127
This project has received funding from the European Union Seventh Framework Programme under grant agreement n° 609349. OPTIMISED DESIGN METHODOLOGIES FOR ENERGY-EFFICIENT BUILDINGS INTEGRATED IN THE NEIGHBOURHOOD ENERGY SYSTEMS eeEmbedded D3.1 Stochastic risk and vulnerability models and control strategies Responsible Authors: Stefan Gnüchtel, Jens Kaiser, Hervé Pruvost, Pit Stenzel, Tom Grille Co-Authors: Raphael Schär Due date: 30.06.2015 Issue date: 30.06.2015 Nature: Other Coordinator: R. J. Scherer, Institute for Construction Informatics, Technische Universität Dresden, Germany

Stochastic, risk and vulnerability models and control strategies

  • Upload
    buinhi

  • View
    220

  • Download
    1

Embed Size (px)

Citation preview

This project has received funding from the European Union Seventh Framework Programme

under grant agreement n° 609349.

OPTIMISED DESIGN METHODOLOGIES FOR ENERGY-EFFICIENT

BUILDINGS INTEGRATED IN THE NEIGHBOURHOOD ENERGY SYSTEMS

eeEmbedded

D3.1 Stochastic risk and vulnerability models and control strategies

Responsible Authors:

Stefan Gnüchtel, Jens Kaiser, Hervé Pruvost, Pit Stenzel, Tom Grille

Co-Authors:

Raphael Schär

Due date: 30.06.2015

Issue date: 30.06.2015

Nature: Other

Coordinator: R. J. Scherer, Institute for Construction Informatics, Technische Universität Dresden, Germany

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 2/127

© eeEmbedded Consortium www.eeEmbedded.eu

Start date of project: 01.10.2013 Duration: 48 months

Organisation name of lead contractor for this deliverable: TU Dresden, IET Germany

History

Version Description Lead Author Date

0.1 Deliverable Structure IET 21.10.2014

0.2 Draft of Chapter 1 and 2 IET 12.03.2015 0.3 Enhancement of Chapter 1 and 2 IET 03.05.2015

0.4 Draft of Chapter 3 CIB 04.05.2015

0.5 Draft of Chapter 4 EAS 04.05.2015

0.6 Enhancements of Chapter 1 and 2 IET 10.06.2015 0.7 Enhancements of Chapter 3 CIB 12.06.2015

0.8 Enhancements of Chapter 4 EAS 25.06.2015

0.9 Pre-Final Version CIB, EAS, IET, SAR 26.06.2015 1.0 Final Version CIB, EAS, IET, SAR 29.06.2015

1.1 Checked and approved by Coordinator CIB 30.06.2015

Copyright

This report is © eeEmbedded Consortium 2015. Its duplication is restricted to the personal use

within the consortium, the funding agency and the project reviewers. Its duplication is allowed

in its integral form only for anyone's personal use for the purposes of research or education.

Citation

Gnüchtel, S., Kaiser, J., Pruvost, H., Stenzel, P., Grille, T., Schär, R. (2015); eeEmbedded D3.1: Stochastic, risk and vulnerability models and control strategies, © eeEmbedded Consortium, Brussels.

Acknowledgements

The work presented in this document has been conducted in the context of the seventh framework

programme of the European community project eeEmbedded (n° 609349). eeEmbedded is a 48

month project that started in October 2013 and is funded by the European Commission as well as by

the industrial partners. Their support is gratefully appreciated. The partners in the project are

Technische Universität Dresden (Germany), Fraunhofer-Gesellschaft zur Förderung der angewandten

Forschung E.V (Germany), Allplan Slovensko s.r.o. (Slovakia), Data Design System ASA (Norway), RIB

Information Technologies AG (Germany), Jotne EPM Technology AS (Norway), Granlund OY (Finland),

SOFISTIK HELLAS AE (Greece), Institute for applied Building Informatics IABI (Germany), FR. SAUTER

AG (Switzerland), , Obermeyer Planen + Beraten (Germany), Centro de Estudios Materiales y Control

de Obras S.A. (Spain), STRABAG AG (Austria) and Koninklijke BAM Group NV (The Netherlands). This

report owes to a collaborative effort of the above organisations.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 3/127

© eeEmbedded Consortium www.eeEmbedded.eu

Abbreviations

BACS Building Automation and Control Systems

DV Decision Value

ER Exchange Requirement

ERM Exchange Requirement Model

FM Facility Management

HVAC Heating Ventilation Air Conditioning

IFC Industry Foundation Classes

KDR Key Design Requirement

KDI Key Design Indicator

KPI Key Performance Indicator

KPR Key Performance Requirement

LCC Lifecycle Cost

LCA Lifecycle Assessment

MPC Model predictive control

MVD Model View Definition

UC Use case

KRI Key Risk Indicator

UA Uncertainty Analysis

SA Sensitivity Analysis

GAMS General Algebraic Modeling System

ARIMA Auto Regressive Integrated Moving Average

ARMA Auto-Regressive-Moving Average

GARCH Generalized Auto Regressive Conditional Heteroscedasticity

COP Coefficient of Performance

CHP Coupled heat and power device

UC Use case

MTBF Mean time between failure

MTTF Mean time to failure

MTTR Mean time to recover / man time to repair

FMEA Failure Modes and Effects Analysis

Project of SEVENTH FRAMEWORK PROGRAMME OF THE EUROPEAN COMMUNITY

Dissemination Level

PU Public X

PP Restricted to other programme participants (including the Commission Services)

RE Restricted to a group specified by the consortium (including the Commission Services)

CO Confidential, only for members of the consortium (including the Commission Services)

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 4/127

© eeEmbedded Consortium www.eeEmbedded.eu

Table of Content

Executive Summary __________________________________________________________________ 5

1 Intensions and introduction _______________________________________________________ 7

1.1 Focus described within DOW ____________________________________________________ 7

1.2 Intensions and focus of stochastic approaches within the building lifecycle process ________ 7

1.3 Overall structure and workflow of the design process of energy systems ________________10

1.4 Relationship to the overall eeEmbedded approach __________________________________17

2 Stochastic models and approaches _________________________________________________19

2.1 Introducing stochastic processes ________________________________________________19

2.2 Forecasting energy consumption ________________________________________________24

2.3 Vulnerability analysis __________________________________________________________54

2.4 Example ____________________________________________________________________66

3 Energy Risk Model ______________________________________________________________73

3.1 Sustainability, Vulnerability and Cost Risk Models ___________________________________74

3.2 Key Risk Indicator Framework ___________________________________________________75

3.3 Risk analysis workflow for optimised building design under uncertainty _________________82

3.4 Content of the Energy Risk Model _______________________________________________89

4 Control strategies _______________________________________________________________94

4.1 Intentions and introduction ____________________________________________________94

4.2 Classification of control strategies _______________________________________________98

4.3 Data structure and implementation aspects ______________________________________104

4.4 Development of high level control strategy plans __________________________________109

5 Technical background and implementation aspects __________________________________113

5.1 Overview __________________________________________________________________113

5.2 Brief introduction of the used software tools _____________________________________114

6 Conclusions __________________________________________________________________117

References _______________________________________________________________________119

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 5/127

© eeEmbedded Consortium www.eeEmbedded.eu

Executive Summary

The objective of the Deliverable 3.1 "Stochastic, risk and vulnerability models and control strategies"

was to develop and describe simplified stochastic models to support the forecast of the energy

demand respectively the CO2 emission within the building lifecycle based on certain stochastic

approaches. Beside the energy focused analysis the analysis of malfunction and underperformance

as well as vulnerability analysis are discussed. Based on that an energy risk model, vulnerability risk

model and a sustainability risk model is elaborated. While focusing on the energy systems high level

control strategies with strong relationship to the KPI-based design framework and the FM related

topics are discussed. The main goal is to develop the basis and instruments for a highly performant

operation of the energy systems in combination with the building taking into consideration risk

related aspects.

The deliverable D3.1 is connected with D3.2 and certain work packages covering implementation

aspects workflow and related tasks. It is structured into five chapters:

In Chapter 1 overall intensions are described related to the usage of stochastic based analysis within the design process. As a starting point the focus mentioned within the DOW leads to the benefits of using stochastic analysis within the building lifecycle analysis. This capter contains an integration of the stochastic approaches into the overal design workflow of energy systems.

Chapter 2 provides a brief introduction of the used stochastic processes and models followed by descriptions of the forecasting and prognosis of the energy consumption and CO2 emissions within the building lifecycle. This chapter contains the description of identified regressors with significant impact especially on energy demand followed by a brief introduction of vulnerability analysis. An examples completes this chapter.

Chapter 3 contains a description of an energy risk model, which starts with an explanation of the Key Risk Indicator Framework. In the second part the risk analysis workflow is explained in detail. Furthermore a general introduction of sustainability, vulnerability and cost risks is given.

In Chapter 4 is focused on control strategies and starts with an overall classification followed by a description of data structures and a discussion of implementation aspects. This chapter concludes with a section dealing with the development of high level control strategies in preparation of the operational phase of the building.

Chapter 5 delivers an overview combined with a brief introduction to software tools which are used within the stochastic related design tasks.

The following partners were involved and each partner has contributed from their expert viewpoint

as follows:

The software and content developer CIB provided input mainly to Chapter 2 and Chapter 3 related to the development of the energy risk model with the sub-chapters about risk indicator framework and the related workflow.

The project partners EAS and SAR were focused BACS related topics with special attention on the description of control strategies including related data structures which are consider the newly developed ESIM and additionally support the BACS template concept. As a main outcome high level control strategy plans have been described within Chapter 4.

The software developer and representative of the energy system domain IET provided input for the chapters 1 and 2 as well as Chapter 5. A simplified stochastic based approach was elaborated while identifying certain stochastic regressors with impact on the energy demand

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 6/127

© eeEmbedded Consortium www.eeEmbedded.eu

within the building lifecycle. Additionally special aspects of a vulnerability analysis regarding to energy systems were described.

The pre-described work was done in a collaborative manner accompanied by regularly web-based

meetings as well as face-to-face-meetings. The elaboration of this deliverable was answered by

project partner IET.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 7/127

© eeEmbedded Consortium www.eeEmbedded.eu

1 Intensions and introduction

1.1 Focus described within DOW

Within the description of work of the eeEmbedded project the topics, intensions and main focuses

are described in the following manner.

Investigation, analysis and adaption of existing stochastic based approaches covering the following

topics related to the intension:

Energy consumption

Risk management

Reliability analysis

The main intensions are addressed as follows:

(1) Forecasting of the overall amount of energy use and CO2 emission over the building lifecycle applying standard stochastic approaches based on the Wiener Process for accumulated random variables and stochastic processes

(2) Estimation of malfunction or underperformance of the energy systems as a whole, based on vulnerability analysis, extreme value statistics and stochastic processes, like the Poisson Process, successfully applied for hazard considerations

(3) Estimation of the energy-subsystems and their interaction, through a simplified vulnerability analysis, based on hazard consideration as under (2).

The priority are on the following methods

a) Mapping stochastic models in stochastic numerical equations b) Simulate samples for the stochastic evaluation with the Monte Carlo or the Latin Hypercube

method c) Elaborate techniques to extract stable and robust prognosis values and forecasting scenarios

from the stochastic numerical results

1.2 Intensions and focus of stochastic approaches within the building lifecycle process

On the path along the design process of a building several design variants and alternatives will be

elaborated. Many decisions have to be taken along this way and some of these decisions are related

to energy consumption, CO2 emission and dependability or reliability of the building and energy

systems. Considering this background the following significant common requirements or tasks are

identifiable:

(1) Comparison of design concepts based on significant key values or indicators with the help of transient building energy and system simulation

(2) Translation of the design concept or variant into an analysis model close to the real world boundary conditions taking into account deterministic and stochastic parameters which supports the intention formulated under (1)

(3) Generation of a workflow for processing analysis tasks complying the requirements addressed within (1) and (2)

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 8/127

© eeEmbedded Consortium www.eeEmbedded.eu

Reviewing the existing strategies for building energy analysis a hybrid approach covering both, the

deterministic and the stochastic nature of constraints, circumstances, and processes running within

the building and energy systems provides the fulfilment of the requirements mentioned above.

Deterministic analysis models still exist in various kinds of quality and levels of detail. Beside this

stochastic based approaches for energy analysis are elaborated and combined with deterministic

analysis approaches (Van Gelder, 2014).

The common initial step of a stochastic based analysis is the identification of uncertainties expressed

as variables. The variables relate to the focused aspects of energy consumption, CO2 emission,

energy system malfunction and underperformance, as well as costs, over the building lifecycle. The

stochastic models shall then provide a mathematical representation of those uncertainties together

with their correlations and their influence on the previously mentioned aspects expressed as output

variables. The variables defined can be differentiated into static uncertainties (e.g. expressed as

probability distribution) and dynamic uncertainties (e.g. expressed as stochastic process) according

to their nature and especially their time-dependency. The need for sampling or mapping of those

variables to another representation will arise from the simulation tool capability and the goal of the

analysis.

With respect to the ability of the simulation tools basically three approaches can be identified to

consider time-dependency and randomness:

(1) Within deterministic simulations the stochastic variables need to be expressed in a static

manner. Most of time it results in generating samples from the stochastic variables under

consideration of a fixed time period. The overall sampling process can follow the Monte

Carlo or Latin Hypercube Sampling methods, or even picking of some specific generated

values is possible, or even picking of some specific generated values is possible. In this way

usual statistical experiments like uncertainty and sensitivity analyses can be performed using

a third-party tool that processes the input and output data. Such an approach has been

implemented in the ISES project in which the simulation tools “Therakles” (Nicolai, 2013) and

“NANDRAD” (Nicolai & Paepke, 2012) have been used for thermal building simulation. Within

the eeEmbedded project the transient building and energy system simulation framework

“TRNSYS-TUD” (Perschk, 2010) which provides enhanced capabilities compared to the

commercial version of the software “TRNSYS” will be used (see Chapter 5.2.5).

(2) There are two kinds of simulations computing randomness:

a. Without time as variable: the underlying calculation model is often deterministic and

less complex than by specific solvers as quoted in the previous point. The simulation

tool is able to perform among others Monte Carlo or Latin Hypercube methods by

itself. As under the previous point, such approaches are suitable for statistical

experiments.

b. With time as variable: the simulation relies on stochastic numerical equations in

which stochastic variables are differentiated between inputs and outputs. In the

equations the variables are expressed as functions of time. Such approaches are

suitable to simulate randomness in time, contrary to the two previous ones that

allow for statistical analyses.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 9/127

© eeEmbedded Consortium www.eeEmbedded.eu

Common tools able to perform only one or both kinds of simulations described under (2) are for

example @Risk, Frontline Solvers, Oracle’s Crystal Ball, MatLab© for commercial ones or R (see

Chapter 5.2.1) as open source software.

Usually, from such simulations some important statements about the building performance can be

made:

Time-dependant simulation: Forecasting of energy use, CO2 emission or failure frequency over time

Uncertainty analysis: Study of how uncertainty spreads in output variables like KPIs.

Sensitivity analysis: Assess the sensitivity of outputs with regard to inputs. It is useful to:

o Exclude negligible input variables from the simulation model thus reducing the computing effort

o Identify key variables e.g. key design parameters the designer should focuses on

o Assess the robustness of the building regarding its performances against some input variables e.g. variables the planner has no control on like climate.

In (Hopfe & Hensen, 2011) two main groups of uncertainties each with different character are

identified: (1) random character and (2) epistemic. Figure 1 contains a short overview regarding this

systematisation.

Figure 1: Systematisation of uncertainties (Hopfe & Hensen, 2011) and (Van Gelder, 2014)

Following and enhancing the clustering approach of input parameters of building energy analysis

introduced in (Van Gelder, 2014) regressors with an epistemic nature could be divided into three

main groups: (1) controllable design parameters such as thermal resistance of the walls or the

transparent/opaque ration of a façade, (2) uncontrollable (from designer’s point of view) inherently

uncertain parameters e. g. user behaviour and interaction with the building, and (3) scenario

parameter as another type of inherently uncertain parameters like scenarios for climate change,

energy price trends or development scenarios of technological progress. The approach described in

the following sections differs from that idea.

The first group covers input parameters which have do not have the uncertain character of the

following two groups because the parameter values are dedicated to a certain design variant or

design option and they are known to the designer. Beside the mentioned three groups there is an

additional group (4) of uncontrollable design parameters identifiable, covering uncontrollable

deterministic factors from the designer’s point of view.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 10/127

© eeEmbedded Consortium www.eeEmbedded.eu

(1) Controllable design parameters a. thermal resistance of the walls b. transparent/opaque ration of a façade c. layer structure, thickness and optical properties of a glazing system d. type and nominal capacity of a boiler, heat pump or CHP

(2) Uncontrollable inherently uncertain parameters a. User occupancy (Markov process) b. User behaviour c. Reliability / Malfunction (Poisson process)

(3) Uncontrollable inherently uncertain scenario parameters a. Technological progress (Wiener process) b. Climate trend (Wiener Process) c. Energy price (GARCH)

(4) Uncontrollable deterministic factors a. Site location b. International, national and regional design standards c. Public holidays

Depending on the main intensions addressed within Chapter 1.2 and the clustering introduced

above, certain parameters have to be modelled with the help of appropriate stochastic approaches

according to the type of analysis.

Within Chapter 1.3 certain models and approaches will be introduced in brief.

1.3 Overall structure and workflow of the design process of energy systems

The stepwise design approach which includes optimisation and embedded stochastic analysis covers

the following main subsystems of the building energy supply. These subsystems are core parts of the

energy systems information model (ESIM) shown in Figure 2 and described within (Kaiser et al.,

2015).

Figure 2: Core objects within the energy system information model ESIM

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 11/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 3 contains a schema which presents the overall workflow for designing, analysing as well as

optimising the energy generation and distribution system taking into account a broad variety of

influencing factors while elaborating a sophisticated and state-of-the-art as well as future-proof

energy system.

The approach is divided into several main working steps, each containing one or more subtasks. The

working steps are labelled with numbers (1) to (5) on the left margin of the coloured background

boxes. The boxes containing a brief description of the tasks and subtasks are coloured differently

regarding to the software tools which will be used to process the dedicated analysis. There is a

legend added on the bottom of the figure where the related software tools are named.

Within Figure 3 circles are placed containing the letters A, B, C, and D. These labels are anchor points

indicating links to Figure 4 which presents an overview of the considered regressors and their

assignment to stochastic processes. To ensure consistency between both figures, Figure 4 contains

the same labels (A) to (D). A brief explanation of the letters according to Figure 4 will be given below:

(A) Probable realisation of a Markov chain modelling the energy consumption of end energy for

heating/cooling and electricity

(B) Results of an estimation of end energy for heating / cooling and electricity and simulated

weather data as well as energy price

(C) Results of an estimation of the technological progress related to energy systems and building

envelop

(D) Results of an estimation of malfunction and a reliability scenario

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 12/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 3: Structure of design process of energy systems (Labels (A) to (D) are anchor points to Figure 4)

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 13/127

© eeEmbedded Consortium www.eeEmbedded.eu

The starting point of the workflow which is marked with the label (1) in Figure 3 is the definition of

the following aspects:

1. Area which is characterized

a. Technology

i. Existing technology

ii. Future technology

b. Building

i. Building stock

ii. Preview on future re-vitalisation of the building sock

iii. Newly build rate

c. Energy infrastructure development

i. Streets

ii. Energy / media supply networks

iii. Introduction terms of new routes for heat and gas supply networks

2. Structure of prices and costs

d. Technology

i. Current investment and operational costs

ii. Volatilities

e. Energy prices

i. Curve of prices on the energy (stock) exchange during the last few years

ii. Already existing futures or forwards on energy

3. Local conditions

f. Weather / climate on the site location

g. Influences coming from the neighbourhood which infects the site location

4. Period under observation

h. E.g. 30 years

The second step within the workflow – marked with the label (2) in Figure 3 - covers the pre-

selection and localisation of the energy generators. Within this task a reasonable - and possibly

heterogeneous - portfolio containing a limited number of types of energy (heat and/or electricity)

generators is defined. To set-up a full scale matrix each of this energy generator types is described

with only a few variants of nominal power. Out of this matrix a certain number of combinations will

be selected to process a complete optimised application scenario based on a typical year of the

analysis period taking into account typical load curves for electricity and heat demand related to the

usage of the building. Within this step the optimisation is processed by the software tool FWOpt, see

Chapter 5.2.2. The typical load curves used within this working step will be defined without

variations. As a result of this step a set of energy generators which fits best to the supply tasks will be

identified and localized.

Within the third step of the workflow marked with the label (3) in Figure 3 the distribution networks

for heating energy and/or natural gas supply will be designed newly or enhanced with the help of the

software tool STEFaN, see Chapter 5.2.2. To develop a future-proof concept this design step takes

into consideration various numbers of scenarios of heating demand.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 14/127

© eeEmbedded Consortium www.eeEmbedded.eu

Step four (4) in Figure 3 covers a second optimisation step considering various scenarios for energy

demand and energy prices in combination with various set-ups of energy generators. The certain

scenarios of energy demand will be elaborated with the software tool R-ARIMA. Scenarios for the

progression of the energy price will be processed by the software tool R-GARCH in case of short-term

prognosis (< 1 day) and R-ARIMA in case of a large time scale. As a result of this working step

approximated yearly costs for energy supply will be worked out for each of the analysed generator

set-ups and scenarios. Out of this range of values the less expensive set-up of energy generators will

be set as reference system. Chapter 5.2.1 contains a brief introduction to the software package R.

Within the fifth step (5) in Figure 3 different scenarios for the energy usage and the progression of

energy prices will be analysed with the help of the software tool TRNSYS-TUD (see Chapter 5.2.5) for

transient building and energy system simulation. Within the transient analysis scenarios for the

progression of technological progress related to the types of energy generation will be considered.

The analysis is taking into account the probabilistic character of the occupancy of people modelled by

the software tool R-birth-and-death within various types of buildings and the related indirect effects

like the selection of indoor temperature set-points and manual driven natural ventilation as well as

interaction with shading devices. Furthermore the individual operation of lighting and user specific

equipment within each analysis the individual operational schedule of each energy generator but

also the energy usage as well as the attached energy costs will be elaborated as time series.

The results are available for downstream analysis possibly covering the evaluation of the preferred

set-up with respect to common political or individual financial targets or analysis of operational

dependability processed by the software tool R-Poisson.

Figure 4 explains the localisation and interdependencies of the identified regressors. The regressors

will be introduced in more detail starting within Chapter 2.2.4.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 15/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 4: Regressors and links to the stochastic processes (Labels (A) to (D) are anchor points with relation to Figure 3)

Step five (5) in Figure 3 covers a transient simulation to analyse the energy consumption and the

behaviour of the system containing the building itself, energy systems and the usage. As part of the

pre-processing step of the deterministic simulation a stochastic based generation of data to describe

scenario parameters like-long term orientated trends, e.g. climate change, technological progress

and energy prices and short-term factors like user behaviour will be processed to generate samples

which are used as unique inputs for all deterministic simulations to ensure the consistency and

comparability of the analysed design variants and design alternatives, see Figure 5.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 16/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 5: Generalized overview to the integration of stochastic approaches and deterministic simulation capabilities into the design process

The hybrid approach which unites a stochastic based pre-processing of selected inputs and a

deterministic transient simulation is promising the combination of advantages of both worlds: (1) the

recognition of the non-deterministic character of certain factors with impact on energy demand and

the comparability and reproducibility of the analysis results processed with the help of a transient

simulation. Van Gelder describes this strategy in (Van Gelder, 2014), see the schemes in Figure 6 and

Figure 7.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 17/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 6: Systematisation of the design process, (Van Gelder, 2014)

Figure 7: Approach for the Design Process (Van Gelder, 2014)

1.4 Relationship to the overall eeEmbedded approach

Within the design phases, especially the urban design phase benefits from the use of stochastic

approaches described below. This is directly related with the fundamental decisions about the

concept of the building and the energy systems within this design phase developed in eeEmbedded -

see deliverables D1.1 (Geißler at al., 2014) and D1.2 (Geißler et al., 2014b). Successors of the

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 18/127

© eeEmbedded Consortium www.eeEmbedded.eu

stochastic analysis are the architect and the energy expert. Workflow related points are mentioned

above. The stochastic analysis fits seamlessly into the design workflow.

