Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
METHOD FOR OPERATING A SERVICE SYSTEM
Document Type and Number:
WIPO Patent Application WO/2017/157465
Kind Code:
A1
Abstract:
The present invention relates to a method for operating one or more service systems, said method performed in a memory of an analyzing entity, 'AΕ', comprising the steps of a) receiving, by an input interface of said AE, one or more control requests for controlling one or more resources of at least one of said one or more service systems, b) assessing, by said AE, the impact on said one or more service systems of said one or more control requests by checking the effect on already performed control requests for resources of said one or more service systems when said one or more control requests would be performed on one or more of the resources of said at least one of one or more service systems, c) checking, by said AE, if said assessed impact violates one or more adverse situation rules, 'ASR', an ASR violation representing a situation of the service system in which at least partly contradicting effects on one or more resources of said one or more service systems would occur due to a performance of said one or more control requests, d) upon violation of one or more ASR, computing, by said AE, one or more adapted control requests for one or more of said control requests and/or one or more of said already performed control requests, said computing being directed to reduce violation of said ASR, e) negotiating, by said AE, with requestors of said one or more of said control requests and/or said one or more of said already performed control requests, said computed adapted control requests, said negotiating may include one or more recomputed adapted control requests, until acceptance is achieved, f) upon acceptance, transmitting, by said AE, the accepted control requests via an output interface to recipients of said control requests.

Inventors:
SCHMIDT MISCHA (DE)
SCHUELKE ANETT (DE)
Application Number:
PCT/EP2016/055997
Publication Date:
September 21, 2017
Filing Date:
March 18, 2016
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
NEC EUROPE LTD (DE)
International Classes:
G05B15/02; G05B19/042
Domestic Patent References:
WO2011131753A12011-10-27
WO2014124353A12014-08-14
WO2009050674A12009-04-23
WO2013171234A12013-11-21
Foreign References:
US20150198345A12015-07-16
US8615312B22013-12-24
US20110035229A12011-02-10
US20130232267A12013-09-05
US7031793B12006-04-18
Other References:
RUTA, M.; SCIOSCIA, F.; LOSETO, G.; DI SCIASCIO, E.: "Semantic-Based Resource Discovery and Orchestration in Home and Building Automation: A Multi-Agent Approach", INDUSTRIAL INFORMATICS, IEEE TRANSACTIONS ON, vol. 10, no. 1, February 2014 (2014-02-01), pages 730 - 741, XP011533959, DOI: doi:10.1109/TII.2013.2273433
Attorney, Agent or Firm:
ULLRICH & NAUMANN (DE)
Download PDF:
Claims:
C l a i m s

1. A method for operating one or more service systems, said method performed in a memory of an analyzing entity, ΆΕ',

comprising the steps of

a) receiving, by an input interface of said AE, one or more control requests for controlling one or more resources of at least one of said one or more service systems,

b) assessing, by said AE, the impact on said one or more service systems of said one or more control requests by checking the effect on already performed control requests for resources of said one or more service systems when said one or more control requests would be performed on one or more of the resources of said at least one of one or more service systems,

c) checking, by said AE, if said assessed impact violates one or more adverse situation rules, 'ASR', an ASR violation representing a situation of the service system in which at least partly contradicting effects on one or more resources of said one or more service systems would occur due to a performance of said one or more control requests,

d) upon violation of one or more ASR, computing, by said AE, one or more adapted control requests for one or more of said control requests and/or one or more of said already performed control requests, said computing being directed to reduce violation of said ASR, e) negotiating, by said AE, with requestors of said one or more of said control requests and/or said one or more of said already performed control requests, said computed adapted control requests, said negotiating may include one or more recomputed adapted control requests, until acceptance is achieved,

f) upon acceptance, transmitting, by said AE, the accepted control requests via an output interface to recipients of said control requests.

2. The method according to claim 1 , wherein for assessing the impact on said one or more service systems, operational parameters representing behavior of said one or more service systems and/or contextual information is evaluated. 3. The method according to claim 2, wherein said operational parameters and/or said contextual information is provided by a neural network and/or a database.

4. The method according to one of the claims 1 -3, wherein for determining an ASR violation energy consumption constraints like peak load thresholds or the like are evaluated.

5. The method according to one of the claims 1 -4, wherein an ASR is provided in form of a logical expression of one or more conditions of said one or more service systems which are not permissible.

6. The method according to one of the claims 1-5, wherein for at least step b) and/or d) sensor information of sensors and actuator information of actuators of resources of said one or more service systems is provided.

7. The method according to claim 6, wherein said sensor information and said actuator information includes energy consumption information of said resources.

8. The method according to one of the claims 1 -7, wherein steps c)-f) are performed for already admitted control requests in pre-defined time-intervals and/or periodically.

9. The method according to claim 2, wherein said operational parameters are evaluated dynamically.

10. The method according to one of the claims 1 -9, wherein for determining a violation of one or more ASR effects of different control requests are weighed against each other.

