETICAL SIL OF CURRENT AHS At this time, no manufacturers of AHSs produce a SIL rated system; however, it is likely SIL rated systems will become common place and will eventually be required. Alberta OH&S already requires that AHS meet ISO 17757 and within ISO 17757, which states all safety related functions must comply with functional safety standards (International Organization for Standarization 2019). As more regulatory bodies adopt ISO 17757, AHSs will need to become compliant with functional safety standards. A mine should be able to define its safety integrity targets (SIT) as part of the typical specifications during the request for proposal process. Manufacturers will select from their available hardware and software to meet those requirements. While Caterpillar and Komatsu AHS do not have a rated system, sufficient publicly available information is available on the Caterpillar and Komatsu systems to provide a preliminary evaluation of their hardware and architecture to determine if their systems could be SIL rated. To be SIL rated, a device must satisfy the quantitative random hardware failure rate, or PFD, as well as the qualitative requirements that are not easily quantified. Smith and Simpson summarize the qualitative requirements of the four SIL ratings (Smith and Simpson 2017): • SIL 1 is relatively easy to achieve especially if ISO 9001 practices apply throughout the design. • SIL 2 is not dramatically harder than SIL 1 to achieve although clearly involves more review and tests and thus, has an increased cost. If ISO 9001 practices apply throughout the design, it should not be difficult to achieve. • SIL 3 involves a significantly more substantial increment of effort and competence than is the case from SIL 1 to SIL 2. Specific examples include the need to revalidate the system following design changes and the increased need for operator training. Cost and time will be significant factors and the choice of vendors will be more limited by lack of ability to provide SIL 3 designs. • SIL 4 involves state-of-the-art practices including “formal methods” in design. Cost will be extremely high and competence in all techniques is required. There is a considerable body of opinion that SIL 4 should be avoided and additional levels of protection should be preferred. 54
Colorado School of Mines
It is unlikely that any of the SIS utilized by an AHS would qualify as a SIL 3 or SIL 4, but it is also unnecessary. Due to the low exposure rates within the AOZ, a combination of SIL 1 and SIL 2 systems should provide sufficient risk reduction. 4.1 Layers of Protection in the Current Deployments Layers of protection of current AHS installations were addressed in Section 2.1. Layers of protection are not necessarily SIS. While manufacturers may argue that all the layers of protection are safety systems, AOZ access control, site procedures, and situational awareness would likely not meet the requirements of IEC 61508 and IEC 61511. A revised AHS layers of protection can be seen in Figure 4.1.The AOZ access control system and site procedures would be classified as an external independent layer of protection. The impact to fault tree analysis are reflected in exposure factor, fatality factor, and shift factor. The division of the resultant factor and the maximum tolerable failure rate results in safety integrity targets from the last chapter. The remaining layers of protection are represented in the right side of a typical fault tree analysis. It should be noted that situational awareness is critical to the BPCS and is not considered a SIS, Figure 4.2. Figure 4.1. AHS Layers of Protection showing external IPLs in green. SIS in gray. 55