Based on the conceptual nature of the urban design phase a high number of certain kinds of

templates will be used to speed-up the design process. This concept is adaptable to the stochastic

analysis as mentioned in eeEmbedded Deliverable D1.4 (Solvik et al., 2014). In conjunction with the

template concept and the ESIM concept which will contain information about

reliability/dependability the stochastic analysis can be easily included in the overall framework. The

strong cloud-orientated approach of eeEmbedded described in deliverable D1.5 (Zellner et al., 2014)

provides the needed analysis capabilities and computing power to use the stochastic analysis

approaches in a worthwhile manner.

There are certain links from T3.1 to T3.3, respectively D3.1 to eeEmbedded deliverable D3.2, as well

as eeEmbedded work packages WP5 and WP6.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 19/127

© eeEmbedded Consortium www.eeEmbedded.eu

2 Stochastic models and approaches

2.1 Introducing stochastic processes

Stochastic processes are defined as processes which are not exclusively deterministic, taking into

account one or more probabilistic variables. A stochastic process is represented as a set of

probabilistic values depending on parameter with passing through a parameter space. The

parameter could represent the time or have any other meaning. Beside there could be other

additional parameters too (Meyna & Pauli, 2010).

Figure 8: Classification of stochastic processes (Meyna & Pauli, 2010)

Within the following chapters relevant stochastic models will be introduced in brief:

Wiener-Process

Poisson-Process

ARIMA-Process

GARCH-Process

Brief introduction of the Wiener-Process 2.1.1

The Wiener process is a continuous time stochastic process with independent and normally

distributed increments and gives a mathematical representation of the Geometric Brownian Motion

(GMB) (Marathe & Ryan, 2005). More precisely, we will use a GMV which introduces a drift and

volatility to the Wiener process.

This model is frequently invoked as a model for diverse quantities like for example stock prices,

natural resource prices and growth in demand for products or services etc. In this models, the

Wiener Process’ value changes during one unit of time by an amount that is normally distributed

with and as parameters, where is the drift and the volatility.

To derive the correct parameter values it is important to identify the influencing factors. Since those

factors strongly vary in time and can also be modelled by stochastic processes, it can be assumed

that the parameters of the GBM, and , may vary in time. Achieving a relevant stochastic model

means on one hand establishing a proper stochastic equation describing the output variable as a

function of the influencing factors, and on the other hand the usage of proper time intervals (hourly,

monthly, yearly aggregation).

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 20/127

© eeEmbedded Consortium www.eeEmbedded.eu

One example of an approach using the Wiener-Process for forecasting building energy consumption

is drawn in (Brohus et. al., 2012). The authors set up a system of stochastic differential equations

(SDE) describing incremental load changes, by which variables like external and internal

temperatures, convective and radiation heat flows and heat losses, are defined by a Wiener

processes like follows:

where , the “white noise” characterising the Wiener-Process.

The common way of identifying parameters of stochastic processes would be to use historical data. It

can be assumed that a lack of such data exists in most cases.

Brief introduction of the Poisson-Process 2.1.2

The Poisson-Process is a type of birth-death-process covering only birth events. Within this process

the occurrence of certain events according to the point of time of their occurrence within a time

interval is modelled. The Poisson process depends on only one parameter, , which gives the rate of

occurences for every point in time (e.g. a hazard rate). The events and the time of their occurrence

are independent from each other. The time between the events follows an exponential distribution

with the parameter .

Poisson processes are used to model the occurrence of malfunction within dependability analysis and

as approximation for the binomial distribution (Bernoulli distribution).

Brief description of the ARIMA-Process 2.1.3

ARMA is the abbreviation of AutoRegressive-Moving Average. The notation stands for

Auto-regressive terms

Moving-average terms

The common formulation of the equation has the following form:

ARMA is a subset of the process with . It stands for linear models for steady

state, time discrete stochastic processes. These processes are used for time series analysis within

prognosis models regarding financial and economic issues.

This approach covers the analysis of a single time series or a set of time series describing the

behaviour of certain indicators of interest. The ARIMA-Process is focused on the differences between

the values of the prognosis and needs an integration step after the prognosis is done.

In the mathematical sense the ARIMA models are linear difference equations or systems of

equations.

The ARIMA-Process is characterized by the parameters , and and is considered when the ARMA-

Process is applied to the times differentiated time series . The notation is .

ARIMA Model

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 21/127

© eeEmbedded Consortium www.eeEmbedded.eu

AR - Auto Regression I - Integrated MA - Moving Average

For time series

Model with:

Residual error

Vector of explanatory values

Vector of coefficients

White noise error (not correlated)

Time

The ARIMA-Process can be applied in case of the estimation of thermal heat and electricity, see

schemas provided in Figure 9.

Figure 9: Schema for auto-regression (ACC Autocorrelation coefficient; PACC partial autocorrelation coefficient)

Figure 10 provides three examples of the outcome of ARIMA prognosis runs processed with the

software package R used for statistical computing.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 22/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 10: Three different example realisations of an ARMIA process

Brief description of the GARCH-Process 2.1.4

GARCH is the abbreviation for ‘Generalized AutoRegressive Conditional Heteroscedasticity’ models.

This process is a generalisation of the ARCH-Process. These processes are used to analyse time series,

e. g. stock prices or similar phenomenon’s. ARCH and GARCH models have been developed in the

1980th.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 23/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 11: Three different example realisation of a GARCH-Process

GARCH Model:

G - Generalized AR - Auto Regressive C - Conditional H - Heteroscedasticity

For time series

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 24/127

© eeEmbedded Consortium www.eeEmbedded.eu

The model is given by the following terms

or in a aggregated manner

or in other form

Modell with:

Order of GARCH terms

Order of ARCH terms

Vector of Regression coefficients

Vector of Regression coefficients

White noise error (not correlated)

Time

2.2 Forecasting energy consumption

Clustering of factors with high impact on energy consumption 2.2.1

In general the energy consumption for heating/cooling and electricity of a building is influenced by

several internal and external factors. These factors could be categorized into several main clusters.

Figure 12 categorizes the main factors with the most impact on energy related prognosis in a general

manner: (1) physical factors with strong relation to weather and climate phenomenon’s, but also (2)

historical factors especially if existing energy systems or buildings have to be integrated and/or

enhanced, (3) social factors covering the usage scenarios in general and other factors with an

random nature.

Figure 12: Groups of parameters within a prognosis

Figure 13 gives a high-level overview about these clusters without the intention to be exhaustive. To

reduce complexity not all existing interdependencies between these clusters are addressed within

this figure.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 25/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 13: Main clusters of factors which are responsible for energy demand and CO2 emissions

Major influence factors of the energy demand analysis which will be introduced more in detail

further on are (1) the building usage as well as (2) the energy systems including the energy mixture.

This analysis’ goal is to process reliably prognosis results according to the subordinated analysis of

CO2 emissions on both, (a) at supplier side (electrical energy generation) and (b) on customer side.

Hence the analysis takes into account the overall operational regime and the characteristics of

energy production devices on client side.

The primary energy consumption is strongly influenced by the type of energy source, the way of

energy generation and/or energy transmission as well as the energy distribution facilities. Therefore

the CO2 emission related with the operation of the energy systems is a result of the energy

technology covered within the energy concept and the operational regime of the energy systems and

sub-systems. The CO2 emission is not an independent variable within a stochastic based analysis

approach. With reference to Figure 13 as independent variable with a more or less probabilistic

character the building usage/occupancy and the energy costs as well as the long-term climate trend

could be identified.

State of the art 2.2.2

Within the last few years several authors have published approaches to estimate the energy

consumption for heating and electricity in a more general sense e. g. (Ryan, 2012; Heo, 2012), or to

model significant factors or sub-factors which have an impact on the energy demand with the help of

stochastic based analysis or hybrid approaches covering deterministic and stochastic analysis.

Certain authors tackled the integration of stochastic approaches within the design methodology or

the design process itself on a high level (Hopfe & Hensen, 2011; Van Gelder, 2012).

The main work was invested into the modelling of the occupancy of buildings and the user behaviour

mainly within residential and office buildings (Swan, 2008; Widen, 2009; Zang, 2011; Rijal et al.

2012).

Reviewing the literature of the past years the prediction of the energy consumption covers also

uncertainties related to material properties, energy prices, weather and climate.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 26/127

© eeEmbedded Consortium www.eeEmbedded.eu

There are several tools available for processing analysis and prognosis of energy consumption based

on simplified benchmark-based approaches, e. g. RETscreen, CASAnova, IWU Kurzverfahren Energie-

profil.

Prognosis of energy demand as part of the design workflow 2.2.3

At first before starting a prognosis of energy demand clarification is needed about the duration of

the assumed analysis period and depending on that the consideration of refurbishment activities

over the lifecycle period under focus. With reference to the building lifecycle an implied period of 30

years for the analysis seems to be a reasonable value.

There are tools available for short- (hours to a few days) and medium-term (one to several years)

prognosis which have to be enhanced for taking into account long-term trends covering more than a

few years according to the building lifecycle.

Existing and newly developed tools are assembled to build up a toolbox to support all design steps

which are arranged within the schema given in Figure 3. The overall target is the development of an

automated processable workflow to support and finally speed-up the overall design workflow as well

as minimising manual interferences.

The overall progression of the energy demand will be analysed with the help of deterministic

simulations in combination with pre-processed variables using stochastic processes without memory

– so called Markov processes. A known representative and special case of this process is the Wiener-

Process which is concurrently a marginal case of the ARIMA model too.

The particular involved simulation will be performed based on a discretisation of time to simulate so

called Markov chains. Based on the main target the simulation will be performed using different time

steps, e. g. one day for short-term prognosis of the final energy - like in eeEmbedded project - or one

year or five-year time steps which is not in focus within eeEmbedded.

Within the early design stages there is only a rough picture available as input for the elaboration of

an energy concept about (1) the building geometry, (2) the construction details and (3) the future

usage of the building. For this case standardised load profiles for electrical energy and natural gas

supply are available to bridge this gap. These profiles are described within (BDEW, 20079 and (E-

Control, 2011). In the case that more accurate and validated data is available, this values should be

used instead of the standardised load profiles. The standard load profiles will be used for generating

individual load profiles taking into account the influence of outside air temperature throughout the

day, the type of day (business day, Saturday, Sunday / public holiday), but also the type of usage

(several kinds of pre-defined business branches, household and others) based on a Sigmoid function,

see Figure 14 and Figure 15.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 27/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 14: Standardized daily load profile for electrical energy within a household on business days (summer season [May 15

th – September 14

th] - orange line; winter season [November 1

st – March 20

t]] -

blue line; spring [March 21st – May 14th] and autumn [September 9th – October 31st] - dark red line)

Figure 15: Standardized daily load profile for electrical energy within a household situated in a residential building within the winter season on business days (dark red line), Saturdays (orange line) as well as

Sundays and public holidays (blue line)

The workflow and the limits of energy load prognosis is given in Figure 16. Within Figure 14 and

Figure 15 two examples of standard load profiles are shown.

Figure 16: Possibilities and limits of load prognosis (Meisenbach & Gnüchtel, 1999)

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 28/127

© eeEmbedded Consortium www.eeEmbedded.eu

There are several common working steps identified within the workflow:

(1) Preliminary investigation including sample survey with the following subtasks

a. Concept development for the prognosis model

b. Data capture and data verification

(2) Identification of the prognosis model

a. Elaboration of dependencies

b. Selection of the prognosis model

c. Selection of the input values

(3) Adaptation of the model

a. Ascertainment of free parameters

(4) Back-interpretation and check

(5) Processing of the prognosis

ARIMA-Processes have been recognised as common methods to predict the demand for heating and

cooling energy as well as electricity consumption. Within these use cases the pure ARIMA process is

overlaid (1) by components with model seasonal variability caused by daily, weekly as well as yearly

rhythms and (2) linear regression models as well as (3) linear long-term trends. The marginal case of

a process is constituted as a discrete reproduction of a Wiener-Process. Figure 17

introduces main influence factors for processing energy prognosis.

Figure 17: Information flow to process a prognosis

Brief introduction of regressors 2.2.4

Following the clustering of the regressors introduced in Chapter 1.2 the scenario related inherently

uncertain parameters like long-term climate change, energy price trends, as well as scenarios of

technological progress will be explained more in detail because of their relevance while analysing

building lifecycle. Within the following chapters these kinds of parameters are focused:

(1) Uncontrollable inherently uncertain operational parameters a. User occupancy (Markov Process) b. User behaviour during occupancy c. Reliability / Malfunction (Poisson Process)

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 29/127

© eeEmbedded Consortium www.eeEmbedded.eu

(2) Uncontrollable inherently uncertain scenario parameters a. Technological progress (Wiener process) b. Climate trend (Wiener Process) c. Energy price (GARCH)

In Table 1 to

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 30/127

© eeEmbedded Consortium www.eeEmbedded.eu

Table 10 several parameters are extracted out of certain publications as examples of highly

aggregated or single detailed values that have been taken into account within stochastic analysis

tasks. Especially the parameters mentioned within Table 1 (part Building function), Table 4, Table 8:

Estimates of uncertainty of physical parameters for an exemplary outside wall, normal distributed

(Hopfe & Hensen, 2011)

Parameter

Steel Thickness t [m]

Thermal conductivity [W/(m K)]

Density [kg/m³]

Heat capacity [J/(kg K)]

0.005 50

7800 480

0.0005 0.75

25.74 19.2

Glass fibre quilt Thickness t [m]

Thermal conductivity [W/(m K)]

Density [kg/m³]

Heat capacity [J/(kg K)]

0.127 0.04 12

840

0.0127 0.0032

1.08 56.28

Concrete block Thickness t [m]

Thermal conductivity [W/(m K)]

Density [kg/m³]

Heat capacity [J/(kg K)]

0.2 1.41 1900 1000

0.02 0.1269

28.5 106

Table 5 and parts of

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 31/127

© eeEmbedded Consortium www.eeEmbedded.eu

Table 7 (internal loads, ventilation), as well as values given in Table 6 are applicable within the

stochastic related approach described in this document.

Table 1: Sensitivity parameters, extract of (Hoes, 2008)

Parameter Min Mean Max SD

Building function and type of user

Occupant per floor area [m²/occupant]

Occupant mobility [R]

4.3

1

11.1

4

22.8

8

3.1

1.2

Building concept (passive / active system)

Building response time; Specific active mass (kg/m²]

Active system response time Maximum heating load [W] Maximum cooling load [W]

Window size in façade Percentage of transparency total façade [%]

Influence of outdoor environment in indoor environment; Heat transfer through transparent construction

Solar heat gain - g-value [-]

Size transparent surfaces [m²]

Heat transfer coefficient - U-value [W/(m² K]

Heat transport through opaque construction thermal resistance (R-value) [(m²K)/W]

Daylight gains light transmittance [-]

Heat gains lighting [W/m²]

Heat gains apparatus [W/m²]

5

200 300

6

0.40 -

1.2

1.3

0.7 6.2 5.7

50

500 650

35

0.60 -

2.1

2.5

0.75 12.7 17.5

100

800

1250

100

0.85 -

3.0

4.0

0.80 33.9 34.0

15.8

100 150

15.7

0.10 -

0.3

0.5

0.0 4.6 4.7

Table 2: Design scenario parameters (Hopfe & Hensen, 2011)

Parameter

Room size [m²] [182,325]

Switch between single / double glazing yes/no

Table 3: Design scenario parameters, extract of (Van Gelder, 2014)

Parameter Discrete scenario values Reference

Nominal energy price evolution -1.5 % / +2.3 % / +10 % Van Gelder, 2014

Table 4: Stochastic design parameters, extract of (Van Gelder, 2014)

Parameter Distribution Reference

Air infiltration rate at 50 Pa l/h Van Gelder, 2014

Heat recovery rate of the ventilation system

Van Gelder, 2014

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 32/127

© eeEmbedded Consortium www.eeEmbedded.eu

Legend

Uniform distribution between a and b

Normal distribution with mean value and standard deviation

Weibull deviation with scale factor and shape factor

Additional comment Discrete uniform distributions are indicated by the same values

Table 5: Uncertainty parameters, extract of (Van Gelder, 2014)

Parameter Distribution Reference

Set temperature occupancy day zone °C Van Gelder, 2014

Set temperature absence day zone 15°C, no reduction Van Gelder, 2014

Set temperature occupancy night zone °C Van Gelder, 2014

Internal heat gains W Van Gelder, 2014

Air change rate day zone 1/h Van Gelder, 2014

Air change rate night zone 1/h Van Gelder, 2014

Legend

Uniform distribution between a and b

Normal distribution with mean value and standard deviation

Weibull deviation with scale factor and shape factor

Additional comment Discrete uniform distributions are indicated by the same values

Table 6: Estimation of uncertainty of parameters related to thermal load or operation regime, normal distributed (Hopfe & Hensen, 2011)

Parameter

Infiltration AC Rate [ACH] 0.5 0.17

Loads people [W/m²] 15 2.4

Loads lighting [W/m²] 15 2.4

Loads equipment [W/m²] 20 3.2

Glass surface [%] 75 22.5

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 33/127

© eeEmbedded Consortium www.eeEmbedded.eu

Table 7: Estimates of uncertainty of parameters, extract of (Heo & Choudhary, 2012)

Parameter Initial value Min Max

Thermal properties

Roof U-value [W/m²]

Roof solar absorptance [W/m²] Roof emissivity

Wall U-value [W/m²]

Wall solar absorptance

Wall emissivity

Window U-value [W/m²]

Window solar absorptance Window emissivity

Envelope heat capacity [kJ/(m² K)]

0.19 0.68 0.91 0.32 0.63 0.91 2.62 0.77 0.84 260

0.17 0.60 0.87 0.29 0.43 0.87 2.36 0.76 0.75 160

0.21 0.76 0.95 0.36 0.83 0.95 2.88 0.79 0.92 275

Internal loads

Appliance power density [W/m²]

Lighting power density [W/m²]

Occupant heat gain [W/m²]

15 13 4

12 11 3

22 15 7

Internal loads

Indoor temperature [°C] 22 20 24

Ventilation

Infiltration rate [1/h]

Discharge coefficient

0.50 0.68

0.10 0.60

1.25 0.75

Heating system

Heating generation efficiency [-]

Heating distribution loss factor [-]

0.97 0.08

0.95 0.06

0.98 0.16

Table 8: Estimates of uncertainty of physical parameters for an exemplary outside wall, normal distributed (Hopfe & Hensen, 2011)

Parameter

Steel Thickness t [m]

Thermal conductivity [W/(m K)]

Density [kg/m³]

Heat capacity [J/(kg K)]

0.005 50

7800 480

0.0005 0.75

25.74 19.2

Glass fibre quilt Thickness t [m] Thermal conductivity [W/(m K)]

Density [kg/m³]

Heat capacity [J/(kg K)]

0.127 0.04 12

840

0.0127 0.0032

1.08 56.28

Concrete block Thickness t [m]

Thermal conductivity [W/(m K)]

Density [kg/m³]

Heat capacity [J/(kg K)]

0.2 1.41 1900 1000

0.02 0.1269

28.5 106

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 34/127

© eeEmbedded Consortium www.eeEmbedded.eu

Table 9: Estimates of uncertainty of physical parameters of an exemplary floor constructions, normal distributed (Hopfe & Hensen, 2011)

Parameter

London clay Thickness t [m]

Thermal conductivity [W/(m K)]

Density [kg/m³]

Heat capacity [J/(kg K)]

0.8 1.41 1900 1000

0.08 0.4653 332.5 107.5

Brickwork Thickness t [m]

Thermal conductivity [W/(m K)]

Density [kg/m³]

Heat capacity [J/(kg K)]

0.28 0.8

1700 800

0.028 0.2772 297.5

86

Cast concrete Thickness t [m]

Thermal conductivity [W/(m K)]

Density [kg/m³]

Heat capacity [J/(kg K)]

0.1 1.13 2000 1000

0.01 0.1017

30 106

Dense eps slab insulation

Thickness t [m] Thermal conductivity [W/(m K)]

Density [kg/m³]

Heat capacity [J/(kg K)]

0.0635 0.025

30 1400

0.00635 0.00875

21 378

Chipboard Thickness t [m]

Thermal conductivity [W/(m K)] Density [kg/m³]

Heat capacity [J/(kg K)]

0.025 0.15 800

2093

0.0025 0.025

25 134

Synthetic carpet Thickness t [m]

Thermal conductivity [W/(m K)]

Density [kg/m³]

Heat capacity [J/(kg K)]

0.015 0.06 160

2500

0.0015 0.0078

18.4 945

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 35/127

© eeEmbedded Consortium www.eeEmbedded.eu

Table 10: Estimates of uncertainty of physical parameters of an exemplary roof construction (Hopfe & Hensen, 2011)

Parameter

Stone chippings

Thickness t [m] Thermal conductivity [W/(m K)]

Density [kg/m³]

Heat capacity [J/(kg K)]

0.01 0.96 1800 1000

0.001 0.288 228.6 195

Felt bitumen layer

Thickness t [m]

Thermal conductivity [W/(m K)]

Density [kg/m³]

Heat capacity [J/(kg K)]

0.005 0.5

1700 1000

0.0005 0.25 493 330

Cast concrete

Thickness t [m]

Thermal conductivity [W/(m K)]

Density [kg/m³]

Heat capacity [J/(kg K)]

0.15 1.13 2000 1000

0.015 0.1017

30 106

Glass fibre quilt

Thickness t [m]

Thermal conductivity [W/(m K)]

Density [kg/m³]

Heat capacity [J/(kg K)]

0.1345 0.04 12

840

0.01345 0.0032

1.08 56.28

Ceiling tiles

Thickness t [m]

Thermal conductivity [W/(m K)] Density [kg/m³]

Heat capacity [J/(kg K)]

0.019 0.056 380

1000

0.0019 0.02436

102.6 108

Regressor user behaviour 2.2.5

2.2.5.1 Introduction

User behaviour is identified as one of the major drivers for energy consumption inside of buildings

within various research results. Mostly the user behaviour is described by generating occupancy

profiles especially for residential and office buildings although the user behaviour within office

buildings seems easier to describe because of the more ruled conditions, the more or less uniform

buildings and the organised character and nature of the work and the related behaviour within the

working sphere. Compared with the office sphere the residential sector holds a higher level of

uncertainties in modelling the user behaviour because of the wider variety of hard and soft border

conditions. In both cases the occupancy of people is addressed as one main aspect which attracts the

energy consumption in a significant and direct and indirect manner.