1 1. The method according to claim 10, wherein said weights are dependent on the time a request is already admitted or on a value of an operational parameter on which said request has an impact or weights are determined based on external information.

12. The method according to one of the claims 1 -1 1 , wherein a algebra is computed to identify possible valid adaptions to control requests.

13. The method according to one of the claims 1 -12, wherein relative importance rankings are determined and used during and for said negotiation.

14. A computing entity, comprising

an input interface for receiving one or more control requests for controlling one or more resources of one or more service systems,

an output interface for transmitting accepted control requests to recipients of said control requests,

computation means comprising a processor and a memory, being adapted - to receive from said input interface one or more control requests for controlling one or more resources of at least one of said one or more service system - to assess the impact on said one or more service systems of said one or more control requests by checking the effect on already performed control requests for resources of said one or more service systems, when said one or more control requests would be performed on one or more of the resources of said at least one of said one or more service systems,

- to check if said assessed impact violates one or more adverse situation rules, 'ASR', an ASR violation representing a situation of the service system in which at least partly contradicting effects on one or more resources of said one or more service systems would occur due to a performance of said one or more control requests,

- upon violation of one or more ASR to compute one or more adapted control requests for one or more of said control requests and/or one or more of said already performed control requests, said computing being directed to reduce violation of said ASR, - to negotiate with requestors of said one or more of said control requests and/or said one or more of said already performed control requests, said computed adapted control requests, said negotiating may include one or more recomputed adapted control requests, until acceptance is achieved, and upon acceptance and

- to transmit the accepted control requests via said output interface to recipients of said control requests.

15. A non-transitory computer readable medium storing a program causing a computer to execute a method for operating one or more service systems, said method comprising the steps of

a) Receiving one or more control requests for controlling one or more resources of at least one of said one or more service systems b) Assessing the impact on said one or more service systems of said one or more control requests by checking the effect on already performed control requests for resources of said one or more service systems, when said one or more control requests would be performed on one or more of the resources of said at least one of said one or more service system,

c) Checking if said assessed impact violates one or more adverse situation rules, 'ASR', an ASR violation representing a situation of one or more service systems in which at least partly contradicting effects on one or more resources of said one or more service systems would occur due to a performance of said one or more control requests, d) Upon violation of one or more ASR, computing one or more adapted control requests for one or more of said control requests and/or one or more of said already performed control requests, said computing being directed to reduce violation of said ASR,

e) Negotiating with requestors of said one or more of said control requests and/or said one or more of said already performed control requests, said computed adapted control requests, said negotiating may include one or more recomputed adapted control requests, until acceptance is achieved, Upon acceptance, transnnitting the accepted control requests output interface to recipients of said control requests.

Description:
METHOD FOR OPERATING A SERVICE SYSTEM

The present invention relates to a method for operating a service system. The present invention further relates to a computing entity.

Even further the present invention relates to a non-transitory computer readable medium storing a program, causing a computer to execute a method for operating a service system.

Although applicable to any kind of management system, the present invention will be described with regard to managing resources of building service systems controlled by building management systems BMS. Conventional building management systems BMS, also referred to as building control or building automation systems - these terms are interchangeably used in this application - are modeled in a three layer architecture comprising

- a management layer as to which monitoring and control systems are associated

- an automation layer to which controllers, gateways or the like are associated and

- a field layer to which sensors, actuators or the like are associated. The management layer enables human interaction and configuration in daily operation. This top layer communicates with automation level gateway devices e.g. via ModBus, M-Bus, EEB, BACnet/IP or OPC protocols to access information from sensing and actuation devices. Typically conventional management level systems are referred to as SCADA. SCADA-like systems are applicable to controlling various kinds of service provisioning systems. Such systems provide specific services to requestors, e.g. heating, ventilation, cooling, water, etc. and are denoted "service systems" in the following. Service systems may share resources, e.g. a gas boiler may provide thermal energy supply to heating systems and hot water systems inside a single building. Thus service systems may be inter-dependent. Service systems may also be inter-dependent due to other reasons, e.g. the physical layout of the building: a room cooled by air conditioning may share a wall with a room being heated. Service systems' behaviors are controlled by the BMS automation and field layers under guidance of the management layer.

BMS have usually a large amount of different sensors, actuators and controllers. Operators of a BMS try to enhance the efficiency of the service systems to save costs, etc.

The specific optimization of a single service system (e.g. a heating, ventilation and air-conditioning system HVAC) or e.g. a single area (e.g. floor or single office area) with respect to one or more defined key performance indicators KPI lacks the consideration of side effects on other systems or areas of the entire building and can have adverse impacts on total energy consumption or other applications' KPIs. In the EU FP-7 research projects CAMPUS21 and BaaS, the developed supervisory single system heating control optimizations are examples of specialized conventional applications using a networked BMS via a standardized request interface.

In a conventional SCADA setting, human staff's changes to the operational parameters of a single system, e.g. the HVAC supply temperatures, can have effects on other areas. The effects of changes are hard to predict even for expert users. For example a change to a system operation schedule or an adaptation of a supply temperature set-point curve can have significant effects on other systems by unforeseen interdependencies.

In conventional building management settings, SCADA systems have configured with permissible ranges of allowed control parameters and use credentials to protect against changes of configuration or control pattern. However these ranges are set statically and do not dependent on the operational context. Due to this conventional systems are over-dimensioned subject to a so-called coincidence factor describing the probability of coinciding requests/demands. If operational reality deviates from this, resource shortages occur. The dimensioning of service systems due to coincidence factor is a trade-off: conservative estimates ensure operations but come at the cost of over dimensioned systems while optimistic estimates run the risk of frequent shortages and conflicts. For instance an installed boiler capacity of a building is dimensioned by a peak load of different heat consuming systems (HVAC, space heating, hot water, potentially special systems like grass heating) expected to coinciding at most. As system configurations change, usage patterns and weather change, as well as refurbishment measures, e.g. replacement of boilers or heat exchangers over the lifetime of a building, situations can arise where the expected coincidence does not match reality anymore. Two negative scenarios can be conceived:

1. ) In case the heat supply capacity is insufficient, adverse effects or conflicts on all or only a subset of the systems are expected. Typically, these systems will react with increases in demand (e.g. by indicating increased system supply temperatures resulting in increased heat exchanger valve openings on the overall supply circuit) worsening the overall heating situation further.

2. ) In situations where the installed heat supply peak capacity is just sufficient, the boiler may run outside of maximum efficiency operation ranges.

In particular thermal systems such as space heating, hot water and cooling typically have much flexibility: e.g. indoor temperature controls usually aim at staying within a target temperature band (e.g. 20°C ± 1°C). Further by varying supply temperature set points they have flexibility in energy consumption and duration of operation.

In WO2013/171234 conflicts are detected and resolved by distributed orchestration engines hosted in e.g. PLC components. They detect that multiple conflicting requests have been received. The detected conflicts are communicated on a so-called service bus and are resolved by SCADA or Manufacturing Execution Systems (MES). In US8615312 an orchestration engine is defined based on High Level Petri Nets (HLPN) defining the orchestration engine behavior to orchestrate service oriented service systems. No conflicts are resolved. In US201 10035229 also covers orchestration of services offered by service- oriented automation components of a manufacturing facility from one manufacturing level to a higher level such as the corporate, business and/or production level. No conflict resolution is described. In US20130232267 resource requests in a communication network are resolved by applying policies to network flows based on the aggregated resource availability, e.g. using priorities and admitting or rejecting flows completely.

Further in US7031793 a method for conflict resolution is described among a plurality of controllers. By adapting the control instructions, e.g. based on mathematical models in a multi-tiered architecture conflicts are detected and resolved.

Even further in the non-patent literature of Ruta, M.; Scioscia, F.; Loseto, G.; Di Sciascio, E., "Semantic-Based Resource Discovery and Orchestration in Home and Building Automation: A Multi-Agent Approach," in Industrial Informatics, IEEE Transactions on, vol.10, no.1 , pp.730-741 , Feb. 2014

doi: 10.1 109/TII.2013.2273433 a multi agent based conflict mediation and resource orchestration on the agent level for building domotics is described between a home agent and a device agent. Conflicts for newly received requests are negotiated on the agent level and based on utility expressions defined upon service preferences, i.e. if one agent's requests directly interfere with another agent's preferences. One of the problems addressed by the present invention is to increase efficiency of service systems. A further problem addressed by embodiments of the present invention is to avoid or at least reduce effects of colliding requests on system resources of a service system as well as interdependent service systems, if present.

An even further problem addressed by embodiments of the present invention is to avoid misconfigurations for example caused by human configuration errors of the service system.

In an embodiment the present invention provides a method for operating one or more service systems, said method performed in a memory of an analyzing entity, ΆΕ',

comprising the steps of

a) receiving, by an input interface of said AE, one or more control requests for controlling one or more resources of at least one of the said one or more service systems,

b) assessing, by said AE, the impact on said one or more service systems of said one or more control requests by checking the effect on already performed control requests for resources of said one or more service systems when said one or more control requests would be performed on one or more of the resources of said at least one of the said one or more service systems,

c) checking, by said AE, if said assessed impact violates one or more adverse situation rules, 'ASR', an ASR violation representing a situation of the one or more service systems in which at least partly contradicting effects on one or more resources of said one or more service systems would occur due to a performance of said one or more control requests, d) upon violation of one or more ASR, computing, by said AE, one or more adapted control requests for one or more of said control requests and/or one or more of said already performed control requests, said computing being directed to reduce violation of said ASR,

e) negotiating, by said AE, with requestors of said one or more of said control requests and/or said one or more of said already performed control requests, said computed adapted control requests, said negotiating may include one or more recomputed adapted control requests, until acceptance is achieved,

f) upon acceptance, transmitting, by said AE, the accepted control requests via an output interface to recipients of said control requests.