The main focus when modelling user behaviour is put on the following occupancy profiles but

besides the occupancy of people other factors which are connected directly and indirectly to the

presence of humans are relevant for energy consumption:

User activity level

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 36/127

© eeEmbedded Consortium www.eeEmbedded.eu

Occupancy

o Density

o Occurrence

User interaction with

o User equipment

Usage of user specific equipment

o Building components

Shading

Natural ventilation / Window opening

o HVAC / electrical systems

Lighting

Temperature set point

Ventilation set point

Outcomes of statistic research activities described in (Eurostat, 2004) covering the time usage within

ten European countries are presented below to illustrate the common uniformity spread over the

European population but also differences in details within the time usage per day within the

residential or private sphere (Figure 18, Figure 19) and the working world (Figure 20, Figure 21).

Figure 18: Sleep: daily rhythm on weekdays of persons aged 20 to 74 (Eurostat, 2004)

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 37/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 19: Meals and personal care: daily rhythm on weekdays of persons aged 20 to 74 (Eurostat, 2004)

Figure 20: Gainful work; daily rhythm on weekdays of people aged 24 to 74 covering women

(Eurostat, 2004)

Figure 21: Gainful work; daily rhythm on weekdays of people aged 24 to 74 covering men (Eurostat, 2004)

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 38/127

© eeEmbedded Consortium www.eeEmbedded.eu

2.2.5.2 Occupancy modelling

Within the past few years a great amount of research and analysis work was done to observe and

model the user behaviour within different types of buildings or to take into account the user’s

occupancy in relation to the energy demand within buildings, e.g. (Richardson et al., 2008; Page,

2008; Ipsos-RSL, 2000; Duarte et al., 2013; Yun et al., 2009; Rijal et al., 2007; van Den Wymelenberg,

2012; Guerra Santin, 2011; Hoes, 2009; Martani, 2012; Zhang et al., 2011; Bourgeois et al., 2006;

Widén et al., 2009; Virote, 2012; Humphreys & Nicol, 2002).

To model user behaviour, two steps are needed. At first, an occupancy model simulates the number

of people in every zone at every given time. Secondly, interaction models represent the possible

interactions of occupants with their environment, e.g. with the BACS or the lighting.

In the mathematical modelling of occupancy, two distinct approaches are dominant. One is agent-

based modelling, which simulates every single occupant individually see e.g. (Liao et al., 2010). The

major upside of this approach is the possibility of an extremely high level of detail. Furthermore the

dependence between zones, meaning that a person who is in one room cannot be in another, is

captured. The major downside is very high computational costs.

As occupancy simulation is only one of many tools in eeEmbedded, we decided for the

computationally efficient method of inhomogeneous first-order Markov chain models, which

simulates the number of occupants per zone forthrightly see e.g. (Richardson et al., 2008).

The term first-order Markov chain implies that the number of occupants in a zone at an arbitrary

time only depends on the state at time and the probability of transition between the states.

In mathematical terms, this is

| | .

The term inhomogeneous implies that these probabilities of transition depend on the current point

of time.

In the earlier design stages (urban design phase), it is possible that a zone is a floor or even the whole

building, while in later design stages (early and detailed design phase) with more information

available, a zone will be a special type of room like a manager’s office.

Additionally each zone has an associated level of activity, which is assigned to every occupant in the

zone. A zone with very high activity is e.g. a gym, while a bedroom is an example for a zone with a

low level of activity. These activity levels are used to estimate a person’s heat emission during the

energy simulation.

To simulate the number of occupants in a zone over the course of a day, all that is needed is a matrix

for every time step, containing the probabilities to transition between all possible states. Such a set

of matrices, belonging to one single zone, is called a zone profile.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 39/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 22: Example runs for a residential zone with max. 2 occupants on a weekday

(Richardson et al., 2008)

A transition matrix for a zone with a maximum of 2 occupants would have size 3x3 to model the

transitions between the states 0, 1 and 2, as well as the retention of the current state. To assure the

finite size of these matrices, each zone needs to have a maximum number of occupants. This number

can be obtained using the floor area as well as the type of the zone, can be guided by client

standards and requirements or can be set at will.

The intention of this approach is to use different profiles for different types of zones. To create these

profiles, one needs a sufficient large dataset about the activity of users of a comparable zone. To

acquire these data, one has to consult studies like (Duarte et al., 2013) about occupancy in a bureau

building or the United Kingdom Time Use Survey (Ipsos-RSL, 2000), focusing on residential

occupancy.

To get a transition probability between two states, one counts all occurrences of this transition in the

dataset at the given time step and divides it by the number of entries concerning the time of interest.

In Figure 23 and Figure 24, taken from (Richardson et al., 2008), one can see an example of a

transition matrix for a zone with a maximum of 1 occupant, as well as the calculations to obtain the

probabilities.

Figure 23: Example of a transition matrix (Richardson et al., 2008)

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 40/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 24: Calculation of transition probabilities (Richardson et al., 2008)

To start the simulation, a start state is needed for every zone. Assuming that the simulation begins at

0:00, zero active occupants may be a good guess. Alternatively every start state considered fitting,

including a stochastically chosen one, can be used.

To refine the model, it is possible to differ between different types of days, e.g. weekdays and

weekends or holidays. Then, to create the transition matrices, only database values from the

corresponding day type are considered.

2.2.5.3 Interaction modelling

The next step is the modelling of the occupant’s interactions with three kinds of appliances. Devices

of the first kind are running no matter if they are interacted with, e.g. a fridge. In the interaction

modelling, these do not need to be taken into account.

The next kind of appliances is guided by individual tolerance thresholds of the user, which are values

whose exceeding triggers a reaction, like temperature minimum and maximum or CO2 maximum. All

manually operable parts of the HVAC system belong to this group. If the corresponding human

tolerance threshold is reached during a non-deterministic simulation run, it is checked if a person is

present, and if so, a predefined action is executed, e.g. opening a window when there is too much

CO2 in the air. To provide the system with the adequate time to react to the executed action this

human tolerance threshold is not monitored for the next couple of time steps. The value of the

tolerance threshold itself is specific for each user and thus could be a stochastic variable too.

It is possible to improve this basic approach by using stochastic thresholds and stochastic reactions,

but for simplicity’s sake here the easiest approach will be used.

The last type of appliances is activated without the guidance of a threshold, e.g. a washing machine.

To model these precisely, a tremendous effort is necessary, as there usage differs between points in

time, depends on the number of people present and the type of zone it is located in, e.g. a coffee

machine in an office compared to a coffee machine in a private apartment, and all those cases have

to be supplemented with empirical data. For these reasons it is expedient to use an average energy

demand for these types of appliances and to not consider them in the interaction modelling. This has

the further benefit that the interaction model concentrates on the building energy system, where the

project focus is at.

For an advanced stochastic modelling, each appliance of the last type needs a set of predefined

activation probabilities, depending on the number of present occupants, the time of the day, the last

activation and possibly several other factors, as well as a timeframe in which it cannot be activated

again. The required data could be obtained from field studies or could be estimated based on

experience and common knowledge.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 41/127

© eeEmbedded Consortium www.eeEmbedded.eu

Regressor climate trend 2.2.6

2.2.6.1 Introduction

Processing building lifecycle analysis commonly covers a period of about 30 to 50 years. Focussing on

the main drivers of the energy demand especially for heating and cooling purposes leads to the

climate or more specific to the climate change within the period under observation. A brief definition

of the term ‘climate’ is given in (Bernhofer, 2008) as the totality of all weather states including their

typical sequence and their daily and seasonable fluctuations which are possible at a certain location.

Following this definition, the climate is the result of processes within the atmosphere but also the

result of the interdependencies between continents, oceans, atmosphere and solar activity.

The analysis of climate and climate change needs a separation of the climate into the basic climate

(Bernhofer, 2008) elements with significant influence on building design and energy demand: (1)

temperature, (2) precipitation, (3) wind, (4) radiation balance, (5) potential evaporation, and (6)

climatic water balance. Climate elements are meteorological values characterising the climate as

single value or as combination of values. The first four mentioned climate elements have a

fundamental importance and will affect the building and energy system design. Besides the climate

elements, climate factors are identified and addressed as processes and states which cause, sustain

and modify the climate. Typical factors are solar radiation, height above sea level and the spread of

land and sea areas.

The values given in Figure 25 and Figure 27 emphasize the importance of the consideration of the

climate change within a long term prognosis of energy demand of the building stock focusing a

building lifecycle of about 30 to 60 years. As starting point of modelling climate data, the analysis of

historical on-site weather data or statistical weather data in conjunction with a drift could be used.

To model the development of the climate change within a single factor with help of Wiener Process

combined with a drift factor and applied to several relevant climate elements could be an

appropriate strategy to tackle the expected climate change within the upcoming 100 years. This

strategy is similar to the prognosis of stock indexes used within the financial domain.

Figure 25: Comparison of historical reconstructions of near-global land temperatures, processed by CRUTEM4 climate model (Hawkins, 2013)

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 42/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 26: Development of the avarage annual temperature (thick line are 11-year-periode smooth mean values) within the periode of 1821-2100 in the city of Dresden (Germany); future values are results of

several prognosis models (Bernhofer, 2013)

With reference to Figure 27 e.g. the number of cold days (minimal outside air temperature lower

than 0°C) will decrease by 17.3 days within the next coming years between 2021 until 2050 in

Dresden, Germany. On the other hand the number of tropical nights (mean outside air temperature

higher than 20°C) will increase by 1.6 days compared with the current situation.

Figure 27: Mean values of characteristic climate values for weather station Dresden-Klotzsche – measured historical data between 1961-1990 compared with measured data between 1991-2010 and results of a

long term prognosis covering periods 2021-2050 and 2071-2100 (Bernhofer, 2013)

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 43/127

© eeEmbedded Consortium www.eeEmbedded.eu

The following Table 11 contains data to illustrate the climate change while comparing historical

climate data, presented in (Bernhofer, 2008).

Table 11: Analysis of historical climate data of selected climate elements for Dresden and Saxony region (Bernhofer, 2008)

Climate element:

Temperature

Location:

Saxony region (Germany)

Time period Alternation per year [K] Mean value [°C]

1901-2005 +0,006 8,1

1961-1990 +0,023 7,9

1991-2005 +0,040 8,7

Climate element: Temperature

Location: Dresden (Germany)

Time period Alternation per year [K] Mean value [°C]

1876-2005 +0,003 8,7

1961-1990 +0,040 8,7

1991-2005 +0,010 9,4

Climate element: Precipitation

Location: Dresden (Germany)

Time period Alternation per year [mm] Mean value [mm]

1828-2005 +0,32 780,3

1961-1990 +3,46 788,8

1991-2005 +1,18 742,2

Climate element: Global solar radiation

Location: Dresden (Germany)

Time period Alternation per year [kWh/m²] Mean value [kWh/m²]

1901-2005 -0,11 1075,5

1961-1990 -1,15 1050,9

1991-2005 +1,29 1087,8

2.2.6.2 Modelling of long term climate trend

For long term modelling of climate change statistical data which are provided by several distributors

and institutions and will be combined with a drift factor.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 44/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 28: Simplified stochastic approach of modelling the climate change with a Wiener process combined with a drift factor and applied to relevant climate elements like temperature and solar radiation

The German national weather service institution DWD has publishes data as results of long-term

prognoses covering the time period until 2050 to support the pre-described intensions.

Regressor energy price 2.2.7

2.2.7.1 Introduction

One main regressor in the context of the analysis of energy usage within buildings is the price for

energy which is provided by external suppliers. Typically the building is connected with the (1) district

distribution network of the electrical energy supplier. Especially for supply with thermal heat the

building could be featured with (2) connections to a district heating and (3) optionally a cooling

system or (4) a pipe network for natural gas supply.

The motivation for economical usage and intelligent management of all kinds of energy and the

sensitivity of the people and the civil society as a hole depends besides the associated greenhouse

gas emissions and the security of supply mainly on the level of the energy prices. The rate of energy

usage or the level of motivation is inversely proportional to the height of energy prices. In a similar

manner the activities from research and development on the field of the energy technology are

connected with the energy prices. On the other hand the consequential level of the energy price is

influenced by the level of energy demand/consumption which is among others a result of the used

technologies for production, storing and distribution of energy.

Taking into account these relationships and interdependencies the energy price acts as a main

indicator and simultaneously as main driver of energy usage in a versatile manner.

The observation and prognosis of the energy price can be divided into two perspectives: (1) a long

term perspective with relevance for investment related decisions covering 10 to 30 years and (2) a

short term perspective which is a part of the control strategies used to optimise the behaviour of the

building and the energy systems inside and nearby a building within the following one to five days.

With respect to the alignment both perspectives are based on different stochastic models.

Drift

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 45/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 29: Possible ways of processing price prognoses

Several fundamental models for processing prognoses on the energy market on a large scale level

including price prognoses are available: MARKAL (ETSAP, 2015; Loulou, 2004), TIMES (ETSAP, 2015a),

ELMOD (Leuthold, 2008) and others. These are all numerical non-stochastic models, which are based

on the technical characteristics of the energy market, like plant capacities, restrictions in

transmission, local laws, type and localisation of power plants and storages and other parameters.

The main reason for applying these models is the quality of its predictions because of the

underpinned actual energy market situation. Common reasons against the usage of these models are

high effort for the development of such models, the high acquisition cost and the high level of

knowledge which is necessary to use the models in an appropriate manner. To prevent the

mentioned drawbacks several results of energy prognoses or related services can be purchased on

the market.

Figure 30: Constraints for the prognosis of energy prices

The overall approach of stochastic models which are used in the context of energy prognoses is the

analysis of the past to gain information to predict the future development on a high level. Most of

the time ARIMA models or models covering exponential smoothing are used. With the help of the

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 46/127

© eeEmbedded Consortium www.eeEmbedded.eu

forecast approach the best fitting parameters for a given time series will be found to predict the

future values including confidence intervals. These models are easy to use and when using pre-

configured software packages for processing forecast, the model of a given class which fits best will

be found. As main argument against the usage of stochastic models in this context could be

mentioned that the processed analysis is not the natural way of representing dependencies.

There are several data related issues which have to be discussed when applying prognoses in general

and stochastic approaches in specific to the target of depending on the target of forecasting energy

prices. Regarding the time resolution the mentioned long term prognoses could be processed on

hourly or daily basis depending on the level of detail for modelling the energy systems and the

energy demand when covering a forecast period of 10 to 30 years or more.

According to the character of the long term prognoses the results are covering a broad confidence

interval. Applying long term prognoses according to a single location like a building site in

conjunction with a wide prognosis period several uncertainties with high impact on the results are

arising. Typical factors - partly with strong relation to a certain country or an administrative region -

in that sense are politically, financially (e.g. tax fees) and technologically driven boundary conditions.

The regionalisation of the processed results while focussing on a certain location is a mayor issue

when using these data too. While making design related decisions about the conjunction with the

building envelop and the type of energy systems, the overall long-term trend of the energy price acts

as the main factor which has to be observed.

2.2.7.2 Indices

Appropriate indices are available to monitor the rate of energy related exchange activities, e.g. the

wholesale price for electrical energy named as Physical Electricity Index (Phelix) and its derivatives

available for Germany and Austria monitored on the European Power Exchange (EPEX SPOT) in Paris

which acts as reference index. NetConnect Germany provides the price index NCG.

Figure 31: Example of Phelix index and derivatives (wholesaling price for electrical energy) between June 2013 and June 2015 (ISPEX, 2015)

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 47/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 32: Example of NCG index and futures (wholesaling price for natural gas between June 2013 and June 2015 (ISPEX, 2015)

Several additional service providers are offering additional index values, e.g. Energy price index

(ISPEX) by ISEX AG, see (ISPEX, 2015).

Figure 33: HEPI for electrical energy and natural gas between 2009 and July 2014 (E-Control 2014)

Other examples for indices are the Household Energy Price Index for Europe (HEPI) covering

electricity and natural gas supply monitored and maintained by Energy-Control Austria and VaasaETT

Ltd., see Figure 33.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 48/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 34: Comparison of prices for electrical energy for households in European capital cities (E-Control, 2014)

The comparison of energy prices in European capital cities presented in Figure 34 indicates that a

site-based approach is essential while processing prognoses about energy prices to ensure a reliable

prognosis result regarding decision making and the estimation of operational costs.

2.2.7.3 Modelling energy prices

The modelling of the long-term development of energy prices (natural gas and electricity) could be

realised with the help of an ARIMA model approach including a drift factor as shown in Figure 36.

These figure contains three different realisations of a stochastic model including a drift. Reviewing

the diagrams given in Figure 31, Figure 32 but also in Figure 33 especially the drift factor should be

chosen carefully to reproduce the appropriate trend of development.

Figure 35: Stochastic approach of modelling energy prices using an approach Wiener process including a drift factor

Figure 36 shows different stochastic model realisations based on the combination of ARIMA, GARCH

and drift a factor.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 49/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 36: Examples for prognosis of energy prices (natural gas or electricity) as a result of combined ARIMA, GARCH und deterministic trend

Short-term prognoses of energy prices are used to optimise the building operation and the energy

system management to rich a financial optimum. This kind of prognosis should be processed on a

smaller temporal scale in the range of maximum 15 minutes or better on a lower basis. Closely

related to the short-term prognosis is the time discretisation of the energy exchange intraday auction

frequency (EPEX, 2015).

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 50/127

© eeEmbedded Consortium www.eeEmbedded.eu

Applicable stochastic models appropriate for such use cases are the ARIMA and GARCH models.

Figure 37 and Figure 38 are presenting results of a stochastic model approach compared with

historical real-world data for validation purposes. Both figures show that the main characteristics of

the historical data is portrayed by realisation of the chosen stochastic model.

Figure 37: Comparison of historical price values of EPEX and prognosis results processed with an ARIMA approach for a period from June to December 2009

Figure 38: Comparison of historical price values of EPEX and prognosis results processed with an ARIMA approach for a single week covering electrical energy in January 2009

A more detailed analysis of a selected week given in Figure 38 presents differences between both

curves while keeping the overall daily rhythm in general. This could be a starting point for a re-

shaping of the model to produce results closer to the real-word data.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 51/127

© eeEmbedded Consortium www.eeEmbedded.eu

Regressor technological progress 2.2.8

2.2.8.1 Introduction

While analysing the energy usage within long term periods covering 10 to 30 years it seems to be

worth taking into account the development of energy efficiency. A brief systematisation of

technological progress is given in Figure 39. Four main groups are identified as drivers for

technological progress: (1) changes on the building envelope or the construction materials, (2)

progress on the (building) energy systems, (3) energy related improvements on user specific

equipment but also on (4) information exchange between systems, subsystems and components.

Figure 39: Overview of main drivers for technological progress

Improvements on energy efficiency could be reached on-site within the building and the other parts

mentioned above but also on a central sphere covering the overall energy production on supplier’s

side within several kinds of power plants but also energy storage and distribution technology

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 52/127

© eeEmbedded Consortium www.eeEmbedded.eu

expressed through a higher level of Coefficient of Performance (COP). Most of the improvements on

supplier’s side are independent of the on-site client activities or financial investments.

Examples for on-site improvements are given in Figure 39. Predestined parts for technological

progress are situated on-site, e.g. construction related parts are necessitating a more or less high

amount of financial investments like selected parts from the building energy system domain too.

Except this there are parts which only need a low amount of financial investment to gain a high

impact according to energy efficiency, e.g. all parts covering intelligent information exchange and

analysis to support decision making on control and management level but also at the equipment

which acts as user interface.

Partly technological progress could be detected or interpreted as improvement of the reliability of

systems and components.

Several indices are available to measure or express technological progress. One example is the

Odyssee energy efficiency progress index (ODEX) provided by the European Environment Agency

which covers the development within 28 countries of the European Union. The index reflects four

different branches: (1) households, (2) industrial sector, (3) tertiary sector and (4) transport branch,

see Figure 40. Lower values are indication a higher energy efficiency. An ODEX values of 85 indicates

a gain of 15% of energy efficiency – like the average values given for the year 2012 in Figure 40.

Figure 40: Odyssee energy eficiency index (ODEX), 28 European countries (Odyssee-Mure, 2015)

Beside the ODEX index several more detailed indices are available, e.g. describing the efficiency of

conventional thermal power production, see Figure 41 and Figure 42 (Eurostat, 2015). Especially the

production of heat and electricity on-site and at supplier level but also the storing of energy could be

realised by using several different technologies.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 53/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 41: Efficiency of public conventional thermal power production, 28 countries of the European Union and non-EU EEA countries (EEA, 2015), publishing date 20 Jan 2015

Figure 42: Efficiency of conventional thermal power production for district heating, 28 countries of the European Union (Eurostat, 2015), publishing date 06 Jan 2015

Taking into account that the dynamic within the technology development differs from technology to

technology an individual analysis or prognosis of each available technology is appropriate to support

design decisions. The major known technologies in this sense are the following:

Heat and electricity production o District heating and cooling low level improvements expected o Coupled heat and power generation medium level improvements expected o Natural gas and bio gas / mineral oil / biomass combustion

no improvements expected o Heat pump (air, water, salt brine) medium level improvements expected o Thermal solar medium level improvements expected o Photovoltaic cells high level improvements expected o Fuel cell high level improvements expected o Wind power plant medium level improvements expected o Tidal power plant not relevant for site related decisions o Water power plant not relevant for site related decisions

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 54/127

© eeEmbedded Consortium www.eeEmbedded.eu

Storage technology o Heat

Water no improvements expected Salt brine low level improvements expected Phase change materials/ice medium level improvements expected Rock bed no improvements expected Construction material within buildings

medium level improvements expected Ground low level improvements expected

o Electricity Battery technology high level improvements expected Pumped-storage power plant not relevant for site related decisions

Please refer to Figure 39 for a high level clustering of braches and technologies which could be

analysed by processing a prognosis regarding the potential for improving not only energy efficiency

but also accessibility and comfortability of use. Each of the identified clusters should be analysed

separately focussing on a long-term period by using an ARIMA model in combination with a drift

factor.

With respect of the local circumstances and border conditions a regional factor should be taken into

account. Figure 43 presents the regional differences outlined with the efficiency of public

conventional thermal power production.

Figure 43: Country-specific efficiency of public conventional thermal power production (EEA, 2015)

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 55/127

© eeEmbedded Consortium www.eeEmbedded.eu

2.2.8.2 Modelling technological progress

The modelling of the development of the energy efficiency within the building and technology sector

could be processed with the help of Wiener process.

Figure 44: Examples for technological progress expressed as improvement of energy efficiency as positive trend, processed using a combination of ARIMA approach and deterministic trend

Ind

ex o

f Te

chn

olo

gica

l Pro

gres

s In

dex

of

Tech

no

logi

cal P

rogr

ess

Ind

ex o

f Te

chn

olo

gica

l Pro

gres

s

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 56/127

© eeEmbedded Consortium www.eeEmbedded.eu

2.3 Vulnerability analysis

Analysis of reliability / dependability and security aspects 2.3.1

2.3.1.1 Introduction

The evaluation of reliability/dependability is one aspect with relevance to the building itself but also

to the building energy systems within both, the design and the operational phase.

Because the design process focuses the comparison of the energy system concepts based on the

design of elaborated variants, the following chapters focus on aspects and analysis, which could be

integrated into the design process to support the decision making process.

Like any other system the energy systems have to fulfil certain requirements, visualised as RAMS

process (Reliability, Availability, Maintainability, and Safety). Main aspects of the RAMS process are

parts of the client requirements and the requirements of public authorities too with high impact on

the design process, see Figure 45.