In a further embodiment the present invention provides a computing entity, comprising

an input interface for receiving one or more control requests for controlling one or more resources of at least one of one or more service systems,

an output interface for transmitting accepted control requests to recipients of said control requests,

computation means comprising a processor and a memory, being adapted to receive from said input interface one or more control requests for controlling one or more resources of said at least one of one or more service systems,

to assess the impact on said one or more service systems of said one or more control requests by checking the effect on already performed control requests for resources of said one or more service systems, when said one or more control requests would be performed on one or more of the resources of said at least one of one or more service systems,

to check if said assessed impact violates one or more adverse situation rules, 'ASR', an ASR violation representing a situation of the one or more service systems in which at least partly contradicting effects on one or more resources of said one or more service systems would occur due to a performance of said one or more control requests,

upon violation of one or more ASR to compute one or more adapted control requests for one or more of said control requests and/or one or more of said already performed control requests, said computing being directed to reduce violation of said ASR,

to negotiate with requestors of said one or more of said control requests and/or said one or more of said already performed control requests, said computed adapted control requests, said negotiating may include one or more recomputed adapted control requests, until acceptance is achieved, and upon acceptance, to transmit the accepted control requests via said output interface to recipients of said control requests. In an even further embodiment the present invention provides a non-transitory computer readable medium storing a program causing a computer to execute a method for operating one or more service systems, said method comprising the steps of

a) Receiving one or more control requests for controlling one or more resources of at least one of the said one or more service systems b) Assessing the impact on said one or more service systems of said one or more control requests by checking the effect on already performed control requests for resources of said one or more service systems, when said one or more control requests would be performed on one or more of the resources of said at least one of the one or more service systems, c) Checking if said assessed impact violates one or more adverse situation rules, 'ASR', an ASR violation representing a situation of the one or more service systems in which at least partly contradicting effects on one or more resources of said one or more service systems would occur due to a performance of said one or more control requests,

d) Upon violation of one or more ASR, computing one or more adapted control requests for one or more of said control requests and/or one or more of said already performed control requests, said computing being directed to reduce violation of said ASR,

e) Negotiating with requestors of said one or more of said control requests and/or said one or more of said already performed control requests, said computed adapted control requests, said negotiating may include one or more recomputed adapted control requests, until acceptance is achieved, f) Upon acceptance, transmitting the accepted control requests via an output interface to recipients of said control requests.

The term "control request" refers in particular in the claims, preferably in the specification to data or information in form of packets, messages, etc. indicating a request for changing, applying, operating, etc. changes on operating or performing resources. The term "negotiating" refers in particular in the claims, preferably in the specification for example to at least one "round" of steps:

- proposing an amendment of a control request,

- evaluating the proposed amended control request,

- feedback of the evaluated control request, and

- proposing a further amendment of the amended control request if applicable or accept the proposed amended control request.

Then e.g. re-amend the amended control request or accept the proposed amended request, etc. can be performed. Further the term "negotiating" refers preferably in the claims, in particular in the specification to collaboratively agree on a control request or an amended control request.

The term "contextual information" refers preferably in the claims, in particular in the specification to information which may be relevant and/or may be have an impact and/or may be helpful, etc. for operating said service system. Contextual information may be for example day of the week, weather parameters or information queried from service systems, sensors, actuators, etc.

The term "behavior" in connection with "service system" refers preferably in the claims, in particular in the specification to changes, amendments, deviations or the like in the operational performance of the automation system or service system, for example a change in technical operational parameters like temperature, power consumption, or the like or non-technical operational parameters like costs for energy supply, water supply, quality of experience for users of the service system, etc.

Further features, advantages and further embodiments are described or may become apparent in the following: For assessing the impact on said service system, operational parameters representing behavior of said automation system and/or contextual information may be evaluated. This enables a high precision when assessing the impact of control requests on said service system. Said operational parameters and/or said contextual information may be provided by a neural network and/or a database. This allows e.g. in case of a database to provide said contextual information in a fast and reliable way.

For determining said ASR violation energy consumption constraints like peak load thresholds or the like may be evaluated. This enables one of the important characteristics of service systems to be considered, not only having an impact on the physical behavior of the services but also on the non-physical behavior regarding the costs of energy consumption and thus avoiding a waste of energy.

An ASR may be provided in form of a logical expression of one or more conditions of said one or more service systems which are not permissible. This provides an easy and user-friendly way to provide ASRs. For example an explicit logical expression of a condition that is not permissible in combination may be for example space heating supply > 50°C and hot water > 70°C.