Figure 45: Visualisation of the RAMS process (Reliability, Availability, Maintainability, and Safety), see (Meyna & Pauli, 2010)

To assess the overall system with more details it is of interest to describe the behaviour of its

components and their interactions. The vulnerability analysis mentioned in the previous section can

rely on the characteristics of the system components applying hazard considerations. The hazard rate

of the overall system can be defined as a function of hazard rates of the different system

components. At this point, the way to establish this function strongly depends on the system

characteristics. Assuming components with constant hazard rates, the hazard rate of the overall

system will be derived by summing the hazard rates of all components taken separately. The same

can be done with hazard rate functions modelled as non-homogeneous Poisson processes if there

are no dependencies between system components. If the components behaviour is correlated, if the

system disposes of redundancy or even if the system is repairable the hazard rate of the overall

system shall be derived in a more complex manner. Several approaches for vulnerability analysis

considering different characteristics of systems are presented as examples in (Todinov, 2006).

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 57/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 46: Methods of reliability and security theory (Meyna & Pauli, 2010)

Figure 46 presents main methods of reliability and security theory. Especially the Boolean modelling

and the stochastic based analysis are common used methods in the industrial production and the

(nuclear) power plant domain as well as the automotive and airline industry.

Figure 47: Systematisation of reliability and malfunction according to builing lifecycle

From the perspective of a designer of energy systems especially (1) the reliability/dependability

analysis, (2) the hazard analysis and the (3) vulnerability analysis within the comparison of energy

concepts are most relevant. The analysis of malfunction and underperformance within energy

systems are aspects with strong relationship to the operational phase of a building, see Figure 47.

The Facility Management domain is focused on optimising the operation of the building and all of its

technical systems including the energy related parts to prevent malfunction, underperformance as

well as hazards while prolonging the lifecycle of the systems.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 58/127

© eeEmbedded Consortium www.eeEmbedded.eu

2.3.1.2 System reliability analysis – An overview of techniques (following Rausand et al., 2004)

In literature, there are many different technics to model and analyse a system’s reliability. Here the

most common ones are presented.

Failure mode and effects analysis (FMEA) is one of the oldest techniques for system reliability

analysis. The idea is to analyse the components, subsystems, possible failure and their effects and to

record the findings in a special worksheet (see Figure 48). If each failure gets quantified by assigning

a priority, FMEA becomes failure mode, effects, and criticality analysis (FMECA). FMEA and FMECA

are exclusively qualitative techniques.

Figure 48: Example of a FMECA worksheet (Rausand et al., 2004)

Fault tree analysis is one of the most used techniques in risk and reliability engineering. A fault tree

is a top-down, deductive logic diagram, starting with a critical event on top and dividing into the

causes for this event, the causes for these causes and so on when trailing down the tree. To combine

these events, so called logic gates, like AND gates or OR gates are used. All events are of binary

nature, meaning they either occur or they do not. This logical structure makes fault tree analysis very

suited for computerised analyses.

Figure 49: Example of a fault tree (Rausand et al., 2004)

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 59/127

© eeEmbedded Consortium www.eeEmbedded.eu

Cause and effects diagrams, also known as Ishikawa diagrams, have the purpose to identify and

characterise all possible events that may lead to one specified event. Thereby the causes are

arranged according to their importance or their level of detail. This usually results in a fishbone-like

shape (see Figure 50).

Figure 50: Example of a cause and effect diagram (Rausand et al., 2004)

Cause and effect diagram serve a similar purpose as fault trees, but there form is less restricted, what

makes them more appropriate for a brainstorming and less appropriate for computational

processing.

Bayesian belief networks are directed acyclic graphs and constitute a more general version of a fault

tree, because the events do not need to be binary and there connection is not restricted to logical

gates. If defined appropriately, a quantitative analysis is possible nevertheless. An example of a

Bayesian belief network can be seen in Figure 51.

Figure 51: Example of a Bayesian belief network (Rausand et al., 2004)

Event tree analysis is an inductive technique that starts with a single event, like an accident, and

quantifies all possible following scenarios. This leads to a list of all possible outcomes of the initiating

event. This approach is especially suited to examine different combinations of safety functions and to

compare their performance when different accidents occur.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 60/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 52: Simple event tree for a dust explosion (Rausand et al., 2004)

Markov models are based on stochastic processes, called Markov chains. These are used to model a

system with different states, not only two like assumed in most of the other models, by utilising the

transition probabilities between all possible states. This kind of model is very well suited for

computational simulation. The downside is that to acquire all transition probabilities, a lot of data is

needed. Furthermore, Markov models view the system holistically, so it is hard to acquire statements

on component level. It is possible to transform a fault tree with given component failure probabilities

into a Markov model where the system’s states refer to the different combinations of functioning

and failed components.

Reliability block diagrams are success-oriented networks describing the function of a system. It

describes the logical connection of components, leading to the fulfilment of a function. If a system

has several functions, a separate reliability block diagram for each is needed. These kinds of diagrams

are especially suited to describe non-repairable systems, in which the order of failure is of no

consequence.

Dependability block diagrams used to model different levels of decomposition/aggregation of

technical systems as structures of parallel and serial ordered subsystems and components

represented by relevant characteristic reliability related values, see Figure 53 to Figure 55

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 61/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 53: Reliability block diagrams a) serial system, b) parallel system, c) parallel-serial system

Figure 54: Example of a more complex reliability block diagram (Rausand et al., 2004)

Figure 55: Example for dependability block diagrams

The application of the block diagrams on an example is shown in Figure 56. Following the suggested

structure of the Energy System Information Model (ESIM) the energy system is divided into several

main parts which can be represented as blocks in conjunction with dependability related values.

b)

c)

a)

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 62/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 56: Decomposition of Energy systems based on the ESIM approach to identify major subsystems and components

Within the vulnerability analysis of technical systems also state charts are used to analyse systems

and algorithms to identify critical behaviour, see Figure 57.

Figure 57: State chart example, homogenous steady Markov process (Meyna & Pauli, 2010)

2.3.1.3 Simulation of system reliability

To simulate the reliability of a system, one needs the related fault tree, the hazard rate for each

component, which yields an inhomogeneous Poisson process with parameter for each

component, and a time frame. Furthermore, each component needs a start state which tells if the

component is active or inactive at the start of the simulation. Then, in the first time step, for every

active component a random realisation of the associated Poisson process is drawn to indicate if the

component fails. When this is done, the fault tree is used to check if higher level events are triggered.

Then system reactions are activated (see Chapter 4), e.g. a maintenance activity may be initiated, the

component under maintenance may get the default status inactive and a standby component may

get the status active for a certain amount of time steps. The repair time can be determined

stochastically or deterministically. It is to note that this approach assumes that inactive components

do not age and cannot fail.

Then, the next time step is started and so on until the end of the considered time frame is reached.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 63/127

© eeEmbedded Consortium www.eeEmbedded.eu

If a component has a non-constant hazard rate, it may be advisable to reset after it got repaired,

e.g. to the beginning of the useful life region (see Figure 58).

In most cases the goal is to derive KPIs, e.g. described in Chapter 2.3.2, referring to the failure of the

whole system, which is the top event of the corresponding fault tree, so at least these points in time

at which the system fails have to be stored during simulation. As failure of the system is most often

an event with very small probability, the simulation has to be repeated several times before

statistical statements can be claimed.

2.3.1.4 Optimisation of reliability/dependability within the design process

There are several approaches available for enhancing dependability and robustness within the design

phase (Meyna & Pauli, 2010):

Simplification enhance dependability through reduction of complexity

Marginal importance reduction of importance of an single component or sub-system concerning the failure probability of the hole system; identify the components within a system which are most important for the survival or failure-free operation of the system

Derating / permanent load reduction Reduction of the load level of relevant components to enlarge the lifetime or to reduce the probability of failure

Redundancy multiply the existence of components with an high importance for the survival or failure-free operation of the system

The pre-mentioned aspects can be taken into consideration when designing technical systems. The

integration of these points into the comparison and analysis the energy systems can provide

important inputs into the decision making domain within the design process.

Several techniques and methods are available for system conception and system evaluation:

Reliability model

Reliability allocation

Reliability prognosis Failure type , failure effect, criticality analysis

Tolerance analysis

System / subsystem / component choice

Especially thermal energy systems are exposed to varying operational conditions within the

operation phase. With respect to this conditions several evaluation methods are available to rate the

reliability/dependability of technical systems, subsystems and components mostly used on

manufacturers side but not within the design phase of a building:

Temperature dependence according to ARRHENIUS

Temperature-humidity dependence according to EYRING

Mechanical load according to WÖHLER

Temperature-change according to COFFIN-MANSON

Compared with the industry production and the electronic industry there is a very small data base

available which provide information to reliability/dependability. The manufacturers of components

used inside of energy systems are mostly not forced by law or other standards to publish a broad

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 64/127

© eeEmbedded Consortium www.eeEmbedded.eu

variety of information about reliability/dependability which could be used within an analysis. There

are a small number of data resources/handbooks available to predict dependability provided by the

electronic/semiconductor industry as well as military departments and the large scale production

industry, see (Meyna & Pauli, 2010):

Bell

SAE

Siemens (SN 29500)

ESReDA

MIL-HDBK217

Union Technique de l'Electricite (RDF 2000)

EPRD-97

NPRD-95 / 2011

The information given within these resources cover failure rates for certain technical components

and systems. The failure rates are based on several different models, see (Meyna & Pauli, 2010):

Constant failure rate o Time dependent linear failure rate o Time dependent linear increasing failure rate o Time dependent linear decreasing failure rate o Linear bath tube failure rate model

Common failure rate model

Average failure rate model

Timely variable failure rate

2.3.1.5 Key figures

Several Key Performance Indicators within the reliability/dependability are described below.

MTBF

One of the major key figures in the reliability/dependability analysis is the Mean Time Between

Failures (MTBF). This value describes the expected average operational time between the

occurrences of two consecutive failures events of a maintained technical unit. MTBF is used as Key

Performance Indicator for technical components or systems. Within the analysis of design concepts

this value could be used as key figure for evaluation purposes to compare concepts or components.

MTBF has a strong relationship to the maintenance concept and the FM domain.

MTTF

The abbreviation MTTF stands for Mean Time to Failure. This value describes the expected average

life time of a non-maintained technical unit. MTBF is used as Key Performance Indicator for technical

components or systems too and could be used in general to compare components or system

concepts.

MTTR

The abbreviation MTTR stands for Mean Time to Repair or Mean Time to Recover. This value

describes the expected average time for maintenance after an occurrence of a failure. MTTR is used

as Key Performance Indicator for maintenance planning in the FM domain.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 65/127

© eeEmbedded Consortium www.eeEmbedded.eu

Availability

The availability A of a system is calculated based on the pre-mentioned values in the following

manner:

Energy consumption or production assigned to systems, subsystems, components

Especially within the analysis of malfunction and underperformance of an energy system the

difference between measured and expected energy consumption/production rate and the COP of

several components and systems can be used as indicator to detect suboptimal operational

behaviour of the technical systems and control algorithms.

2.3.1.6 Workflow

The overall workflow within the analysis covers the following steps:

1. Formulation of requirement/to-be state regarding each system, subsystem and component covering the following main topics

a. (Energy) performance b. Availability c. Reliability

2. Identification of values which are used as indicators describing the state implementation of the monitoring system (e.g. measurement equipment, maintenance data)

3. Generation of KPI expressing malfunction and/or underperformance

Prognosis of system downtime

Analysis of the applicability of the process for estimating malfunction and underperformance

o Based on discrete values as process results o Repeated Simulation of the stochastic process o Extraction of probability distributions

The analysis is based on investigation and elaboration of relevant

Inputs

Parameters

Border conditions

Restrictions in usage

The analysis has to check which modifications or combinations/superimpositions are needed to

produce reliable outputs.

Regressor reliability 2.3.2

2.3.2.1 Introduction

Following the definition of the Institute of Electrical and Electronics Engineers (IEEE), reliability is “the

ability of a system or component to perform its required functions under stated conditions for a

specified period of time”, see (Verma et al., 2010).

There are four major aspects in this definition:

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 66/127

© eeEmbedded Consortium www.eeEmbedded.eu

- Ability refers to the likelihood that the system or component will work as expected and is therefore expressed by a number between 0 and 1

- Required function needs to be specified exactly and is the criterion reliability is measured against

- Specified period of time: A statement about reliability has only sense when restricted to a time frame

- Stated conditions include air pressure, temperature, humidity, etc. and may largely effect the reliability of a system or component

In eeEmbedded the working conditions will be assumed to be in an acceptable range. The reason for

this simplification is that a reliability simulation under different working conditions would need a

much larger data base, and the data situation concerning reliability in building engineering is already

quite limited.

2.3.2.2 Mathematical definition

To define reliability mathematically, for each component we have a random variable with a

distribution , describing the “time to first failure”. Then the reliability states the probability that

the component is still working correctly at an arbitrary point in time :

Now the hazard rate, which gives the average number of failure per unit of time is defined using the

probability density of , which is the derivative of with respect to the time:

By solving the resulting differential equation, one derives the following representation of :

{ ∫

}

2.3.2.3 Failure of components

To model reliability in eeEmbedded, the hazard rate for every component is needed. That is

realisable by either having access to the hazard rate directly, or by having information about and

its distribution , as depends only on the distribution of .

In reality, many components have a bath-tube shaped hazard curve (Figure 58).

Following (Verma et al., 2010), the three regions are called

1) Early failure region 2) Useful life region 3) Wear-out region

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 67/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 58: Changing hazard rate over lifetime (Verma et al., 2010)

If the hazard rate is known, an inhomogeneous Poisson process (see Chapter 2.1.2) with parameter

is used to simulate the occurrence of failure. If the hazard rate is constant over time, meaning

for all , then a homogeneous Poisson process, which can be seen as a special case of the

inhomogeneous process, is used.

Additionally, a repair time distribution may be assigned, modelling the time the component is out of

order when repaired after failure. For simplicity, this is substituted by a constant value. The out of

order time during a scheduled maintenance is assumed to be known.

Estimation malfunction and underperformance 2.3.3

2.3.3.1 Introduction

Estimating the malfunction and the underperformance of an energy system can be considered similar

problems as hazard analysis in biological or manufactured systems. Such problems are often

modelled with a Poisson process which is interpreted as stochastic process enabling to count

occurrences of events in a system over time. In hazard analysis this process is used to estimate

terminations, failures or the mortality of a system. It introduces the notion of hazard rate (failure

rate or force of mortality) that is noted as . With a constant hazard rate, the time until the next

change is exponentially distributed. Sometimes the hazard rate is not constant. In this case the

model shall introduce a hazard rate function as a function of time, and it becomes a non-

homogeneous Poisson process. This is for example the case by systems subject to usury and with

limited lifetime, like most manufactured products, by which aging increases the probability of failure.

To assess hazard rate functions some probability models can be used, according to the nature and

the characteristics of the system, like for example the Weibull distribution, the Gompertz

distribution, or Makeham’s law (Klugman et al., 2004). Those are specific models applied in lifecycle

analysis of manufactured objects and human beings.

2.3.3.2 Prognosis of malfunction and underperformance as part of the design workflow

A sequential analysis starts with transient thermal building and energy system simulations to

produce outputs which are necessary to process an analysis of malfunction. Within the simulation

runs certain operational situations or suboptimal controller setups can be implemented and analysed

in detail to estimate and evaluate potential unwished effects and scenarios. Constraints between

systems, components, control algorithms and usual as well as uncommon user behaviour can be

detect and evaluated in advance. The results lead to a pre-optimised system and controller setup.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 68/127

© eeEmbedded Consortium www.eeEmbedded.eu

The malfunction analysis is closely related to the reliability analysis.

Analysis about the applicability of the process for estimating of malfunction and underperformance Poisson-Process

o Based on discrete values as process results o Repeated simulation of the stochastic process o Extraction of probability distributions

Investigation and elaboration of relevant o Inputs o Parameters o Border conditions o Restrictions in usage

Check which modifications or combinations / superimpositions are needed to produce stable operational conditions and reliable outputs

Hazard analysis 2.3.4

The hazard analysis is commonly used within the design of energy systems like (nuclear) power

plants or other similar large scale facilities with high impact to the natural environment and the

population nearby the construction side. Within the residential sector on local or district level hazard

analysis are not in the foreground of the design process. Notwithstanding the following methods

should be mentioned which can support hazard analysis without explaining more details:

System orientated Failure Modes and Effects Analysis (FMEA)

Construction orientated FMEA

Process orientated FMEA

2.4 Example

In the following subchapters the usage and implementation of the pre-described approaches and

features will be illustrate based on an example covering the analysis and optimisation of a social care

centre. The real property contains ten buildings with several different functions: (1) care home, (2)

homes for elderly, (3) day care for elderly, (4) kindergarten, (5) school and (6) administrative building.

Introduction 2.4.1

The main target of the analysis work is the transformation of the existing heat generation setup

which is based on two boilers burning natural gas into a concept focused on renewable energy use.

The re-design of the energy supply chain is embedded into a super ordinated refurbishment concept

of the real estate which includes - beside the energy related parts - an improvement of the thermal

quality of the building construction too. Like typically found within refurbishment projects the

degrees of freedom in re-shaping certain aspects of buildings and energy systems are limited. The

introduced example features limits in changing the topology of the heat distribution network

because of the existing canals and pathways for hosting the pipe network. The heat generator

portfolio contains the following devices: (1) boiler for billets of wood, (2) wood gas burning CHP

device, (3) thermal solar system as well as (4) natural gas fired boiler for backup purposes and peak

load cases. Additionally a heat storage is included in the concept.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 69/127

© eeEmbedded Consortium www.eeEmbedded.eu

Target 2.4.2

The optimisation approach covers the following tasks: (A) analysis of the energy balance taking into

account different system setups and the related amount of different types of fuel to support the cost

estimation, (B) optimisation of the pipe network for heat distribution, and (C) optimisation of the

operational schedule of each generator device within the preferred portfolio or system setup.

Within these tasks new load profiles will be generated based on the reconstructed buildings envelops

and with respect to the proposed usage of the buildings. Additionally several different energy system

setup variants according to the nominal thermal power of the pre-mentioned devices were formed

to model certain supply scenarios taking into account device-specific coefficient of performance

(COP) as well as the size of the heat storage and cost for the used energy resources. Parts of the

objective function are (1) minimising fuel costs, maximise the income caused by electrical energy

production and power feed into the regional suppliers network and (3) minimise the number of start-

ups of the boiler for billets of wood and the wood based gas burning CHP device. Side conditions are

ensuring the targets given by the elaborated load profiles, ensuring a certain load level within the

heat storage, but also the compliance with device-specific technical limits according to the

parameters for minimal and maximal load.

Besides these constraints the long-term price course for energy resources and an empiric approach

to model failure rates of the main devices have to be integrated in the engineering model as well as

certain aspects of the user behaviour.

Within the analysis the software tools STEFaN and FWOpt are used to elaborate the results. A brief

introduction of both tools is given within Chapter 5.2.

Figure 59: Screenshots of the software tool STEFaN introducing the subscriber’s position (top) and routs of the pipe system (bottom) in combination with other parameters

Results 2.4.3

Figure 59 shows two screenshots of the software tool STEFaN introducing the enhancement of data

for modelling the buildings, streets, the topology of the distribution system, and the subscriber’s

position (top) with data describing the dimension of the pipe system based on optimisation runs

considering the maximum thermal load and the expected yearly demand of thermal energy (bottom).

Within Figure 60 and Figure 61 the results of the analysis are marked with red boxes. Main results

regarding the distribution network are: (1) pipe diameter of each section within the network, (2)

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 70/127

© eeEmbedded Consortium www.eeEmbedded.eu

total length of the network, (3) normative mass flux for each section, (4) heat loss over the observed

analysis period, as well as (5) investment costs in total and for each section. Additional results are (6)

yearly operational costs and (7) the financial income due to power feed back into the regional

electricity distribution network.

In the sense of a Monte Carlo simulation (MCS) the standard thermal load profiles introduced within

Chapter 2.2.3 are processed 35 times taking into consideration a probability distribution of the

thermal load. As an example the resulting thermal load profiles within a typical week at the

beginning of the heating season are presented in Figure 62 as summarised heat demand for the

social care centre with a rough probabilistic approach for modelling the uncertainties according to

the user behaviour.

Each of the 35 realisations of a thermal load profile is applied to the four design variants covering a

different setup of heating generators and storage devices to calculate the energy demand as a basis

for the calculation of yearly operational costs. The resulting cost range for each variant is given in

Figure 63 as candlestick symbols.

Based on an individual estimation of mean time before failure (MTBF) and mean time to repair

(MTTR) for each individual heat generator type the up-time/down-time-schedule is processed for an

analysis period of one year to consider the reliability/dependability within the cost calculation. Figure

64 contains an overview of the availability for each individual heat generator type within one year

shown for each sample. Along the Y-axis the samples are applied. The down-time is expressed as

zero, availability-time is expressed as one. Within the graph on the top the values for the CHP-device

are displayed. Because of the youngish and more complex technology the down-time-periods are

more numerous and longer for CHP compared with the matured technology of the gas fired boiler,

described with the graph on the bottom. The woodchip boiler is situated in between both pre-

mentioned technologies from the reliability point of view.

With respect to the duration of the building lifecycle the analysis covers an estimation of the price for

the different sources of energy used within the variants. Figure 65 contains the results of the

probability density of prices for each energy source in year 2020 (left) and year 2030 (right),

estimated for woodchips (top), electricity (middle), as well as natural gas (bottom).

As shown in Figure 63 the variant with a CHP device delivering 30 kW electrical power in combination

with an heat storage of 750 kWh of thermal capacity and generates the lowest yearly cost lower than

200.000 Euro to average per year of about 200.000 Euro over all 35 processed samples while

considering the pre-described border conditions and constrains.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 71/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 60: Analysis results for the optimisation of the distribution network within the social care centre processed by the software tool STEFaN

Figure 61: Analysis results of the preferred energy system setup optimised by the software tool STEFaN

Length of the

distribution network

Overall investment

costs Yearly operational

costs

Results of the analysis

containing optimisation of

pipe diameter’s thermal

loss and pressure loss

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 72/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 62: Summarised heat demand for the social care centre based on standard load profiles combined with a rough probabilistic approach for modelling the uncertainties according to the user behaviour

(processed with R)

Figure 63: Results of the cost analysis over four variants, each processed with 35 samples

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 73/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 64: Reliability overview for 35 samples (Y-axis) of each heat generator type expressed as up-down-time curves based on MTBF and MTTR values

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 74/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 65: Probability density of power production in year 2020 (left) and 2030 (right) shown for woodchips (top), electricity (middle), as well as natural gas (bottom); Unit for X-axis: EUR/MWh; the solid line

represents the estimated kernel density function

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 75/127

© eeEmbedded Consortium www.eeEmbedded.eu

3 Energy Risk Model

As the previous section focuses on a mathematical description of the uncertainty studied in

eeEmbedded, the purpose of this section is to describe how this uncertainty and its effect on the

building performances can be integrated and analysed during the design process. This requires

among others to express this uncertainty in specific data models by using a proper data structure, as

well as engineering concepts that carry the information, their relations to each other and other

models (e.g. ESIM), as well as risk scenarios.

The overall aim is then to develop an energy risk model related to the energy system. This risk model

will be integrated into the eeeBIM framework. The risk model can be divided into submodels

regarding the kind of building performances that are analysed and which can be categorised in the

scope of eeEmbedded under the terms of sustainability, vulnerability and cost.

The sustainability risk model puts more emphasis on energy consumption and CO2 emission over the

entire building lifecycle. The vulnerability risk model puts more focus on energy system malfunctions

and underperformances that occur over time, identifying critical system behaviour scenarios. The

cost risk model considers the resulting costs variations based on the two previous models attaching

costs to uncertain parameters.

Figure 66: Overall approach for risk-aware design optimisation relying on the stochastic and risk models

In order to analyse how the uncertainty affects the building performances, methods and tools for risk

analysis have to be used and by need developed. They will use information from the risk models and

implement the stochastic models to compute specific Key Risk Indicators (KRIs) as represented in

Figure 66. The concepts of Key Risk Indicator and Key Performance Indicator are per definition of

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 76/127

© eeEmbedded Consortium www.eeEmbedded.eu

similar nature but serve distinct purposes. In a common understanding the concept of KRI is often

defined as the inverse concept of KPI which is not always the case. Both should be either minimised

or maximised according to the kind of performance of interest and the design goals. For example

when minimising the energy demand (KPI) a designer wishes to minimise the uncertainty on the

energy demand value (KRI) as well. Another simple example of KRI is the failure frequency of an

energy subsystem which can be modelled as a failure frequency function in a stochastic model. This

function uses the hazard rates of the components of the energy subsystem. The description of

component interactions and their hazard rate properties are then part of the vulnerability risk model.

The analysis tool would calculate the failure frequency which can be expressed as KRI. Based on this

KRI design alternatives and facility management guidelines can be derived, expressed as control

strategies or maintenance plans, that would reduce the KRI value to an acceptable level.

3.1 Sustainability, Vulnerability and Cost Risk Models

Requirements for a Sustainability Risk Model 3.1.1

Per definition sustainability concentrates on maintaining performances over the entire life cycle of a

building. However the meaning of this word has been extended with the appearance of the Green

Building concept or Sustainable Building and the related environmental guidelines (LEED, 2011). In

the scope of the project this issue concentrates mostly on energy consumption and CO2 emission

that have to be kept in reasonable and targeted quantities over decades. The assessment of energy

use and CO2 emission will rely on the model developed in Task 3.1. The purpose of the sustainability

risk model is first to catch relevant information for this stochastic model by referencing factors of

influence from the related stochastic models. These are primary the technological progress,

influencing the energy efficiency of building elements, as well as the climate and the building usage,

both directly influencing the building’s energy consumption and CO2 emission. Second the

sustainability risk model has to draw up scenarios of cyclic peak loads and resulting changes in the

overall energy balance leading to more exhaust gas and wasted energy. For CO2 emission the

characteristics of the energy system are also of importance and especially the kind of energy used. It

is essential to differentiate between high carbon power technologies using fossil energy sources like

fuel or gas boilers and low carbon power technologies like wind power, solar power, geothermal

power, etc. At a lower level of granularity, the components of such technologies also have specific

energy and CO2 related characteristics. Sustainability indices can then be allocated to those different

technologies and components, thus enabling the planner to get an idea of the actual sustainability

risk of the design choices he makes. Examples for these indices are heating, cooling or energy

demand or the number of hours, a certain temperature threshold is exceeded.

Requirements for a Vulnerability Risk Model 3.1.2

To model the system vulnerability it is necessary to identify all parameters that influence the system

behaviour. In this sense the components characteristics are of importance as well as their

interactions. Such information like component lifetime, hazard rates and the composition of

components has to be described in the model. Fault trees are used to model the hierarchic

propagation of faults from component to system level. External factors are also of importance like

the energy demand resulting for example from the building usage and the climate. Moreover,

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 77/127

© eeEmbedded Consortium www.eeEmbedded.eu

vulnerability does not only mean failure but also underperformance. The level of redundancy, as well

as the frequency and intensity of energy peak loads play an essential role in maintaining the system

performance. Having redundant components like building energy sources at building level (boilers,

PV, solar thermal panels, etc.) and at district level (power plants, wind turbines, neighbour buildings,

etc.) is somehow necessary to ensure covering the building energy demand even when components

fail or peak loads occur. More than only to cover energy demand, it is also of importance that the

system components work at their efficient load by avoiding overload of some devices which

enhances wear and reduces yield. In the same sense, the system should avoid under-speed of

devices to reduce yield. Together with the characterisation of the system properties and the external

factors, it is also important to identify risk cases or scenarios describing critical behaviours on the

basis of components’ interactions. Those risk scenarios are also part of the vulnerability risk model.

Typical values that are extracted from the vulnerability risk model are system overspeed and

underspeed, failure rate, mean time to failure or repair and availability data such as point availability

or interval availability.

To summarise, the following main aspects can be considered under the concept of vulnerability:

- Underperformance e.g. wrong energy balance between supply, use, storage, transmission and distribution, or bad devices yield

- Failure e.g. breakdowns, damages, blackouts - Malfunction e.g. wrong sensor values, wrong devices setup

Requirements for a Cost Risk Model 3.1.3

The cost risk model references all items that have an influence on the overall costs of the building.

The main drivers here are energy prices and technological progress. During the whole building

lifecycle those costs occur in the different phases of the project from design/retrofit over

construction to exploitation. Focusing on energy and the energy system the costs can be classified in

the three following categories:

Energy system costs: HVAC, BACS devices unit costs and installation costs.

Operation costs: energy price with fix and variable parts depending on the energy market

Maintenance costs: spare parts unit costs, labour costs, consumable resource costs (from vulnerability risk model)

The risk model has to describe the uncertainty over costs by using suitable representations that

express their random character. Here the probability distributions of cost-related KPIs like

construction cost, energy system cost or maintenance cost are appropriate.

3.2 Key Risk Indicator Framework

The activity of analysing and controlling risk has been of growing interest since the last decade and is

increasingly establishing itself as a necessary and systematic management procedure in different

industries. Especially, since the publication of the international standard (ISO/IEC 31000:2009) about

risk management this trend has accelerated. This standard has resulted from an assembly of several

previous standards and guidelines developed in the last two decades in different countries. This has

made it an internationally recognised reference for risk management. The standard applies to any

organisation regardless of its size, activity or sector. In parallel to the development of the standards

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 78/127

© eeEmbedded Consortium www.eeEmbedded.eu

relative young domains applying them and feeding them with new findings have emerged like among

others Operational Risk Management (ORM), Enterprise Risk Management (ERM) and Project Risk

Management (PRM). The main application area of such domains is and has always been the

corporate and market finance field which is the precursor for the development of risk management

techniques. Nevertheless, as mentioned above such techniques and related concepts spread

themselves to the industries of manufacturing and services in general, and especially in activities

commonly associated with high risk levels like in chemical and medical industries. In the AEC industry

there is still a poor use of risk management techniques. Some current risk management methods

that are currently applied examine risk as a rather isolated purpose in the context of traditional

management techniques that break down the project into manageable, self-contained subtasks

within specific application fields like project scheduling and cost planning. Also, risk management is

still done mostly occasionally during a project as it should be accomplished continuously throughout

all project phases and began already in a very early project state. In order to bridge these gaps, it

become of interest to take benefit of the latest risk management techniques applied in other fields

and to integrate them into the innovative research activities made in the context of eeEmbedded

and in the BIM community in general.

Application of risk management concepts 3.2.1

As stated by (Beasley et al., 2011) ERM provides the opportunity for organisational leaders to achieve

a robust and holistic enterprise-wide view of potential risks that may affect the achievement of the

organisation’s objectives. As for corporate management a building project is an organised and

collaborative activity that aims at the achievement of a final product with regard to precise

requirements expressed by clients and decision makers. In view of that it also requires to get a good

overview of risk in order to support design and investment decisions that minimise the probability of

performance mismatches. In order to enable a holistic view and efficient control of risk, techniques

and concepts from the risk management domains like KRIs (Key Risk Indicators) are brought into the

eeEmbedded project.

As represented on Figure 67 the ISO standard (ISO/IEC 31000:2009) defines four essential steps that

have to be executed in a dynamic way as parts of a risk management cycle comprising risk

identification, risk analysis, risk treatment and risk monitoring. Risk identification performs an

exhaustive listing of all possible threats, their categorisation, and the recognition of the affected

models instances as well as of risk chains. Risk analysis enables the evaluation and prioritisation of

risks with help of risk simulations. Risk treatment planning consists of determining preventive

measures and reaction strategies to reduce threats to the project objectives and to enhance

reactivity. Within the execution phase of the project the risk monitoring and control tasks

continuously re-evaluate the suitability of the planned treatment measures and support identifying

new emerging risks. In a similar way, as mentioned by (Sherwood, 2012) ERM defines the five

following steps for performing risk management: 1. identify risks, 2. describe and/or quantify risks, 3.

decide how to mitigate risks, 4. implement decisions, 5. monitor results of decisions and make

changes as needed.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 79/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 67: Risk management cycle after ISO 31000

According to the Institute of Operational Risk (IOR, 2010) risk indicators are an important tool within

operational risk management facilitating the management of risk and supporting the different steps

of risk identification, assessment, and treatment and monitoring. For the IOR a Key Risk Indicator is a

metric that provides information on the level of exposure to a given operational risk at a particular

point in time. In that definition a KRI can be considered as a metric that can be used to measure

o the quantum (amount) of exposure to a given risk or set of risks,

o the effectiveness of any controls that have been implemented to reduce or mitigate a given

risk exposure,

o how well the risk exposure is being managed (the performance of the risk management

framework).

In that definition an organisation will typically make use of three different types of

indicators: risk (exposure) indicators, control effectiveness indicators and performance indicators. A

similar formalism is made by (Smart et Creelman, 2013), and shown on Figure 68, who highlight the

importance of the three types of indicators for an efficient risk management namely Key

Performance Indicators, Key Risk Indicators and Key Control Indicators. The first ones are related to

the organization performance goals, the second ones give the risk profile around those goals and the

third ones assess the effectiveness of controls which refer to decisions and actions made to mitigate

risk. Such controls would be defined as investment decisions, design alternatives and control

strategies in the scope of eeEmbedded. According to this, for an effective application of KRIs their

metrics shall provide useful insights about potential risk that may have an impact on the

achievement of the objectives.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 80/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 68: Interrelationship between KPIs, KRIs and KCIs (StratexSystems, 2012)

KRIs often serve their most practical purpose in conjunction with a system of thresholds (Immaneni

et al., 2004) which can be formalized under the terms of risk appetite or risk tolerance. When a KRI

breaches its associated threshold, it triggers a review, an escalation, or a management action. In a

sense the risk tolerance reflects the maximal uncertainty accepted by a stakeholder. Another

significant purpose of the KRIs and their metrics is to provide an early signal of increasing risk

exposures. In view of that the decision making process will support taking investment decisions and

actions that bring the risk level back to the acceptable range, keeping a good trade-off between risk

level, return of investment and targeted performances.

To summarize a Key Risk Indicator (KRI) is a measure that answers the question how risky an activity

is and if the risk level remains in a predefined risk tolerance. Traditionally the difference between a

Key Risk Indicator and a Key Performance Indicator (KPI) in that the latter is meant as a measure of

how well something is being done while the former is an indicator of the possibility of future adverse

impact. In the context of energy efficient building design, future adverse impact means the deviation

of the performances of the building because of its stochastic nature. More concretely, while KPIs are

often expressed as a deterministic value about a performance, KRIs reflect the uncertainty around

that performance. The Key Risk Indicators have to be expressed in a way that effectively measures

the risk involved in the design process and provide to the designer a prior notification of possible

harmful consequences during the building lifecycle.

Specification of Key Risk Indicators 3.2.2

In order to take advantage of the concepts and techniques from the risk management field, the

previously mentioned Key Risk Indicators are introduced. These KRIs shall support the design process

by providing a holistic view of risk and an early identification of their impact along the building

lifecycle. The overall goal for the designer and the decision makers is then to design an optimised

building by maximising performances and minimising risk. It is important to notice that the objective

by managing risk not to avoid all risk but to minimise risk to an acceptable risk tolerance. Indeed this

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 81/127

© eeEmbedded Consortium www.eeEmbedded.eu

error is often made in the praxis because reducing risk implies taking investment decisions and

actions that consume resource and generate costs, thus impacting the performances. That is why the

concepts of KRIs and risk tolerance are both introduced and play a complementary role to the KPIs.

The KCIs are not integrated in the overall risk management approach described in this deliverable,

but could be developed in future works in the context of the operation phase of the building

lifecycle.

As for the submodels of the Energy Risk Model the Key Risk Indicators can be classified in the three

main categories of sustainability, vulnerability and cost. Specifying KRIs in those three categories and

selecting some of them for the implementation of a prototype would provide an already wide and

interdisciplinary view of risk as support for a proof of concept.

In the context of eeEmbedded the Key Risk Indicators can either provide a measure of uncertainty

around certain KPIs or they can specifically express certain underperformances and critical states

that do not relate to predefined KPIs. In the context of sustainability and cost it is of interest to

evaluate the deviations in KPI values caused by uncertainty. This can be done for energy

consumption, gas emission and costs on the basis of the eeE KPIs specified in (Guruz et al., 2014). In

view of that this performance deviation represents the risk to which a KRI relates, except for the

thermal comfort. A KRI can then be defined on the basis of the value distribution of a KPI resulting

from uncertainty. In other words it can be defined as a statistical indicator deduced from the

probability distribution of a KPI. For that purpose indicators like standard deviation (σ), mean and

mode (most probable value) are used. Other interesting indicators would also be the probability of

being over or beneath the KPI target value or even being in or outside a certain value range. Such

indicators are also easily deduced from the probability distribution of a KPI. For vulnerability and

thermal comfort (sustainability) other kinds of indicators have to be introduced that express how

building performance can be threatened by risk and that are independent from the predefined eeE

KPIs. Most of them are also defined in terms of probabilistic values. In view of that a set of KRIs for

eeEmbedded has been specified and they are listed in Table 12, Table 13 and Table 14. In each table

the KRI category, a subcategory, a KRI type, KRIs and a unit are defined. The latter two define the KRI

metrics.

Table 12: KRIs in sustainability category

Category Subcategory Key Risk Indicator type KRIs Unit

Sustainability

Energy

consumption

Uncertainty on heating demand σ , mode, mean kWh/(m².a)

Uncertainty on cooling demand σ , mode, mean kWh/(m².a)

Uncertainty on electrical energy demand σ , mode, mean kWh/(m².a)

Uncertainty on primary energy use σ , mode, mean kWh/(m².a)

Uncertainty on total energy demand σ , mode, mean kWh/(m².a)

CO2 Emission Uncertainty on CO2 emission σ , mode, mean Kg/(m².a)

Thermal

comfort

Pre-heating time σ , mode, mean Kh

Pre-cooling time σ , mode, mean Kh

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 82/127

© eeEmbedded Consortium www.eeEmbedded.eu

Table 13: KRIs in vulnerability category

Category Subcategory Key Risk Indicator type KRIs Unit

Vulnerability

Under-performance

System over-speed, under-speed mean yield (no dimension) per time unit

System over-speed time σ , mode, mean

Kh

System under-speed time σ , mode, mean

Kh

Peak loads effects mean overload time (Kh)

Energy balance mismatch mean E produced – E used (kWh)

Reliability

Failure rate mean N failures/(a)

Mean time between failure (MTBF)

mean Kh

Mean time to failure (MTTF) mean Kh

Mean life mean Kh

Quantitative reliability probability

Malfunction

Wrong system setting effect mean kWh (loss)

Defect sensors effect mean kWh (loss)

Availability

Point availability probability

Interval availability mean time ratio (no dimension)

Steady-state availability mean time ratio (no dimension)

Maintainability and serviceability

Mean time to repair mean Kh

Mean duration of repair mean Kh

System Complexity Index none (no dimension)

Safety and security

Fulfilment of safety standards none percent

Number of smoke detectors per square meter

none N/m²

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 83/127

© eeEmbedded Consortium www.eeEmbedded.eu

Table 14: KRIs in cost category

Category Subcategory Key Risk Indicator type KRIs Unit

Cost Costs

Uncertainty on energy system costs σ , mode, mean €

Uncertainty on usage costs σ , mode, mean €

Uncertainty on maintenance costs σ , mode, mean €

Uncertainty on failure costs σ , mode, mean €

Uncertainty on construction costs σ , mode, mean €

Uncertainty on demolition costs σ , mode, mean €

Uncertainty on revenue σ , mode, mean €

In the context of sustainability risk, the risk of thermal discomfort perceived by the user can be

assessed through the pre-heating and pre-cooling time provided by the energy system. The

importance of pre-heating and pre-cooling time by BEMS (Building Energy Management System) for

thermal comfort is explained in (Autodesk, 2015). This value can then be used as indicator of thermal

discomfort and expressed as KRI. Other KRIs can also be defined for thermal comfort by using for

example the four commonly recognized basic factors for thermal comfort which are air temperature,

radiant temperature, air velocity and humidity. (HSE, 2015) provide some examples of indicators like

the Percentage People Dissatisfied (PPD) index. Anyway, as the focus in WP3 is set on the energy

system design a relevant KRI should on one side express the influence of the system on those basic

comfort factors and on the other side be computable through simulation.

In the context of vulnerability risk the following classification and underlying concepts can be used,

many of them are inspired by (Szentirmai & Szarka, 2003):

Reliability is the characteristic of a system expressed by the probability that it will perform a required

function under stated conditions for a stated period of time. If a unit begins to function at the instant

and the failure could occur at the random instant , then the reliability function is

defined as the probability of failure-free operation of the unit during the time interval :

The function is called the probability density function (PDF). The product

closely approximates the probability of failure for devices under consideration in the time interval

Availability characterises the ability of an entity to be in conditions to realise a required function

under fixed conditions at any instant.

- Point availability is the probability that the system is in an operating state at time . By contrast, the reliability function is the probability that the system has operated without failure over the interval . The point availability contains no information on how many failure/repair cycles have occurred on for example the 100 units prior to 20 years. In general terms . If the system or its components cannot be repaired, then .

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 84/127

© eeEmbedded Consortium www.eeEmbedded.eu

- Interval (mission) availability is the expected fractional amount of an interval of specified length that the system is in an operable state. This interval may be the design life of the system or the time to accomplish some particular mission.

- Steady-state (asymptotic, limiting) availability is the limit of interval availability for an infinite interval. If the system under consideration is not repairable, then its steady-state availability is equal to zero.

Maintainability and serviceability characterise the ability of an entity to be maintained or restored

to a state in which it can realise a required function when maintenance is done under fixed

conditions with prescribed procedures and means. Hereby, serviceability describes the features that

facilitate and speed-up maintenance actions. An important aspect for the maintainability of a system

is its complexity. It is possible to quantify it with a system complexity index, as demonstrated in

(Wohl, 1982) which we can also use as indicator for maintainability risk.

Safety and security characterise the ability of an entity to meet fixed conditions and to avoid critical

or catastrophic events. Hereby safety protects against accidents while security protects against

intentional induced harms like sabotage.

Underperformance characterises a state in which the system cannot develop its full potential

performance. Reasons may be a wrong energy balance between supply, use, storage, transmission

and distribution or a suboptimal yield. It is to notice that underperformance can be among others the

result of a lack of reliability or availability.

Malfunction describes a state in which a component or a subsystem do not perform its expected

function because for example of a defect sensors delivering wrong values or bad device

configuration.

3.3 Risk analysis workflow for optimised building design under uncertainty

In the following chapter, a detailed risk analysis workflow for the consideration of uncertainty in the

building design process is developed. This workflow is meant to be integrated in the eeE Key Point

Framework, established in Deliverable 2.1 (Guruz et al., 2014). The focus of this framework is to

enable a KPI-driven design optimisation, meaning that an optimal design can be assessed through

several KPIs that have to fulfill target values. For the risk analysis workflow the major tools we

dispose of are Alternative Analysis (AA), comparing different design solutions and their KPIs,

Sensitivity Analysis (SA), deriving the impact of design variables on the KPIs and Uncertainty Analysis

(UA) yielding the probability distributions of the KPIs and thus deriving the KRIs (see Chapter 3.1).

At first a short overview over different SA methods and their features is given (see Chapter 3.3.1).

Then the general work flow is established (see Chapter 3.3.2). Finally the exact methods for every

step of the workflow are chosen and explained (see Chapter 3.3.3).

Sensitivity Analysis overview 3.3.1

There are several kinds of SA methods available which for our purposes will be distinguished in three

groups: Local SA, global SA and screening.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 85/127

© eeEmbedded Consortium www.eeEmbedded.eu

It is to note that in this context the term “computational cost” refers to the number of simulation

runs required, as the computing time of the preliminary and subsequent calculations is negligible in

comparison.

Screening technics are used for models with huge numbers of inputs and under the often satisfied

assumption that only a few of them have a significant influence on the output. Screening methods

give a rough picture of this influence for low computational costs.

For local Sensitivity Analysis, all parameters are fixed at some nominal value, only one parameter is

varied and the resulting changes in the model output are studied. This results in easy interpretable

and computationally cheap. The problem with this approach is that the outcome may be highly

dependent on the chosen nominal values. In general this is an undesirable feature. In some cases

however, e.g. when the model is known to be linear, this restriction may be bypassed.

Global Sensitivity Analysis scans the model’s behaviour over the complete input space. Its usual

inputs are the probability distributions of all factors. It also has the highly expedient feature of being

model independent, which means that no assumptions, like linearity or monotony, are required. This

usually comes at the price of high computational costs.

A very common approach for global SA are variance-based methods. The idea is that an input which

causes a big share of the model’s variance is of high importance. The central object of study is the so-

called correlation ratio (McKay, 1995), which is defined as follows:

Let be the inputs, a subset of inputs and the output of a

model . The correlation ratio is defined by

and gives the share of that is caused by .

From this definition, several sets of indices can be derived (Sobol’, 2001):

First-order indices:

for all

Second-order indices:

for all

Third-order indices and so on are defined analogously.

All indices of this kind sum up to , so at last an especially important index, the total sensitivity index,

can be defined:

Total Sensitivity Index: for all

stands for the sum of all indices NOT including , so gives the total effect of input , including

all its interactions.

Workflow overview (see Figure 69) 3.3.2

We will distinguish between design variables, which are values the designer can set, like window

properties, building orientation and so on, and stochastic variables, including occupancy, climate,

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 86/127

© eeEmbedded Consortium www.eeEmbedded.eu

technological progress and energy prices (see Chapter 2.2.4). Reliability is modelled separately and

will not be part of the sensitivity analysis.

In the eeEmbedded approach (Guruz et al., 2014), at first several KPIs of interest are chosen and

target ranges, meaning values regarded as desirable, are assigned. These are also known as KPIs to-

be.

For a more holistic impression it may be beneficial to form new KPIs, combining existing ones. One

way to do so is by creating a composition of KPIs, possibly including weighting, e.g.

. When using this approach, some kind of standardisation has to be

applied, e.g. transforming all KPIs to , to counteract the impact of different units of

measurement and orders of magnitude. Also, if negative values are possible, it is advisable to use the

absolute values of the KPIs.

Another way is to set thresholds for existing KPIs, e.g. {

.

It is to note that for such a KPI, the following distinction between a linear and a non-linear impact of

an input may be meaningless (see Chapter 3.3.3).

Than the KRIs to-be, which express the risk tolerance mentioned in Chapter 3.2 are chosen, meaning

some KRIs of interest are picked and target ranges are assigned.

The next step is to compare the performance of some manually chosen design alternatives by

performing an AA. After the most appealing one is picked for profound examination, one has to

decide which design variables should be varied and which should be fixed in the subsequent

analyses, e.g. because they are default values that are not changeable, or because they are of no

interest.