For at least step b) and/or step d) sensor information of sensors and actuator information of actuators of resources of said one or more service systems may be provided. This allows an even more precise assessment of the impact of different control requests on the resources of the said one or more service systems.

Said sensor information and said actuator information may include energy consumption information of said resources. This allows in an easy and reliable way to assess the impact of control requests concerning the energy behavior of the service system.

Steps c)-f) may be performed for an already admitted control request in predefined time intervals and/or periodically. This allows to examine the admitted one or more control requests repeatedly against the ASRs and to adapt the operation, for example in case of weather changes or the like.

Said operation parameters may be evaluated dynamically. Operational parameters like peak capacity may then be derived dynamically, for example as function of service system sensor information and/or actuator information, external information services or special services. This enables for example to track degradations in the efficiency of certain resources to restrain the demand to stay within an optimal predefined efficiency operation band of the service system.

For determining a violation of one or more ASR, effects of different control requests may be weighted against each other. This allows in a very flexible way to determine a violation. Said weights may be dependent on the time a request is already admitted or on a value of an operational parameter on which said request has an impact or weights are determined based on external information. For example when said weights are dependent on the time a request is already admitted, this enables to "penalize" long standing requests so that they are more likely to be candidates for modification. If the weights are changed for example anti-proportional to the period of time a control request is being served, newer control requests will become modified stronger than already served requests.

An algebra may be computed to identify possible valid adaptations to control requests. This allows in an easy and reliable way to use only logic service system conditions being expressed in said algebra which enable to identify possible modifications to all control requests so that no ASR is violated.

Relative importance rankings may be determined and used during and for said negotiation. This enables to enhance flexibility since amendments to control requests or the control requests as a whole can be assigned to priority values so that corresponding amendments to the control request are performed according to the priorities. There are several ways how to design and further develop the teaching of the present invention in an advantageous way. To this end it is to be referred to the patent claims subordinate to the independent claims on the one hand and to the following explanation of further embodiments of the invention by way of example, illustrated by the figure on the other hand. In connection with the explanation of the further embodiments of the invention by the aid of the figure, generally further embodiments and further developments of the teaching will be explained.

In the drawings

Fig. 1 shows steps of a method according to an embodiment of the present invention;

Fig. 2 shows steps of a method according to a further embodiment of the present invention;

Fig. 3 shows a system according to an embodiment of the present invention;

Fig. 4 shows a system according to a further embodiment of the present invention; and

Fig. 5 shows steps of a method according to a further embodiment of the present invention.

Fig. 1 shows steps of a method according to an embodiment of the present invention.

In Fig. 1 a method for operating one or more service systems is shown. Said method performed in a memory of an analyzing entity, ΆΕ', comprising the steps of a) receiving, by an input interface of said AE, one or more control requests for controlling one or more resources of at least one of said one or more service systems,

b) assessing, by said AE, the impact on said one or more service systems of said one or more control requests by checking the effect on already performed control requests for resources of said one or more service systems when said one or more control requests would be performed on one or more of the resources of said at least one of one or more service systems,

c) checking, by said AE, if said assessed impact violates one or more adverse situation rules, 'ASR', an ASR defining a situation of the said one or more service systems in which at least partly contradicting effects on one or more resources of said one or more service systems would occur due to a performance of said one or more control requests,

d) upon violation of one or more ASR, computing, by said AE, one or more adapted control requests for one or more of said control requests and/or one or more of said already performed control requests, said computing being directed to reduce violation of said ASR,

e) negotiating, by said AE, with requestors of said one or more of said control requests and/or said one or more of said already performed control requests, said computed adapted control requests, said negotiating may include one or more recomputed adapted control requests, until acceptance is achieved,

f) upon acceptance, transmitting, by said AE, the accepted control requests via an output interface to recipients of said control requests.

Fig. 2 shows steps of a method according to a further embodiment of the present invention.

In Fig. 2 a flow chart of a so-called context aware resource mediation and negotiation for automation systems, 'CARMENAS', is shown.

According to an embodiment the so-called CARMENAS interchangeably used for a system and a method - means here Context Aware Resource Mediation and Negotiation for automation systems - monitors control requests from so-called requestors towards the automation infrastructure and compares the already served requests in combination with a newly received request against rules defining adverse situations. In case one or more of the adverse situation rules, 'ASR', are violated, it will be checked if a reduction of one or more of the requests being already served and the newly received could prevent ASR violation. If at least one combination of reductions can be constructed/computed, these will be communicated for approval to the respective requestors. If agreed by the requestors, the modified requests are enacted.

Since applications have various ways of meeting their KPIs - e.g. a heating system can heat longer at lower temperatures or heat in burst with higher temperature to maintain target indoor temperatures, the negotiation makes it possible for the applications to adapt their decisions.