Next is the execution of a screening to distinguish between three categories of inputs: (a) negligible,

(b) linear and additive or (c) non-linear or involved in interactions with other factors.

The non-important factors can be fixed at a nominal value, e.g. at their expected value and are of no

further interest.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 87/127

© eeEmbedded Consortium www.eeEmbedded.eu

Define KPIs to-be andKRIs to-be

Alternative Analysis(I)

Create settings with optimised KPIs

(V)

Local SA(III)

Set up design alternatives

...DA1 DAn

Alternative of interest

Screening(II)

Linear factors

Non-important

factors

Non-linear

factors

Global SA(IV)

...Optimised

DA1

Optimised DAm

Alternative Analysis

KPIs in targeted range?

Uncertainty Analysis(VI)

KRIs OK?

Final Solution(s)

yes

yes

no

no

Figure 69: Workflow overview

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 88/127

© eeEmbedded Consortium www.eeEmbedded.eu

For the linear inputs a local SA is performed, because for them, the arbitrary chosen values of the

other inputs have no impact. For each KPI, this yields the strength and direction of the analysed

input.

For the non-linear factors, a global SA is performed to understand in detail which inputs interact with

each other and how strong their contribution is.

This procedure yields solid knowledge to create several design alternatives which aim at optimising

the targeted KPIs. To check the robustness of these settings an UA will be performed by repeatedly

sampling the involved stochastic variables. The result is the KPI’s probability distributions which can

be evaluated to verify the KRIs of interest.

Detailed Approach 3.3.3

To perform the initial AA (see Figure 69(I)), several design alternatives are created by assigning values

to all design variables. Then cases for the stochastic variables are chosen, like extremely cold climate,

high occupancy or the average cases. These cases are either predefined, like the data of an extremely

cold year, or are generated by repeated sampling and selecting an appropriate case, e.g. the energy

price development which constitutes the average of the drawn samples. Then the simulation is

executed with the same set of realisations of the stochastic variables for each design alternative. This

assures comparability. If reliability-based KPIs are of interest, for each design alternative several runs

of the reliability simulation (see Chapter 2.3.1.3) are performed to derive these KPIs. The resulting

KPIs are studied and a design alternative, meaning a setting of design variables is picked to be

explored deeper.

The screening method used in our approach (see Figure 69 (II)) will be the Morris One-At-a-Time

Design (Morris, 1991), which is the most widely used screening method. Its strength is, that it is

computational cheap, easy to calculate and interpret, but nevertheless quite precise. Its weakness is

that no distributions are considered. To further improve the method, two extensions proposed by

(Campolongo et al., 2007) are applied.

The main idea of the Morris method is the computation of several so called elementary effects (EEs)

for each input by varying one input at a time over a certain amount of fixed levels. For the design

variables, values according to the number of levels are picked from their range. The choice of these

values can be guided by the probability distribution of the factors or the length of their definition

range. Here it is advisable to use the lowest-level properties possible, e.g. to vary the U-value instead

of varying between several complete windows. This approach gives insights that will later on help to

decide for the most suitable solutions.

For the stochastic variables a case for every level has to be specified. A way to do this is to sample

the stochastic variable repeatedly and to select the cases sorted by a signature value, like e.g.

occupants density for occupancy. Then the method creates a sample plan, which tells what levels of

inputs are to be combined for simulations. An improved way to create this plan is the space fill

improvement of (Campolongo et al., 2007), which optimises the scanning of the input space. This

method considers possible EEs per factor and chooses the best ones to compute. This does not

increase the number of model evaluations required.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 89/127

© eeEmbedded Consortium www.eeEmbedded.eu

After the simulations are executed according to the sample plan, for each factor and each KPI the

EEs are computed and their mean and variance σ are studied. It is noteworthy that the number of

KPIs to be checked does not increase the number of model evaluations needed and therefor, the

addition of a new KPI after the execution of the simulations comes at no computational cost, as the

effort of the computation of the EEs is negligible.

To counteract cancellation effects in when there are EEs of opposing signs, (Campolongo et al.,

2007) propose to study the mean of the absolute values of the EEs, denoted by . This allows the

classification of all factors into three categories: (a) negligible (low , low ), (b) linear and additive

(high , low ) or (c) non-linear or involved in interactions with other factors (high , high ) (see

Figure 70).

Figure 70: Grouping of Screening Outcomes

The required number of model evaluations of this method is , where is the number of

factors and is the number of EEs computed per input.

If the computational cost of is too high, e.g. because too many factors are under

examination, one can execute a preliminary analysis on zone level, following the approach of (Laine

et al., 2014), developed within the ISES project (ISES, 2011) to lower the number of variables under

consideration.

The Morris method yields the impact each factor has on each KPI, so a factor can fall into several

categories, e.g. being negligible for one KPI and having linear impact on another. However the goal in

this step of the workflow is to assess the overall impact of each factor. There are two ways to reach

this goal:

A) One can create a new KPI, combining all KPIs of interest, e.g. by summing them up. To do so, the KPIs have to be standardised, e.g. mapped to . As this can be done after the execution of the simulations, this mapping could look like this:

It is to note that if the KPIs are combined in a non-linear way, the following distinction between linear and non-linear influence of an input becomes ambiguous, so a linear combination, e.g. a weighted sum, is highly recommended.

B) Another way to avoid this issue is the categorisation of all factors by the following scheme, where the exact numbers can be altered according to need:

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 90/127

© eeEmbedded Consortium www.eeEmbedded.eu

I. If a KPI has a non-linear influence at least 10 % of the KPIs, it is considered non-linear.

II. If a KPI is not non-linear and has a linear influence at least 10 % of the KPIs, it is considered linear.

III. The remaining KPIs are considered negligible. Now the further treatment of the three groups is explained.

Treatment of group (a): As the impact of these inputs on the KPIs of interest is negligible, they can be

fixed at an arbitrary value in their range, e.g. the expected value or the midpoint of their range can

be chosen.

Treatment of group (b): Here, by calculating the difference quotient for each input, the simplest form

of local SA can be applied (see Figure 69 (III)). As it is known that the factor’s impact is linear, two

model evaluations are sufficient to determine the slope of the KPIs. As the factor is known to not

interact with other factors, these can be fixed at arbitrary values and for the stochastic variables, a

random sample or an arbitrary case, advisably not too extreme, can be used. The result is a number

for each KPI, giving the strength and the direction of the impact the factor has on this KPI.

Treatment of group (c): Here a more educated approach has to be applied. Depending on the set of

sensitivity indices (see Global SA in Chapter 3.3.1) one wants to derive, there are two advisable

global SA methods (see Figure 69 (IV)). If the aim is to discover the precise structure of interactions

between the inputs, the Sobol’ method (Sobol’, 2001) is appropriate. This method allows the

calculation of all sensitivity indices up to a certain order at the cost of , where is the

number of indices to be computed and is the sample size, meaning the number of samples drawn

from each factors’ distribution.

If the evaluation of the impact of every single input is of interest, the extended Fourier Amplitude

Sensitivity Test (eFAST) (Saltelli et al., 1999) computes the complete sets of first-order and total-

order indices at the cost of , where is the number of inputs and is the sample size.

The design variables are assumed to be uniformly distributed, either discrete or over their possible

range. This reflects the designer’s free choice to pick any value for the design variable he likes. Also it

is advisable to use the concrete objects of choice, e.g. ten different types of glazing, instead of some

technical properties that can’t be picked, e.g. an U-value.

As input, both methods need samples of the factors according to their probability distributions and

yield a scheme of inputs for which simulations have to be executed. Each of these simulations has to

be supplemented with a sample of all involved stochastic variables. Given the simulation outputs, the

methods compute the desired indices for each factor and each KPI. Note that these can only have

positive values, which means they give the strength of the impact, not the direction. For both

methods the choice of sample size is non-trivial, because it depends on the number of factors, their

distributions and correlations.

To sample the design variables Latin Hypercube Sampling (LHS) (McKay et al., 1979), a special kind of

stratified sampling, is used. LHS leads to a faster convergence of the factors’ empirical distributions

towards their theoretical distributions, thus lowering the sample size needed. LHS’ major drawback is

a biased variance estimator, which is of no consequence in this workflow.

Combining the gathered knowledge from the global and local SA, one now can create several design

alternatives that aim at optimising the targeted KPIs (see Figure 69 (V)). An AA is performed to

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 91/127

© eeEmbedded Consortium www.eeEmbedded.eu

double-check if the KPIs are in their desired ranges. This is handled exactly like the initial AA (see

beginning of Chapter 3.3.3).

To test the robustness of the alternatives that pass this AA, an Uncertainty Analysis is performed

(see Figure 69 (VI)). This means all design variables are fix and by repeatedly sampling the stochastic

variables and the reliability, the probability distributions of the KPIs are deduced. Hereby one can

limit the range of some of the stochastic variables to study certain cases like very hot climate.

With the help of the resulting distributions, the KRIs of interest can be verified. If no satisfactory

solution is found, new design alternatives have to be generated (see Figure 69 (V)).

3.4 Content of the Energy Risk Model

Distinction between Sustainability, Vulnerability and Cost Risk Model 3.4.1

In Figure 71, the three risk models and their different components are visualised. The cost risk model

is primary impacted by the stochastic models of energy price and technological progress, as these

influence the cost KPIs and KRIs directly. The sustainability risk model is mainly driven by

technological progress, climate and the usage of the building, as its focus is on energy demand and

CO2 consumption. Here it becomes clear that these two models are closely related, as arguments for

assigning building usage to the cost risk model, as well as energy price to the sustainability risk model

can be found. The vulnerability risk model, consisting of components, there properties, like hazard

rate, and a failure logic, modelled by fault tree, is handled separately for computational reasons.

Figure 71: The three risk models and their components

Data structure for the Energy Risk Model 3.4.2

As stated in this chapter the main goals in specifying and implementing an energy risk model can be

summarized as follows:

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 92/127

© eeEmbedded Consortium www.eeEmbedded.eu

- (1) provide uncertainty data to tools used for risk analysis - (2) support the identification of potential underperformances that can occur during the

building lifecycle - (3) provide a baseline for a risk-aware building design relying on the selection of proper

design alternatives and FM guidelines expressed as control strategies and maintenance plans In order to reach those goals the energy risk model must be elaborated in a way that it can be used

within the different domains specified in the eeEmbedded vision for a KPI-based holistic multi-

disciplinary design (Geißler et al., 2014). Those domains are differentiated between the design,

simulation and decision domains.

In order for the energy risk model to fulfil its first goal which is strongly related to the simulation

domain there is a need for a data structure providing the following features:

- representation of the uncertainty through stochastic variables - allocation of the stochastic variables to related design objects like building, building site,

building room, energy system component, etc. - representation of parameter variations for the alternative analyses and risk scenarios - representation of the variable samples necessary for the envisioned sensitivity and

uncertainty analyses - handling of the possible huge amount of parameter variations resulting from the data

requirements of such sensitivity and uncertainty analyses - easy exchange and mapping of the information for providing input data to several simulation

tools e.g. TRNSYS or R - easy configuration and population of the model

To allow for such features and to integrate the stochastic regressors identified in Chapter 2 into the

eeEmbedded overall multi-model data it has been chosen to reuse and further develop the

simulation matrix developed in the ISES project (Freudenberg et al., 2014). Indeed the simulation

matrix can provide a harmonised manner of capturing parameter variations for design parameters

(controllable parameters for the designer) as well as stochastic regressors (uncontrollable

parameters for the designer because of their stochastic nature). It is built using the eXtensible

Markup Language (XML) (W3C, 2015) that allows for a high level of interoperability. Indeed the XML

language is very flexible for creating, extending or modifying an information model quite easily. Also

XML as resource format is very spread in the software industry and can be easily transferred

between software applications. In view of that there exist sufficient tools for manipulating and

transforming XML information as it can be required for example by mapping the information into a

specific input format for a specific simulation tool. Moreover there exist different developer tools for

creating applications and user interfaces for an XML model. For all that reasons the simulation matrix

fits the previously listed requirements and can be used as an instance of the energy risk model for

simulation purpose.

The matrix is structured into two main sections as represented on Figure 72, one for describing

“Variances” and the second for describing “Combinations”. The “Variances” section defines all

desired variances of parameters, and the “Combinations” section contains links to the several

parameter variances and thus combines these variations defining particular building design

alternatives used as basis for simulation. In that way it is possible to make several combinations by

either varying one parameter each time or all parameters together. This possibility makes this

approach well suited to satisfy the specific requirements of different analysis methods, like for

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 93/127

© eeEmbedded Consortium www.eeEmbedded.eu

example global and local sensitivity analysis, regarding the kind of parameter sampling to be applied.

Indeed according to the kind of analysis chosen the generated samples must differ from each other

by either varying all parameters (e.g. stochastic sampling like Monte Carlo or Latin Hypercube

sampling) or only one at a time. The sampling must be performed by a specific tool that then

populates the simulation matrix. Those samples can be seen as Multi-Model samples as they can

represent variations of different design parameters not only from the Building Information Model

(BIM) but also variations of parameters from other models interlinked to the Building Information

Model like among others occupancy models, climate models or ESIM (Energy System Information

Model). A description of the Multi-Model approach developed in eeEmbedded is provided by (Mosch

et al., 2015). In that sense the simulation matrix allows for versatile combinations of parameter

variances with minimal redundancy. Indeed more than combining variations of different types of

parameters it avoids making several instances of a data model or a Multi-Model in which most of the

data is the same and only some parameters vary. This is of substantial interest for minimising the size

of the project data and thus optimising data storage.

Figure 72: General structure of the Simulation Matrix. The first part (Variances) defines all

parameters which are varied in the current building (each having an assigned ID). The second part

(Combinations) includes links to these parameter versions (reference to IDs from the first part)

In view of that a second possible use of the Simulation Matrix is as a model data container that stores

different versions of data models related to one project. In that case variation of a model would

represent a model version that can capture modifications made on the model by several actors.

Versioning is not a focus of WP3, that’s why it will not be further analysed in the scope of this work

package.

Taking a deeper look into the simulation matrix XML schema it can be seen as shown on Figure 73

that the header is followed by four key sections (1) Variables, (2) Targets, (3) Assignment Groups and

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 94/127

© eeEmbedded Consortium www.eeEmbedded.eu

(4) Combinations. In the “Variables” section all parameters and their changes are listed. This includes

design variables like properties of the building at different levels of details, as well as stochastic

information from the stochastic regressors. An overview of the information content provided by the

stochastic regressors is given in the Chapter 2. When changing the value of a parameter, this

generally affects several elements of the building. The section “Targets” enables to define a list of

building elements the parameter variation shall apply. It is for example useful when restricting the

simulation to a single building storey or a single room. The section “Assignment Groups” has a

similar intention as the target section but differs a little bit in that it defines groups of linked objects.

This means that the parameter variations are meant to be applied only to those groups defined in

this section. This allows for example to change elements of a façade with a certain type of

construction without changing all elements with the same type of construction. In the section

“Combinations” previously defined parameter variances are connected to serve as input for several

simulation runs. A combination references the variances by their IDs and has an optional attribute

that is either a target list or an assignment group.

Figure 73: Main sections of the Simulation Matrix XML schema containing Header, Variables, Targets,

AssignementGroups and Combinations

Based on this data structure the needed data from the different stochastic regressors can be

described in the Simulation Matrix. For the regressor user behaviour every type of zone, e.g. a

meeting room, has its own special set of transition matrices. Together with a time frame, from these

the samples are generated. This means for every zone a list of integers, indicating the number of

active occupants, is stored in the Simulation Matrix. Additional information concerning occupancy is

the thermal set points and the tolerance thresholds, indicating the environmental conditions that

induce an action by an occupant. As these are vital inputs for the energy simulation, they are also

stored in the Simulation Matrix. The climate samples consist of the TRY of the relevant location,

shifted by a drift, representing the impact of climate change. This drift is generated by a Wiener

process. In the Simulation Matrix the resulting time series of temperature, humidity, solar radiation

and other climatic values is stored. The technological progress is structured by fields of technology

and is simulated by a Wiener Process. In the Simulation Matrix, each object subjected to

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 95/127

© eeEmbedded Consortium www.eeEmbedded.eu

technological progress gets a time series assigned, consisting of values between 0 and 100, which

symbolise the increase in energy efficiency in percent in the component’s respective field. Energy

prices are simulated per source of energy via an ARIMA or a GARCH model. The Simulation Matrix

contains the outputs of these models, which is a time series of prices over a time frame for each

source of energy. The reliability model consists of several components and a failure logic in the form

of a fault tree. For each of these components the Simulation Matrix contains a hazard rate and, if

available additional information like repair times or times of scheduled maintenance.

As stated the simulation matrix has a strong relation to the simulation domain. Anyway the energy

risk model shall also interact with the design and decision domain in order to complete all the risk

management steps from the risk management cycle. Indeed as part of the risk identification step it is

of importance to identify first KRIs and related stochastic regressors, but also to allocate them to

elements of the engineering domains like the Building Information Model and the Energy System

Information Model as explained in (Pruvost et al., 2012). As an example the hazard rates that are part

of the vulnerability risk model shall be linked to corresponding components of the energy system. At

some point in the risk analysis process also the KRIs shall be interlinked to physical elements like the

building itself, a building zone or an energy subsystem. For that purpose an ontology can be used for

modelling the energy risk model in the context of the eeEmbedded Multi-Model and ontological

approach (Mosch et al., 2015). Ontology has the advantage to offer a very flexible structure thus

enabling to easily extend an engineering model with new information, like ESIM complemented with

hazard information. In ontology data interlinking is based on the concept of “triple” integrated in the

ontology format RDF that stands for Resource Description Format and the Web Ontology Language

OWL that implements its syntax (W3C, 2014). This concept used in the context of the Semantic Web

is very powerful for describing links with a high level of semantic. In that sense, more than

interlinking risk information with engineering elements, ontology could also be applied for modelling

risk scenarios like the ones described by fault trees. Another substantial interest in using ontology is

for the decision domain. Indeed OWL and its embedded description logic features allows for

reasoning on the overall data. More precisely there exist a set of modeller tools including generic

reasoners that apply the logical statements made in a model in order either to validate its

consistency, to complete its taxonomy or to create new links between its objects. In view of that it

seems possible to use ontology for linking risk responses like design alternatives or control strategies

to specific risk profiles expressed in terms of KRIs. This modelling strategy for integrating the energy

risk model into the design and decision domains are in a conceptual state and shall be further

analysed in future works.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 96/127

© eeEmbedded Consortium www.eeEmbedded.eu

4 Control strategies

4.1 Intentions and introduction

The purpose of the Task 3.3 is to support the designer to set already in the design phase high level

control strategies which will be implemented in the operation phase, thereby enabling more efficient

Facility Management. Those control strategies shall provide a response to the actual vulnerability

and sustainability risk state of the building and respectively the energy system. They can rely on

templates like for example so called “management templates” used in BACS systems.

Templates can be of different categories like design templates, control templates and maintenance

templates. The design templates should be more the focus of Task 3.5. Indeed the goal of this task is

to help the designer make design alternatives which are based on the vulnerability, sustainability and

cost prognosis and which optimize the building design taking into consideration a trade-off between

targeted performances and investments. Task 3.3 put more emphasis on facility management aiming

at setting guidelines for building exploitation. In this sense control and maintenance templates are in

this section of interest. They have to be built upon the stochastic and risk models developed in Task

3.1 (Chapter 2) and Task 3.2 (Chapter 3).

The risk models by describing worst case scenarios and the critical system behaviour also define the

functions each template should provide. The purpose of the control templates is to specify different

ways the energy management system shall operate to avoid or fix those scenarios. For maintenance

purpose the templates can rely on the failure scenarios to specify maintenance plans. On the other

side, from the stochastic models it is possible to define time points at which specific control

strategies have to be implemented. Indeed as the stochastic model describes daily or yearly peak

loads the energy management system shall use specific control options in time accordingly.

Moreover early warnings can be specified helping the energy management system to recognize when

it shall implement a specific control option.

In order to be able to develop high level control strategy plans a classification of different control

strategies as well as an appropriated development methodology was elaborated. A general

classification of control strategies was specified and will be introduced in Section 4.2. In the

eeEmbedded context control strategies are divided in (1) operational control strategies, (2) short-

term control strategies and (3) long-term control strategies.

Control strategies in the context of eeEmbedded 4.1.1

The embedding of control strategies in the eeEmbedded context is described in this section. Figure 74

illustrates the integration of the control strategies in the eeeBIM Framework and the overall

stochastic approach.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 97/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 74: Control strategy integration in the eeeBIM framework

Based on the energy system design and the energy risk model, principal high level control strategy

plans can be developed, which will be the guidelines for efficient Facility Management (FM) of the

building keeping the building performance in the envisaged performance bandwidth. The energy risk

model is related to the energy system design and can be divided into three sub-models (vulnerability

risk model, sustainability risk model and cost risk model). The definition and distinction between

these different risk models are described in Chapter 3. High level control strategy plans consists of

several control strategies which ensure an energy-efficient operation of the energy system and

respond to the actual vulnerability and sustainability risk state of the building and its technical

system.

The control strategies or the high level control strategy plan are situated within the deterministic

simulation either as local control strategies, describing the local control of an energy sub-system (e.g.

cooling system) or of a component (e.g. air handling unit), or as supervisory control strategies,

operating all technical building systems in an integrated way (monitoring, energy management or

fault analysis). Control strategies, like for example energy demand forecasting or real-time price

prediction require certain input data whilst performing the deterministic simulation. Information

describing the energy price or the user behaviour is needed. The required input data is set up in a

pre-processing step before the deterministic simulation is performed. The simulation inputs can be

either deterministic or stochastic. The so called regressors are defined and explained in detail in

Chapter 2. The analysis workflow itself is performed in several steps (alternative analysis, sensitive

analysis and uncertainty analysis), see Figure 74. After the simulation is performed for each energy

system design concept the different alternative have to be validated. The validation of the energy

system design alternative is done by means of Key Performance Indicators (KPI), capturing the

performance of the building and its energy system, and the Key Risk Indicators (KRI), measuring of

uncertainty around certain KPIs (sustainability and cost) or specifying certain underperformances and

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 98/127

© eeEmbedded Consortium www.eeEmbedded.eu

critical states of the energy system. Based on the simulation results captured by KPIs and KRIs it can

be decided whether the high level control strategy plans are suitable to keeping the building

performance in the envisaged performance bandwidth and avoid underperformances and critical

states of the energy system or whether the control strategy arrangement has to be reworked. After

updating the high level control strategy plan the deterministic simulation can be carried out again.

Existing standards describing control strategies 4.1.2

There exist already standards, norms or guidelines that cover partial aspects of control strategies in

the broadest sense. This section provides the state of the art according to control strategies and an

overview of the most related standards, norms or guidelines. The research on the related works

forms the basis for the classification in Chapter 4.2.

The standards EN 15232 and ISO 16484 as well as the German guideline VDI 3813 cover or deal with

functional descriptions of building, plant and room automation (BAC and/or RA functions

respectively). The mentioned functional descriptions are closely related to control strategies to

operate a building in an energy-efficient way while maintain the user comfort.

EN 15252 - Energy performance of buildings – Impact of Building Automation, Controls and

Building Management

This European standard EN 15252 provides a structured list of control, building automation and

technical building management functions which have an impact on the energy performance of

buildings and it technical building system (EN 15232). Using BAC Efficiency Classes (A, B, C, and D) of

building automation and technical building management functions the required building energy

performance can be achieved. The EN 15232 provides a promising basis for a functional description

of building automation and control system which can be covered by BACS models.

ISO 16484 - Building automation and control systems (BACS) -- Part 3: Functions

The international standard ISO 16484 provides a guideline for integrated planning and operation of

building automation and control systems. The standard defines BACS hardware, BAC functions and a

data communication protocol (BACnet) (ISO 16484-3, ISO 16484-5).

VDI 3813 - Building automation and control systems (BACS) - Room control functions (RA

functions)

The German guideline VDI 3813 applies to room control applications in the field of building services.

The guideline is defining room automation (RA) functions which are grouped into different function

groups (sensor functions, actuator functions, operator and display functions, application functions,

management functions, and service and diagnosis functions). Each RA function can be seen as a black

box including an interface description (VDI3813).

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 99/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 75: VDI 3813 – Application function constant-light control

FSGIM - Facility Smart Grid Information Model

The Facility Smart Grid Information Model (FSGIM) facilitates an abstract representation of the energy

consuming, producing, and storage systems. By modelling the energy characteristics of the equipment

the energy characteristics can be communicated with a standardized protocol. The FSGIM data schema

provides detailed information about systems inside the facility, e.g. HVAC, lighting, security, facility

management systems, and automation systems, as well as detailed information about external systems

that the facility interacts with e.g. weather information, real-time energy pricing information, demand

response signals, and sources of energy usage information. By providing a standardized data schema or

communication protocol the interaction between energy provider and facilities are enabled in a

common way (FSGIM, 2015). The core parts of the FSGIM are the so called Major Components (Building

Blocks). These modelling components can be arranged and combined as needed to represent physical

devices, systems, or functions. The Major Components are Generator Component (e.g. boiler, chiller or

gas engine), Meter Component (e.g. temperature senor, flow sensor or smart energy meter), Load

Component (e.g. radiator or fan-coil) and Energy Management Component (e.g. building energy

management system and supervisor control of the building).

Figure 76: Major components - example arrangement of a HVAC system (FSGIM, 2015)

Besides the major components the FSGIM integrates model elements from external sources to

provide among others information about energy prices, energy usage, schedules and weather. A list

of all linked external sources is shown in the following:

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 100/127

© eeEmbedded Consortium www.eeEmbedded.eu

Energy Interoperation wd36/PR03 (Energy Interoperation Component)

EMIX PR04 - Energy Market Information Exchange (EMIX)

ws-calendar-CS01ws-calendar-CS01 (Information model of WS-Calendar)

IEC 61850 – Substation Automation, Distributed Energy Resources (international standard for communications with electric power and related system intelligent electric devices )

NAESB PAP10 EUI (Energy Usage Information Model)

WXXM (Weather Exchange Model) As conclusion the FSGIM provides several capabilities for real-time energy pricing and demand

response which provide a proper basis for the classification of control strategies and the following

development of high level control strategy plans as well as their implementation in the

commissioning and operation phase.

SGAM - Smart Grid Architecture Model

The Smart Grid Architecture Model developed by Siemens AG (Siemens, 2012) targets the modelling

of a smart grid architecture of intelligent electrical power grid covering technical, functional,

communication-related and informational aspects. The model contains data structures of all major

sub-domains of (electrical) energy systems (including generation, transmission, distribution and

facilities) relevant for the hand-over to end-users, see Figure 77. Because of the focus on the

electrical energy domain this model has to be extended to cover thermodynamic facilities like

heating and cooling systems. The SGAM is formulated with the help of SysML (SGAM, 2015).

Figure 77: Schema introducing the SGAM (Siemens, 2012)

4.2 Classification of control strategies

The development of high level control strategy plans requires a classification of control strategies

with the purpose to be able to easily set up an orchestration of several control strategies in form of

high level control strategy plans. Further a classification allows a specification and conceptualization

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 101/127

© eeEmbedded Consortium www.eeEmbedded.eu

of those control strategies and their implementation using the generic eeTemplate (Zellner et al.

2015) and the ESIM data structure (Kaiser et al. 2015).

There are several possibilities to classify control strategies. Classifications according to 1)

management and application control strategies, 2) preventative, detective and corrective control

strategies, or 3) time horizon related control strategies are feasible. A classification into management

and application control strategies allows the distinction of specific applications, e.g. thermal control,

shading control, lighting control, on a lower level of the automation pyramid (see Figure 84), and

integrated management functionalities, e.g. monitoring, optimization and fault detection and

diagnosis (FDD), on a higher level of the automation pyramid. A classification into preventative,

detective and corrective control strategies is possible but not suitable, because most of the control

strategies can be assigned to each class. Finally a decision was taken to classify control strategies

according to the time horizon. A distinction into operational, short-term and long-term control

strategies to describe three main time horizons was chosen, in which each category can be further

decomposed into management and application control strategies (see Figure 87). An overview on

selected control strategies and their assignment to the elaborated classification is given in the

following sections.

Operational control strategies 4.2.1

In this section an overview on selected Operational Control Strategies is given and their usage in the

eeeBIM Framework and their influence on the potential energy system design or the integrated

building design respectively. This category summarizes control strategies that optimize the

operational behaviour of the energy system within a time horizon up to one day. The focus in the

operational phase lays on the Fault Detection and Diagnosis (FDD), Real-time pricing & energy

prediction and the Demand Response (Manual, Semi-Automated or Automated) for that each of

those are described a bit more in detail in the following.

4.2.1.1 Fault detection and diagnosis

Major attention will be paid to Fault Detection and Diagnosis (FDD) during the operation phase of the

energy system. Several faults can be identified, located, isolated and mostly avoided using a FDD

approach and hence the building performance can be increased. The following excerpt of possible

faults relevant to the eeeBIM Framework can be detected through FDD (Managan, 2013):

Equipment malfunction (such as broken/leaking valves, broken/stuck dampers, sensors out of calibration)

Systems with the wrong set points and operating schedules

Unintentional manual overrides

Dirty filters or strainers Pumps with throttled discharges

Short cycling of equipment

Excessive oscillation (hunting) of control points and/or control loop tuning needs

Incorrect fan and pump speeds, pressures, or low flow rates.

Improper building or space pressurizations (negative or positive)

Inefficient boiler combustion

Excessive building peak electrical demand

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 102/127

© eeEmbedded Consortium www.eeEmbedded.eu

The Figure 78 shows a hierarchical view of a HVAC system and its subsystems. The top-down

approach, detecting and resolving errors from building level to component level, and the bottom-up

approach, detecting and resolving faults from component level to building level, are applicable for

real-time FDD analysis.

Figure 78: Hierarchical structure of a HVAC system (Persin & Tovornik, 2005)

An example for FDD is the filter supervision of an air handling unit with the help of a differential

pressure gauge. This is in particular helpful to detect a dirty filter. Depending on the system to

supervise, many more sensors can be placed in order to allow a safe running of the plant. A

management level supervision controller analyses the data and provides diagnostics for the facility

manager. The BACnet Standard (ISO 16484-5, 2014), deals with alarm and event services. Event

reporting, event algorithms and fault algorithms are discussed. The protocol supports different

predefined error states. The state can, for example, have the values:

No sensor: Sensor is missing

Over range: Value is over the predefined range Open loop: Wire to, e.g. a sensor, is open

4.2.1.2 Real-time pricing and energy prediction

Real-time price response and energy prediction with a time horizon of around two hours are also

considered as Operational Control Strategies. For real-time price response, the Smart Grid Concept

can be implemented (Fraunhofer ESK, 2011). Depending on the actual price for electricity or heat,

the internal energy production (e.g. solar cells or collectors) can be stored temporarily and used later

when the price is on a higher level. This can be done, for example, with an optimal control algorithm

with costs (e.g. in Euro) as the cost function to be minimized. Real-time energy prediction can

additionally provide detailed information about the demanded energy and influence the decision on

the above mentioned optimal control strategy. The prediction can be optimized via a self-learning

algorithm where the prediction is later compared with the real energy consumption.

Real-time energy prediction (energy demand and energy supply) provides detailed information about

the demanded energy and copes with changing loads as well as peak loads for the effective

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 103/127

© eeEmbedded Consortium www.eeEmbedded.eu

operation and management of buildings and its energy system. The energy prediction is closely

related to peak load identification and reduction. Several approaches exist to apply control strategies

for real-time energy prediction. A model-based approach from white box models, modelling the

physics, to black box models, without modelling the physics can be used. Depending on the

modelling approach historical data, runtime data and/or detailed information about the building

(construction, structure and energetic behaviour) and the energy system (product information of the

components) is needed.

An example of a white box model is the SEEDS Facility Building Model which was developed in the

FP7 project Self learning Energy Efficient builDing and opens Spaces (SEEDS) (Wurm et al. 2013). This

white box model is part of the SEEDS Building Energy management System (BEMS) developed to

optimize the energy demand of the whole building and its technical building systems by using

intelligent control strategies and self-learning techniques. Figure 79 shows the general structure with

adequate interactions between the main components of the SEEDS BEMS. The SEEDS Energy

Calculator calculates the energy consumption or predicts the energy demand of technical building

system by means of a Facility Building Model. Optimized control settings of the technical building

system can be used to predict the potential energy consumption of the building whilst maintaining

the user comfort.

Controller

Data Management

Process Interface

Facility Model Library

Optimizing

Energy Calculator

Self-learning

Archiving

WISAN

Figure 79: SEEDS control strategy overview (Wurm et al., 2013)

An example for a black box model approach forms a neural network which has to be trained by

means of historical data to predict the actual energy demand or supply of the building or the energy

system respectively. The level of abstraction of neural networks and black box models in general is

compared to white box models high. For that the quality of the training data must be high to reach a

precise energy prediction.

4.2.1.3 Automated demand response

Demand Response in general is a set of time‐dependent activities to reduce or shift energy usage to

improve smart grid reliability and manage energy costs. Demand response strategies provide control

methodologies that enhance load shedding or load shifting during times when the energy system

(smart grid) is near its capacity or energy prices are high. Demand limiting and shifting can be utilized

for demand response. Demand response can also be accomplished with demand shedding, which is a

temporary reduction or curtailment of peak electric demand. Ideally a demand shedding strategy

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 104/127

© eeEmbedded Consortium www.eeEmbedded.eu

would maximize the demand reduction while minimizing any loss of building services (Motegi et al.,

2007). Figure 80 illustrates the benefits in reducing peak loads through demand response strategies.

Figure 80: left: without demand response; right: with demand response

Demand response mainly targets the district energy system and the buildings HVAC and lighting

system. It can be distinguished between manual, semi-automated and automated demand response.

Manual demand response strategies works as a kind of recommendation system that advices the

facility manager. In the scope of Task 3.3 are automated demand response control strategies.

Automated demand response starts on a very basic level with schedules for the occupancy of an

office type building. To adjust the needed energy for lighting, heating, cooling, ventilation etc., the

presence can be detected with passive infrared (PIR) sensor and e.g. a pre-comfort temperature can

be chosen for the time with no presence. In addition, air quality sensors for CO2 and VOC can be used

for demand oriented ventilation.

Short-term control strategies 4.2.2

In this section an overview on selected Short-term Control Strategies is given and their usage in the

eeeBIM Framework and their influence on the potential energy system design or the integrated

building design respectively. This category summarizes control strategies that optimize the

operational behaviour of the energy system and the efficient energy usage within a time horizon

from hours to a few days.

The focus of the short-term control strategies lays on the Energy demand forecasting, Demand

Shifting, Peak Load Reduction and Price Response each of those are described a bit more in detail in

the following.

4.2.2.1 Demand shifting and peak load reduction

Within the Short-term control strategies, demand shifting and peak load reduction can be reached

with a precise energy demand forecasting combined with price adapted use of energy (Price

Response). The Smart Grid concept, connecting and controlling of intelligent energy generation,

energy distribution, energy storage and energy consumption by means of Information- and

Communication technology (ICT), is a very helpful tool to optimize the demand with respect to the

current price (Fraunhofer ESK, 2011). Mostly this is done with a horizon of around 24 to 48 hours and

taking into account the weather/climate, energy price and the building usage/behaviour.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 105/127

© eeEmbedded Consortium www.eeEmbedded.eu

Another example for demand shifting control strategies is the intelligent usage of the thermal mass

of the building. Pre‐cooling the thermal mass of the building can be used to shift the cooling demand

and to reduce the peak load. In summer, the building mass can be cooled during the night to reduce

the cooling load in the day hours. As a result, the cooling load is shifted in time and the peak demand

is reduced. The building mass can be cooled most effectively during unoccupied hours because it is

possible to relax the comfort constraints (Motegi et al., 2007). Furthermore a pre-heating of the

building thermal mass is possible to avoid peak loads due to demand shifting.

4.2.2.2 Energy demand forecasting

The energy consumption for heating/cooling as well as electricity of a building is influenced by

several internal and external factors. A categorization into several main clusters of these factors was

given in Chapter 2.2.1. The main clusters among others are for instance the building

usage/occupancy, the energy price and the weather/climate.

The energy demand forecasting as control strategy can be assigned to the short-term as well as to

long-term control strategies. In the context of short-term strategies the energy prediction takes place

for hours up to a few days. The energy demand forecasting can be design model based, where e.g.

the weather input and a presence scheduler are two necessary inputs for calculating the demanded

energy. Appropriated approaches to predict the energy demand were introduced in Chapter 2.2.

4.2.2.3 Price response

Price-based demand response refers to changes in usage by customers in response to changes in the

prices they pay and include critical-peak pricing, real-time pricing and time-of-use rates. If the price

differentials between hours or time periods are significant, customers can respond to the price

structure with significant changes in energy use, reducing their energy costs if they adjust the timing

of their energy usage to take advantage of lower-priced periods and avoid consuming when prices

are higher.

In general prices are important, both to energy users and energy producers. Prices response provides

the opportunity for energy users to voluntarily reduce their energy consumption when prices rise in

the regional wholesale energy market. In open energy markets, prices are volatile and typically rise

fast. In the wholesale market prices can fluctuate in minutes due to peak demand events.

As already mentioned price response strategies include time-of-use rates and critical-peak pricing. In

(DOE, 2006) both strategies are described as follows:

Time-of-use (TOU): a rate with different unit prices for usage during different blocks of time, usually

defined for a 24 hour day. TOU rates reflect the average cost of generating and delivering power

during those time periods.

Real-time pricing (RTP): a rate in which the price for electricity typically fluctuates hourly reflecting

changes in the wholesale price of electricity. Customers are typically notified of RTP prices on a day-

ahead or hour-ahead basis.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 106/127

© eeEmbedded Consortium www.eeEmbedded.eu

Critical peak pricing (CPP): CPP rates are a hybrid of the TOU and RTP design. The basic rate structure

is TOU. However, provision is made for replacing the normal peak price with a much higher CPP

event price under specified trigger conditions (e.g., when system reliability is compromised or supply

prices are very high).

Long-term control strategies 4.2.3

In this section an overview on Long-term Control Strategies is given. Their usage in the eeeBIM

Framework and their influence on the potential energy system design or the integrated building

design respectively. With respect to a longer time perspective, the Long-term Control Strategies also

deal with demand shifting, peak load reduction and energy demand forecasting as described above.

The difference between short-term and long-term control strategies is the time horizon. The horizon

for long-term control strategies is in the range of one week up to years. Beside the mentioned

control strategies in the short-term section the focus of long-term control strategies lays on the

Replacement & Maintenance Planning.

4.2.3.1 Replacement & maintenance planning

Many sensors and actuators wear out over time and reduce energy performance. To reduce this risk,

replacement and maintenance plans can be determined based on the FDD from the Operational

Control Strategies. Deliverable 3.3, New Ways of Facility Management (FM), will go into detail on this

topic. For example a differential pressure gauge in an air handling unit can be used to supervise the

filter of the exhaust or inlet channel. After crossing a predefined boundary, the filter needs to be

exchanged in order to enable a safe running of the plant. If the boundary is crossed fast, the FDD

should switch off the air handling unit and alert the facility manager.

4.3 Data structure and implementation aspects

After classifying control strategies into operational, short-term and long-term strategies their

implementation and the representation in data structures shall be addressed. Therefore this chapter

presents implementation possibilities of control strategies as well as the relation to the Energy

System Information Model (ESIM) and the generic eeTemplate concept. An overview of control

strategies in the context of both concepts and information about the technical background are

presented.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 107/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 81: Implementation of control strategies (Examples)

Figure 81 shows a closed-loop, in which the district including building and energy system represents

the controlled process. The final implementation of a control strategy is done in the global building

controller (BACS), operating the whole building and its several technical systems in an integrated

way, or in a local controller, operating a sub-system or component. Figure 81 illustrates different

possibilities to implement a control strategy. These are (1) look up table, (2) equations, (3) neural

network, (4) state chart, (5) or Model Predictive Control (MPC). Further a combination of different in

form of a heterogeneous implementation is conceivable.

Relation to energy system information model 4.3.1

Energy System Information Model (ESIM) is a domain specific model that provides information of the

urban and building energy system including the automation and control systems, which is going to be

developed in the eeEmbedded project (Kaiser et al., 2015). It comprises functional, structural and

physical descriptions of the systems as master data and additional operational data.

The ESIM data structure follows a Multi-Model approach (Figure 82). Hence, the ESIM data structure

will include existing data structures and newly specified data structures. The new specified data

structures will close the gap of existing standards and will ensure an integrated information space.

Due to strong interdependencies between energy system (building internal or external), HVAC

system and automation and control system, the ESIM covers and includes BACS and HVAC data

structures as well.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 108/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 82: ESIM relation to other domain models

Beside existing data structure the ESIM owns core parts which contain the following identified main

aspects of energy systems: (1) energy sources, (2) transformation facilities, (3) distribution systems,

(4) storage systems, (5) automation and control systems (ACS), (6) consumption / usage information

and (6) energy-related information exchange. The Figure 83 illustrates the core part related structure

in a high-level manner. A detailed description of the ESIM core parts are given in (Kaiser et al., 2015).

The representation of control strategies (operational, short-term and long-term strategies) takes

place in the automation and control system part. In general this part covers different physical types

of ACS, sub-systems and component to describe the orchestration of production/transformation,

distribution, storage and use of energy and media. Further behavioural and functional information

are covered. There exists a strong relation between control strategies introduced in Chapter 4.2, and

functions (RA/BAC functions). To fulfil a specific control strategy a corresponding set of

functionalities are needed.

Figure 83: ESIM Core Parts – Automation and Control System

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 109/127

© eeEmbedded Consortium www.eeEmbedded.eu

Relation to the generic BACS template concept 4.3.2

Control strategies are closely related to the functional behaviour of the building automation and

control system which forms a part of the BACS template concept. Control strategies cover the

functional description of a building automation system or its components, for example the BAC and

RA function, defined in ISO 16484-3 and VDI 3813 respectively, and describe the functional behaviour

of the building and energy system. Hence, there exists a strong relation to the BACS template library,

defined in (Guruz et al. 2015), and the BACS data model introduced in (Mosch et al. 2015). The BACS

template library is a subset of the eeE template library which forms a library of generic templates

(simple or complex template) to build-up cross-domain and cross-application. The overall generic

template concept was elaborated and specified in (Zellner et al. 2015). The BACS template library is

structured according to the Automation Pyramid. Figure 84 shows the different level of the

Automation Pyramid, namely 1) Management Level, 2) Automation Level and 3) Field Level.

Figure 84: Automation pyramid

Control strategies on management level

On management level mostly long-term and short-term control strategies are located. Control

Strategies on this level cover strategies for monitoring, optimizing and forecasting the energy

demand and supply of a building district and its energy system.

Control strategies on automation level

All kinds of control strategies are located on automation level to operate the building/district and its

energy system/technical building system in an energy efficient way whilst maintaining the user

requirements. Control strategies on this level cover room automation functions (e.g. thermal control)

on energy consumer side and plant automation functions on energy generation side. For that the

automation templates comprise control strategies and corresponding functional descriptions

including functional interface specification. The functional interface describes the input and output

parameter to fulfil a specific functionality.

Control strategies on field level

Field level templates cover information about sensors, actuators and controller. BACS templates on

field level can also include control strategies, e.g. operate a pump in an energy-efficient way while

minimizing malfunction of the pump. However, despite this fact control strategies on this basic level

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 110/127

© eeEmbedded Consortium www.eeEmbedded.eu

are not in scope of Task 3.3, because the purpose is the development of high level control strategy

Plans which serve as basis for the implementation in the operation phase enabling more efficient

Facility Management (FM). Although control strategies related to maintenance are important on

BACS field level. For maintenance purpose the control strategies can rely on the failure scenarios to

specify maintenance plans.

The following example shall show the relationship between control strategies and BACS templates.

The example bases on the simple building demonstrator which is introduced in Chapter 4.4.2.

The Figure 85 presents the corresponding BACS management template, namely Simple Building

Control, and its interlinkages to other BACS templates. The Simple Building Control covers all

information to plan, simulate and later to operate a building in an energy efficient manner whilst

maintaining the user comfort. Therefore, the management template comprises several automation

templates that cover control strategies for thermal comfort control on energy consumer side and

control strategies for heating and cooling plants on energy producer side. Besides the control

strategy the corresponding room automation (RA) functions and building automation and control

(BAC) functions including functional interface description are covered. Further Simple Building

Control Template comprises BACS equipment information for controller, sensors and actuators. In

order to validate the BACS design solution, based on the Simple Building Control Template,

information about building usage as well as weather and climate conditions are provided. As it can

be seen the management template also contains a kind of control strategy plan. The Building Control

Strategy template comprises control strategies for real-time pricing, energy forecasting and

replacement & maintenance planning. Each of these templates includes application and

management functions which are needed to realize the appropriated control strategy. Depending on

the application or management function respectively a functional interface description is given that

has to be implemented to fulfil a specific function (BAC/RA function).

Figure 86 presents the BACS automation template Thermal Control, included in BACS management

template above, a bit more in detail. The illustrated automation template can be either a part of a

management template or can be used on its own. The Thermal Control template comprises BACS

field templates covering sensor-related information (Temperature Sensor) and data structures

covering the local controls of the technical system (Fan-Coil Control). Both BACS Field Templates can

contain control strategies as well, e.g. replacement and maintenance plans. Further the control

strategy (Thermal Control Strategy) covering the RA functions to fulfil the thermal control of a spatial

structure is described by the template content. The presented Automation Template also covers

domain-independent information like space usage, weather or lifecycle cost.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 111/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 85: Simple building example - eeE Cross-domain template with highlighted control strategy section

Figure 86: BACS automation template – Thermal Control

4.4 Development of high level control strategy plans

The main purpose of Task 3.3 was the development of principal high level control strategy plans. To

do so existing approaches related to control strategies in a broader sense were investigated.

Standards, norms and guidelines in the Building Automation & Control System (BACS) domain and

Smart Grid domain were analysed and built the basis for the classification of control strategies in

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 112/127

© eeEmbedded Consortium www.eeEmbedded.eu

Chapter 4.2. The following chapter presents the basic methodology on how to develop high level

control strategy plans, their integration in the overall stochastic analysis framework as well as the

elaboration of such principal high level control strategy plans on a simple example.