To perform this concept, CARMENAS is configured

· with system characteristics for service (e.g. Heating) and shared resource systems (e.g. boiler) systems and

• with rules indicating adverse situations.

In the following an example for building systems characteristics is given: a space heating system may consume 20 kW if run at 50°C supply temperature and 30 kW if run at 55°C. The representation of these characteristics can be e.g. in the form of a table for all discrete values of operational parameters, or can be in the form of a function based on an analytical or regression model. Resources of said system may be identified by one or more set points identifiers controlling them.

In a further embodiment the system characteristics may depend on contextual information, e.g. day of week, weather parameters or from information CARMENAS queries or receives from the service systems, e.g. via the BMS or SCADA systems. In general, the system characteristics can be provided or obtained by learning approaches, system databases, configuration by human staff and/or be derived from building and system schematics.

The ASR can be formulated

• in the form of constraints, e.g. energetic constraints evaluated based on system characteristics and permissible peak load, e.g. sum of system demands derived from requests is greater than defined peak capacity and/or

• as explicit logical expressions of conditions that are not permissible in combination, e.g. space heating supply > 50°C and hot water > 70°C. CARMENAS's adverse situation rules ASR can be used to accommodate:

• Detection of demand exceeding maximum supply

• Detection of demand exceeding desired load, e.g. to stay within maximum efficiency bands of boilers (i.e. sum of system demands derived from requests is smaller than defined desirable minimum load)

• Detection of demand undercutting desired minimum load, e.g. to stay within maximum efficiency bands of boilers

• Detection of counteracting effects, e.g. Cooling and Heating systems affecting the same building space.

The CARMENAS method and system may use or be provided with sensor and actuator information for the different service systems consuming energy, e.g. space heating, hot water, HVAC, and the energy generation systems, e.g. the boiler and distribution systems, e.g. the main heating branch to be able to track and adapt to the real building situation. Further the CARMENAS method and system may also access external information such as weather data, weather forecast data, calendar and scheduling information. CARMENAS can act in pre-defined time intervals without a trigger of an external request. This allows to examine the admitted requests repeatedly against the ASRs and adapt operation e.g. in the case of weather changes and may be useful when context specific system characteristics are used. In a further embodiment ASR conditions such as the peak capacity may also be derived dynamically, e.g. as functions of service system sensor and actuator information, external information sources and/or special services. This way, e.g. degradations of boiler efficiency can be tracked to restrain the demand to stay within the optimal efficiency operation band of the building energy supply system.

ASRs can also be given a relative importance rating to distinguish between rules expressing preferred situations from rules capturing critical conditions. ln all cases of ASR violation CARMENAS may report the detection of an adverse situation, its internal state of running systems and/or admitted requestors for diagnostic purposes. To provide adapted requests a determination logic may be used, e.g. performed on a computing device. Said determination logic to adapt requests upon ASR violation may be as follows: It is assumed here that at the time of receiving request Ri from requestor A, other requests RI . . . M are already being served. If admitting R, will result in violating one or more ASRs:

min (∑Wi*ARi ) Vi

subject to

ASR_check() == FALSE

ARi + mod(Ri) = R V i where ARi describes the change to request R,, mod(Ri) describes R, after this change. f(mod(Ri)) describes the system energy consumption if the modified Ri is being employed and w, is a configurable weighting factor that can be set in relation to the building system pertaining to the R,. In a further embodiment the configured weights are rescaled based on the relative system priorities so that∑Wi=1 and ASR_check is a logical (boolean) to check all modified R, against all configured ASRs.

If weights are set equally, this tries to minimize requests' set point changes and will penalize larger consumers. By changing the weights w,, priorities of systems can be encoded according to the systems' importance in the overall operation.

In another embodiment the w, are increased with the time R, being already active or by associated system's total energy consumption due to R, so that requests that long standing requests are more likely to be candidates to modification. By changing w, anti-proportional to the period of time R, is being served, newer requests can become modified stronger than already served requests. ln another embodiment the determination of weights w, may depend on additional information received from external information sources (e.g. weather services) or service system information received from relevant sensors or actuators CARMENAS queries via the SCADA/BMS system. This adaptation of w, might be a system characteristic function encoding e.g. increasing the system's w, the further the system is away from its control target. This way, systems presently close to their control target are more prone to request modifications.

For example, for the peak capacity constraint, a corresponding ASR is violated if ∑f(mod(Ri)) greater than defined peak capacity, where f(mod(Ri)) denotes the energy consumption of the system affected by modified R, - which may be derived from the configured system characteristics.

In a further embodiment, if no energetic constraint ASR is specified and/or additionally or alternatively logical system conditions may be expressed in an algebra which be used to identify the possibly viable modifications to all R, so that no ASR is violated. For this the following logic may identify possible modifications to some of the Ri ...Ri:

Extract for each violated logical ASR the logical components evaluating to TRUE for the different R,, i.e. indicating a violation of the ASR component. Aggregate the R, causing the ASR violations into a candidate set C along with the related ASR components.

Calculate the required minimum modification of the requests in the set C to change the evaluation of the associated components to FALSE. Store these candidate modifications for the negotiation phase.

Once one or more viable modifications are determined by the CARMENAS system the requestors affected by the modifications are contacted with proposed modifications. If all affected requestors agree, the modified requests are communicated to the service systems. The CARMENAS system stores information on the modified R, (and the requestors). If one or more requestors object the modification, the CARMENAS system can be configured with the following one or more procedures, which can be combined: a) If multiple candidate modifications for the same requestor have been conceived, contact the requestor with another candidate modification b) re-run the modification logic assuming the confirmed request modifications (which potentially will be further modified) in addition to the requests for which the corresponding requestors denied the suggested modifications. Then the CARMENAS system will again contact the requestors for the respective newly derived request modifications for their acceptance.

c) re-run the modification logic assuming the confirmed request modifications (which potentially will be further modified) and remove the requests for which the corresponding requestors denied the suggested modifications from the modification logic evaluation. Then the CARMENAS system will again contact the requestors for the respective newly derived request modifications for their acceptance.

d) enforce the proposed modifications despite the objection, e.g. for lower priority service systems. This requires a configuration of the CARMENAS system with system priorities.

e) deny the new request R,

Option a) may be repeated multiple times until all requestors accept the proposed modifications. To prevent endless loops of objections, the CARMENAS system may execute options b) or c) after a) configured number of iterations.

In another embodiment a request modification similar in nature to choosing w, depending on the R, are already being served first the newest incoming request R, is considered to be modified in case of ASR violation. If this is not acceptable to the requestor, only then the standard logic to modify requests is executed. This way, requests served for long time are less likely to be modified.

In another embodiment ASRs are given relative importance ratings as indicated above, and these ratings are used in the negotiation rounds in relation to step a) above: • In the first determination of request modification, all preferred and critical ASRs are considered in ASR_check to determine the proposed modifications

• After receiving less than a minimum required acceptance rate by the requestors to proposed modifications of their respective requests,

ASR_check is modified in its behavior to consider only critical ASRs, ignoring preferred ASRs in determining the modification proposals.

In Fig. 2 a possible flow chart of multiple negotiation rounds with rejected modifications is shown. Variations such as priorities of ASR, priority of systems, enforcement are not shown. Also not shown is interval based invocation and context awareness.

In Fig. 2 when a new request R is received the set of currently served requests if fetched from a state database SDB. The new request R is included into the fetched set S in a first step S1.

In a second step S2 said set S is checked against logical adverse situation rules. In a further step S3 after step S1 associated system characteristics for each entry in the set S are fetched and in a fourth step S4 resource demand is derived from the set S and the associated system characteristics.

In a fifth step S5 it is checked whether one or more other adverse situation rules are violated and if not in a six step S6 the request R is enacted and the request R is added to the set S stored in the state database SDB.

If one or more ASRs are violated then in a seventh step S7 possible modifications to the requests in the set S are calculated/computed and the modifications/modified requests included into a set C are proposed to the requestors. ln an eighth step S8 it is checked whether there are rejections or not. If there are no rejections then in an ninth step S9 the modified requests from the set C are enacted and the database SDB is updated with said set C. If there are rejections then in a tenth step S10 possible modifications to the request in the set S are calculated/computed assuming accepted modifications resulting in a set C * . This set C * is proposed to the requestors. Then in an eleventh step S1 1 it is checked whether there are still rejections for this amended set C * or not. If there are no rejections then in a twelfth step S12 a modified request from said set C * are enacted and the database SDB is updated with said set C * . If there are rejections then step S10 is performed again and further step 1 1 etc.

Fig. 3 shows a system according to an embodiment of the present invention and Fig. 4 shows a system according to a further embodiment of the present invention.

In Figs. 3 and 4 an example for BMS situations, e.g. to account for sub-optimal human configuration changes, is shown, the CARMENAS system being installed between a management level and an automation level. In case expert applications are deployed on top of the management layer, either remotely via a wide area communication network or within the building, the CARMENAS system may alternatively be installed on the interface between the management layer and the application(s) to prevent inappropriate requests even reaching the BMS at all. Both deployments/embodiments also apply to requests initiated by human staff, e.g. changing set points or schedules of heating systems.

If installed on top of management layer, the CARMENAS system will receive control or actuation requests from requestors (specialized building applications deployed inside the building or outside in a cloud setting), e.g. switching the space heating ON with a supply temperature of 70°C.

The following situations can happen if this request was to be accepted based on the active system requests already accommodated and the associated building system characteristics: 1. ) No adverse situation rule ASR is violated: the request is accepted and passed on to the lower layers in the architecture as usual. The CARMENAS system updates its internal state to reflect the consumption just admitted and confirms the request to the requestor. It remembers the requestor.

2. ) One or more adverse situation rules ASR are violated, e.g. because other systems are already using enough energy so that accepting the request would result in an adverse situation: The CARMENAS system will, based on the system consumption characteristics of the currently consuming systems and the requesting system try to modify the request to not violate the adverse situation rules as specified above.

Fig. 3 depicts CARMENAS's deployment in the specialized building application setting using a networked deployment. Here the applications are shown Application's Requests and CARMENAS modifications are exchanged via the Request Interface (Rl * ) transmitted over a Communication Network, e.g. the Internet. CARMENAS instructs admitted or modified requests to the BMS via the request interface (Rl). Generally, Rl * and Rl may use different protocols. Without loss of generality, these specialized applications might also be deployed within the building premises.

In Fig. 4 it is shown how the CARMENAS system or entity can be deployed within building deployments. The CARMENAS system is placed here on the interface between management layer and automation layer and monitors the control requests issued by the management layer. These requests might be triggered by instructions received from specialized applications on top of the management layer. If a legacy protocol on Rl does not support negotiation of requests. Then the CARMENAS system does not require management layer consent to modify requests received on Rl or to modify existing requests in the database SDB to accommodate a new request R. Modified and unmodified requests are passed on via the Rl interface to the automation layer. If the Rl interface protocol supports messages towards the management layer, the CARMENAS system rejects the actuation request with an appropriate error code. Subsequent data queries of the Management Layer to the Automation Layer will detect the modified, enforced actuation value. The CARMENAS system may also reject requests received on Rl completely.

Fig. 5 shows steps of a method according to a further embodiment of the present invention.

In Fig. 5 a sequence diagram for the deployment of the CARMENAS method on top of the management layer is shown. Prior to the start of the sequence, there are already served requests by applications B and C.

1. CARMENAS's decision logic DL implementable on a computing entity receives from a requestor A, e.g. a specialized building application a request.

2. CARMENAS fetches from its State Data Base SDB the currently served requests. At present requests from B and C are being served.

3. CARMENAS fetches the consumption characteristics of the system resources associated to the requests from A, B and C from the system characteristics storage SC.

4. CARMENAS retrieves the stored ASR from the rule storage RS. Thereafter the CARMENAS method checks for any ASR violation. In this sequence it is assumed at least one ASR is being violated. Hence the optional "Calculation of modifications" is executed according to above principles. Here in this exemplary sequence it is assumed that CARMENAS conceives modifications to requests of A, B and C.

5. CARMENAS contacts requestor B about the intended modification to its request. B confirms the suggested modification.

6. CARMENAS contacts requestor C about the intended modification to its request. C confirms the suggested modification.

7. CARMENAS contacts requestor A about the intended modification to its request. A confirms the suggested modification.

8. CARMENAS updates SDB with information regarding the new, i.e. modified, request of A 9. CARMENAS forwards the modified request of A to the Management Layer for enforcement in the building

10. CARMENAS updates SDB with information regarding the modified request of B

1 1. CARMENAS forwards the modified request of B to the Management Layer for enforcement in the building

12. CARMENAS updates SDB with information regarding the modified request of C

13. CARMENAS forwards the modified request of C to the Management Layer for enforcement in the building

This sequence diagram does not show multiple negotiation rounds, rejections of modifications or priorities of rules or systems. Neither it shows the possibility to determine the system characteristics in a context dependent way, e.g. based on external services or based on information the CARMENAS system queries from the management layer.

In a further embodiment the present invention provides a method for mediating control requests in buildings

Comprising the steps of

1) Receiving control requests,

2) System specific assessment of control request impact in operational context considering interdependent requests already served affecting a shared resource,

3) Adversary Situation Rule checking and derivation of possible request modifications in case of ASR violations,

4) Negotiation of request modifications with requestors,

5) Enforcement of (modified) requests.

In summary the present invention enables

1) Contextual detection of conflicts created by control requests for different service systems, e.g. via shared supply systems or shared bottlenecks

2) Context aware request conflict resolution by adapting already served control requests as well as newly received request. 3) Negotiation of adaptation of control requests to resolve the conflict with requestors (already served requestors and requestor of newly received request). At least one embodiment may have at least one of the following advantages:

Allows protection against unintended adverse service system interactions by individual application control requests. - Negotiation/modification of requests allows specialist applications to become reactive to building / service system context.

Protects against human errors when adapting individual system configurations in conflict with system design.

Increased efficiency as static rules for e.g. permissible set-point ranges cannot cover all system contexts.

Detection of possibly adverse situations allows to diagnose applications and system configurations

Allowing to choose the coincidence factor more optimistically.

Many modifications and other embodiments of the invention set forth herein will come to mind to the one skilled in the art to which the invention pertains having the benefit of the teachings presented in the foregoing description and the associated drawings. Therefore, it is to be understood that the invention is not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.