Development methodology 4.4.1

Based on the energy system design and the energy risk model, high level control strategy plans are

going to be developed. To be able to design these control strategy plans in a manner way an

appropriated development methodology is needed. The development of Control Strategy Plans is

part of the design process introduced in Chapter 4.2. The schematic workflow for designing,

analysing as well as optimizing the energy generation and distribution system taking into account a

broad variety of influencing factors while elaborating a sophisticated and state-of the art as well as

future-proof energy system was introduced in Figure 3. A set of appropriate control strategies can be

selected in several working steps and their subtasks to operate the elaborated energy system or

partial energy systems, e.g. energy generation or distribution network. For that the energy system

design can be simulated including the high level control strategy plans increase the performance or

to identify optimization potential of the design alternative.

However, these high level control strategy plans developed according to the defined methodology

are not necessarily the control strategy plans which are used in the commissioning and operation

phase, but they should serve as their baselines for the real building and energy system operation to

ensure energy optimized performance whilst maintaining the user comfort.

The Figure 87 illustrates the elaboration of high level control strategy plans. As already mentioned an

energy system design variant and the related risk model form the basis. Therefore, the elaboration of

high level control strategy plans follows the overall structure of finding variants and alternatives

within the eeEmbedded project. Based on different BACS requirements, Key Design Parameter (KDP)

to-be, Operational Control Strategies are defined. This control strategies and further KDP to-be form

the baseline for short-term control strategies which again result in long-term control strategies.

Possible KDPs to-be are maintenance intervals, invest costs, lifecycle costs (LCC), user comfort or

energy efficiency (see Figure 87). As an example, with the demand of low LCC, a high user comfort

and predictable maintenance intervals with the risk of higher invest cost, additional sensors for FDD

guarantee a safe running from operational perspective. Having a sustainable FDD as a baseline,

detailed and predictable replacement/maintenance plans can be developed.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 113/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 87: Elaboration of high level control strategy plans

Example simple building demonstrator 4.4.2

To demonstrate the development of high level control strategy plans the simple building

demonstrator is used. The small demonstrator comprises a district energy system which provides

three single room buildings with heating and cooling energy (Figure 88). The district energy system

itself consists of a solar panel, a gas engine and an absorption chiller for energy generation. As

auxiliary energy generation a boiler and a chiller are planned. The appropriated schematic

representation is presented in Figure 89. The connection among district energy system and building

energy system forms the district energy interface; it provides heating and cooling energy to climate

the buildings and maintains the user comfort.

Each building owns an internal energy system which is decomposed by a cooling system (fan-coil

including local control), heating system (2 radiator including thermostat) and distribution system

(pumps including local control).

Given the modelled energy system of this basic demonstrator (Figure 88 and Figure 89), the

control strategy plans can be developed. Based on two simple KRI to-be (see Chapter 3.1) which

are low uncertainty on CO2 emission and high reliability of the radiator pump the following KDR

to-be can be formulated:

Choose appropriate cost functions in the demand shifting, peak load reduction and energy demand forecasting algorithms with the goal to reduce to CO2 emissions and use a maximum of renewable energy sources

Apply FDD for the radiator pump

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 114/127

© eeEmbedded Consortium www.eeEmbedded.eu

Based on these KDR to-be, specific BACS templates are chosen and integrated in the model. In a next

step, the workflow from the previous chapters starts. This means, on a high level perspective, sample

generation, deterministic simulations including the control strategies, post processing and analysis of

the data. After this step, the KRI as-is are available and can be compared to the targeted KRI to-be. If

the performance is sufficient, the next design steps starts. Otherwise, the KDR to-be have to be

adapted in order to perform better in terms of KRI as-is.

Figure 88: Simple building demonstrator

Figure 89: Schematic representation district energy system

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 115/127

© eeEmbedded Consortium www.eeEmbedded.eu

5 Technical background and implementation aspects

5.1 Overview

Several software tools are mentioned in Figure 3 and Figure 4 which are essential components of the

software tool chain forming the simulation and analysis related part of the eeEmbedded framework.

A brief introduction of each tool is given within Table 15.

Table 15: Overview to essential components of the software tool chain forming the simulation and analysis

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 116/127

© eeEmbedded Consortium www.eeEmbedded.eu

5.2 Brief introduction of the used software tools

The following chapters are providing more detailed information about each tool.

R 5.2.1

The software package R is described as “language and environment for statistical computing and

graphics … providing a wide variety of statistical (linear and nonlinear modelling, classical statistical

tests, time-series analysis, classification, clustering …) and graphical techniques” (R Project, 2015). R

is distributed as free software under the Free Software Foundation’s GNU General Public License and

available for all common software platforms. Regarding the stochastic related tasks within the

workflow of the analysis approach of the eeEmbedded project R will be used on certain stages within

the tool chain.

STEFaN 5.2.2

Within the software tool chain which is used to design and optimise the energy system - especially

the energy generation part, storages and distribution networks - the software tool STEFaN (Gnüchtel,

2013a) helps to optimise the topology of the distribution network taking into account the subscribers

maximum thermal load, their geographical position and additional circumstances which act as

geographical, infrastructural of financial hindrances, e.g. rivers, streets, pedestrian walkways,

buildings or special conditions within the ground. The tools is using a GIS data set which contains

information about the position of buildings and other infrastructure elements. This information is

extended with data describing the subscriber’s position, the maximum thermal load and the load

profiles. As a result the optimised topology of the distribution network based on financial and

operational issues is processed, see Figure 90.

The software tool was developed from eeEmbedded project partner TUD-IET and is currently running

on Windows platforms. The solution STEFaN is publicly available for free in binary format without

support1. For commercial use a registration is required. Figure 91 shows a network topology as result

of an optimisation run.

1 http://tu-dresden.de/die_tu_dresden/fakultaeten/fakultaet_maschinenwesen/iet/ew/forschung_und_projekte/mldh/download_mldh

Figure 90: Software tool STEFaN – covering the enhancement of GIS data for modelling the buildings, topology and infrastructure beside the site and the distribution pipe system and subscriber’s position

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 117/127

© eeEmbedded Consortium www.eeEmbedded.eu

Figure 91: Example result of an optimised topology of a distribution network for district heating processed by the software tool STEFaN (GEWV, 2011)

FreeOpt/FWOpt 5.2.3

Within the design phase and while operating energy systems on district level the analysis of different

design variants and alternatives, but also the optimisation of the operational order within system

portfolios containing heterogeneous mixtures of energy generator and storage technologies are

esteemed as essential tasks. An optimisation approach is needed to discover an efficient working

orchestration of central managed and decentralized operated systems and components which fits

best the needs formulated by the different stakeholders. Tackling these needs the software tool

FWOpt was developed by the eeEmbedded project partner TUD-IET. Within further research work

regarding energy systems certain enhancements of the software tool FreeOpt were implemented.

The enhanced version of the optimisation tools is named FWOpt, (Gross, 2012). Typical use cases are

the elaboration of the operational order of certain energy systems while regarding the complexity of

typical system characteristics, ecological aspects and cost related functions of regionally and locally

available energy system infrastructure. The basis software tool FreeOpt is public available for free in

binary format without support on the Internet page http://tu-

dresden.de/die_tu_dresden/fakultaeten/fakultaet_maschinenwesen/iet/ew/forschung_und_projekte

/mldh/download_mldh, see (Gnüchtel, 2013). For commercial use a registration is required.

Within these software solutions several kinds of systems and border conditions can be integrated

within the analysis: CHP systems, several types of thermal power plants, heat production plants, heat

pumps, solar thermal systems, thermal storages, electricity and fuel related contracts as well as

different tax models and special operation scenarios of distribution networks.

GAMS 5.2.4

With respect to its importance the optimisation software package which is used as a core part of the

FreeOpt/FWOpt software tools the algebraic modeling package GAMS has to be mentioned. The

abbreviation GAMS stands for Generalised Algebraic Modeling System. The package is based on a

modularised structure and contains several different solvers predestined for solving optimisation

related problems (GAMS, 2014; GAMS, 2015). Within the software package especially the solver

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 118/127

© eeEmbedded Consortium www.eeEmbedded.eu

CPLEX will be used for optimisation purposes. GAMS is available for all common operation software

platforms and under certain license models.

TRNSYS-TUD 5.2.5

TRNSYS is the abbreviation for TRaNsient SYstem Simulation program which is developed by the

University of Wisconsin in Madison, USA for approximately 35 years. This simulation package is

focused on modeling energy systems and related buildings. It is based on a modularised concept

which provides a high level of flexibility when analysing various kinds of energy systems while

involving peripheral conditions and related phenomena. Because of the modularised approach of the

software design experienced users have the possibility to add their own written software code to the

core software parts to process simulation according to their individual tasks. Parts of the software

code are distributed as source code, other (core) parts are available only as binaries.

Within the eeEmbedded project TRNSYS acts as a common placeholder for software systems used for

transient thermal building and energy system simulation and similar purposes. Within a productive

environment based on research results of the eeEmbedded project a comparable tool with similar

functionality could be used.

The eeEmbedded project partner TUD-IET started the development of its own individual software

modules for TRNSYS in 1994. Since this time more and more new simulation modules were added or

existing modules were re-shaped respectively adapted to support the special tasks within research

projects. Because of the high rate of newly developed software modules and approaches which are

unique compared with the software setup which is available as commercial solution the suffix TUD

was added to the original trademark TRNSYS to indicate the difference between the commercial tool

and the research-orientated solution TRNSYS-TUD. The additional or modified software modules

developed by TUD-IET are not available for purchase or free distribution.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 119/127

© eeEmbedded Consortium www.eeEmbedded.eu

6 Conclusions

Chapter 1 contains an overview about the intensions related to the usage of stochastic approaches

within the design process in general and related to the description of work (DOW) of the

eeEmbedded project. Within this chapter typical design steps within the workflow of energy system

design are described. A systematisation of the involved stochastic models is given and linked to

appropriate tasks within the design workflow.

Chapter 2 provides one main subchapters dedicated to the forecasting of energy consumption within

the building lifecycle. With respect to the expected duration of the lifecycle certain regressors were

identified and discussed in the context of their individual stochastic character and importance to the

energy consumption. As main regressors are mentioned user behaviour, climate trend, energy price

as well as technological progress. Besides the energy consumption certain aspects related to a

vulnerability analysis within the design process of (energy) systems is discussed within a second

subchapter. Especially a reliability/dependability analysis could support the decision making domain

when comparing different energy system concepts. Unfortunately in the construction and energy

system domain there is no broad data base available which contains reliability/dependability related

values for processing a high detailed analysis. Because of the strong relationship to the operational

phase of a building the aspects malfunction and underperformance are mentioned but not discussed

in a detailed manner.

In Chapter 3 the energy risk model, consisting of the sustainability risk model, the vulnerability risk

model and the cost risk model, has been established. Each of these submodels has been described

considering the concepts they rely on, their content and their structure. Especially their relation to

the stochastic models, the analysed building performances and the overall eeEmbedded Multi-Model

framework has been explained. Those models are meant to be the backbone for performing risk

management in the context of an optimised energy efficient building design. Especially substantial

methodologies from application domains in which risk management is already wide spread have

been analysed and applied for the purpose of building design. Indeed a big lack of harmonised and

rational ways of managing risk in building design has been noticed in the building industry in general.

An essential contribution of the energy risk model is the introduction of specific Key Risk Indicators

that are integrated into and complement the eeEmbedded holistic KPI-based design methodology. In

the context of Chapter 3 a dedicated risk analysis workflow relying on alternative, sensitivity and

uncertainty analysis has been worked out. This workflow shall allow for a risk-aware optimised

building design that will be implemented in future works. The workflow relies also on the specified

energy risk model and the related stochastic models. It shall also be used for computing the KRIs

specified in the Key Risk Indicator Framework. The next activities related to the risk models concern

the implementation of the concepts, models and workflows previously mentioned. For the risk

analysis workflow the sensitivity and uncertainty analysis will be developed using the open source

software R. These analyses will interact with the simulation engines provided by consortium partners

in order to process stochastic data. To do so an extension of the ISES Simulation Matrix will be made

and used as part of the energy risk model. Moreover the use of ontology as basis for developing a

higher level energy risk model with more semantics will be further analysed. Also the interaction with

the designer and decision makers will be taken into account and a solution for developing a KRI

dashboard will be drafted and developed.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 120/127

© eeEmbedded Consortium www.eeEmbedded.eu

Chapter 4 presented the development high level control strategy plans and the embedding of those

plans in the overall workflow of the design process of the energy system. The purpose was to enable

the development principal high level control strategy plans, which are based on the energy system

design and the risk model, to work as guidelines for efficient Facility Management (FM) of the

building keeping the building performance in the envisaged performance bandwidth.

The elaboration of high level control strategy plans required a classification of control strategies with

the purpose to easily set up an orchestration of several control strategies. A general classification of

control strategies was introduced in Chapter 4.2. In the eeEmbedded context control strategies were

divided in 1) operational control strategies, 2) short-term control strategies and 3) long-term control

strategies.

Implementation aspects of control strategies in the operational phase as well as the relation to the

Energy System Information Model (ESIM) and the BACS template concept were presented in Chapter

4.3.

Chapter 5 contains a brief introduction of the software tools which are available for implementation

of the needed functions and algorithms within the eeEmbedded framework.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 121/127

© eeEmbedded Consortium www.eeEmbedded.eu

References

Anderson R., Boulanger A., Powell W. B., Scott W. (2011): Adaptive Stochastic Control for the Smart

Grid, S. 1098--1115.

Rausand M., Høyland A. (2004): System reliability theory: models, statistical methods, and applica-

tions (Vol. 396). John Wiley & Sons.

Beasley M. S., Branson B., Hancock B. (2011): Developing Key Risk Indicators to Strengthen Enterprise

Risk Management, Published by the Committee of Sponsoring Organizations of the Treadway

Commission (COSO), New York, NY

Bernhofer C. et al. (2013): Signale für die Klimaentwicklung von Dresden: Faktenblatt Klimawandel

Dresden. REKLAM - regionales Klimaanpassungsprogramm Modellregion Dresden. Dresden.

http://www.regklam.de/fileadmin/Daten_Redaktion/Publikationen/130122_Faktenblatt_Kli

mawandel-Dresden.pdf [Status 2015-05-04].

Bernhofer C. (2008): Sachsen im Klimawandel: Eine Analyse. Dresden: Zentraler Broschürenversand

der Sächs. Staatsregierung.

Bourgeois D., Reinhart C., Macdonald I. (2006): Adding advanced behavioural models in whole

building energy simulation: A study on the total energy impact of manual and automated

lighting control, Energy and Buildings 38(7), 814–823 [Status 2012-09-19].

Brohus H., Frier C., Heiselberg P., Haghighat F. (2012): Quantification of uncertainty in predicting

building energy consumption: A stochastic approach. Energy and Buildings, 2012, Elsevier.

Bundesverband der Gas- und Wasserwirtschaft [BDEW] (2007): Abwicklung von Standardlastprofilen:

Gastransport / Betriebswirtschaft. (Praxisinformation P 2007 / 13). Berlin, Bonn [Status 2015-

02-24].

Calleja-Rodríguez G., Guruz, R. (2014): eeEmbedded D1.3: Interoperability and collaboration require-

ments, © eeEmbedded Consortium, Brussels.

Campolongo F., Cariboni J., Saltelli A. (2007): An effective screening design for sensitivity analysis of

large models, Environmental modelling & software 22(10), 1509-1518.

DIN EN 15232 (2011): Energy performance of buildings – Impact of Building Automation, Controls

and Building Management (German version FprEN 15232:2011).

DIN Deutsches Institut für Normung e. V. (2010): DIN EN 60300-1:2010-10 Entwurf – Zuverlässigkeits-

management - Teil 1: Leitfaden für Management und Anwendung (IEC 56/1368/CD:2010);

Entwurf (Bd. ICS 03.120.01; 29.020Bd). Berlin: Beuth Verlag GmbH.

Duarte C., van den Wymelenberg K., Rieger C. (2013): Revealing occupancy patterns in an office

building through the use of occupancy sensor data, Energy and buildings, 67, 587-595.

Energie-Control Austria (2011): Sonstige Marktregeln Strom - Kapitel 6 - Zählwerte, Datenformate

und standardisierte Lastprofile: Version 3.3. Wien. http://www.e-control.at/portal/page/

portal/medienbibliothek/strom/dokumente/pdfs/SOMA_Strom_6_V3-3.pdf [Status 2015-04-

22]

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 122/127

© eeEmbedded Consortium www.eeEmbedded.eu

Energie-Control Austria (2014) Europäischer Haushalts-Energiepreisindex HEPI: Haushaltsstrompreise

in europäischen Hauptstädten, http://www.e-control.at/de/konsumenten/gas/der-gaspreis/

internationale-vergleiche [Status 2015-06-08].

Energie-Control Austria (2015): Europäischer Energiepreisindex für Haushalte (HEPI) – Seit 2009

keine Erholung für Endkunden, http://www.e-control.at/portal/page/portal/medien

bibliothek/statistik/dokumente/pdfs/HEPI%20Press%20Release%20March%202011_de.pdf,

last visited: 18.03.2015

eeEmbedded (2013-17): EU FP7 Project No. 609349 eeEmbedded, http://www.eeEmbedded.eu.

Energy Technology Systems Analysis Programme [ETSAP] (2015): MARKAL. http://www.iea-etsap.org/

web/Markal.asp [Status 2015-06-08].

Energy Technology Systems Analysis Programme [ETSAP] (2015): TIMES - The Integrated MARKAL-

EFOM System. URL: http://www.iea-etsap.org/web/Times.asp [Status 2015-06-08].

European Environment Agency [EEA] (2015): Efficiency of conventional thermal electricity and heat

production (ENER 019) - Assessment published Jan 2015, http://www.eea.europa.eu/data-

and-maps/indicators/efficiency-of-conventional-thermal-electricity-generation-3/assessment

[Status 2015-06-09]. Data provided by Statistical Office of the European Union (Eurostat)

European Power Exchange (2015): EPEX SPOT SE: Intraday-Auktion, http://www.epexspot.com/de/

marktdaten/intradayauktion/quarter-auction-table/2015-06-08/DE [Status 2015-06-08].

Eurostat (2004): How Europeans Spend Their Time - Everyday Life of Women and Men. Luxembourg.

(Pocketbooks) [Status 2013-05-05].

Fraunhofer ESK (2011): Smart Grid Communications 2020 – Fokus Deutschland.

FSGIM (2015): Facility Smart Grid Information Model [online], https://osr.ashrae.org/Public%20

Review-%20Draft%20Standards%20Lib/ASHRAE%20201%20APR%20Draft.pdf

GAMS Software GmbH (2014): General Algebraic Modeling System (GAMS): Flyer. URL:

http://www.gams.com/docs/brochure.pdf [Status 2015-06-13].

Geißler M.C., Guruz R., van Woudenberg W. (2014): eeEmbedded Deliverable D1.1: Vision and

requirements for a KPI-based holistic multi-disciplinary design, © eeEmbedded Consortium,

Brussels.

Geißler M.C., Guruz R., van Woudenberg, W. (2014): eeEmbedded Deliverable D1.2: Use case

scenarios and requirements specification, © eeEmbedded Consortium, Brussels.

Gnüchtel S. (2012): Bürgerheim Biberach - Teil 1: Niedrigenergie-Quartiersentwicklung mit innova-

tiver Nahwärmeversorgung. Teilleistung 1: Energiebilanzen; Dresden [Status 2015-02-24].

Gnüchtel S. (2013): Bürgerheim Biberach - Teil 2: Niedrigenergie-Quartiersentwicklung mit innova-

tiver Nahwärmeversorgung. Dresden.

Gnüchtel S., Groß, S. (2013): Software zur Verbesserung der Einsatzchancen von Fernwärmesystemen:

TUD - Professur für Gebäudeenergietechnik und Wärmeversorgung - Downloadbereich MLDH,

Dresden, http://tu-dresden.de/die_tu_dresden/fakultaeten/fakultaet_maschinenwesen/iet/

ew/forschung_und_projekte/mldh/download_mldh [Status 2015-06-13].

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 123/127

© eeEmbedded Consortium www.eeEmbedded.eu

Groß S. (2012): Untersuchung der Speicherfähigkeit von Fernwärmenetzen und deren Auswirkungen

auf die Einsatzplanung von Wärmeerzeugers, TU Dresden, http://d-nb.info/1068444126/34

[Stand 2015-06-13].

Guerra Santin O. (2011): Behavioural Patterns and User Profiles related to energy consumption for

heating, Energy and Buildings 43(10), 2662–2672 [Status 2012-09-19].

Guruz R., Calleja-Rodríguez G. (2014): eeEmbedded Deliverable D2.1: Holistic multi-disciplinary Key

Point based design framework, © eeEmbedded Consortium, Brussels.

Guruz R., Calleja-Rodríguez G., Geißler M.-C. (2015): eeEmbedded Deliverable D2.3: Holistic KPI

based design methodology © eeEmbedded Consortium, Brussels.

Hawkins E., Jones D. (2013): Notes an Correspondence on increasing global temperatures: 75 years

after Calendar; Royal Metrological Society; Published online in Wiley Online Library; DOI

10.1002/qj.2178

Heo Y., Zavala V. M. (2012): Gaussian process modeling for measurement and verification of building

energy savings, Energy and Buildings 53, 7–18 [Status 2012-09-19].

Heo Y., Choudhary R., Augenbroe G.A (2012): Calibration of building energy models for retrofit

analysis under uncertainty, Energy and Buildings 47, 550–560 [Status 2012-09-19].

Hoes P. et al. (2009): User behaviour in whole building simulation, Energy and Buildings 41(3), 295–

302 [Status 2012-09-19].

Hong T., Jiang Y. Outdoor synthetic temperature for the calculation of space heating load: PII: S0378-

7788(98)00013-9 [Status 2012-09-19].

Hopfe C. J., Hensen J. L. (2011): Uncertainty analysis in building performance simulation for design

support, Energy and Buildings 43(10), 2798–2805 [Status 2012-09-19].

Humphreys M. A., Nicol J. F. (2002): Adaptive thermal comfort and sustainable thermal standards for

buildings: PII: S0378-7788(02)00006-3, Energy and Buildings 34, 563–572 [Status 2012-09-

19].

Hyvfirinen J., Käirki S. (1996): Building Optimization and Fault Diagnosis Source Book, VTT Technical

Research Centre of Finland, Building Technology, Finland.

Immaneni A., Mastro C., Haubenstock M. (2004): A structured approach to building predictive indica-

tors, The RMA Journal, Special Edition: Operational Risk, May 2004.

IOR: institute of Operational Risk (2010): Sound Practice Guidance: Key Risk indicators. Nov. 2010.

ISES (2011): EU Project 288819 ISES - Intelligent Services for Energy-Efficient Design and Life Cycle

Simulation, 7th framework programme of the European community, © ISES Consortium,

Brussels, http://ises.eu-project.info.

ISO/IEC 31000:2009: Risk Management - Guidelines for principles and implementation of risk

management (15 November 2009)

ISO 16484-3 (2005): Building automation and control systems (BACS) -- Part 3: Functions.

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 124/127

© eeEmbedded Consortium www.eeEmbedded.eu

ISO 16484-5 (2014): Building automation and control systems (BACS) -- Part 5: Data communication

protocol.

ISPEX AG (2015): Energiemarkt-Kommentar: Kaum Bewegung bei den Energiepreisen: Großhandel-

preise für Strom und Erdgas, [online] https://www.ispex.de/energiemarkt-kommentar-kaum-

bewegung-bei-den-energiepreisen-6-2015/ [Status 2015-06-08].

Ipsos-RSL and Office for National Statistics, United Kingdom Time Use Survey, 2000 (Computer File),

third ed., UK Data Archive (distributor), Colchester, Essex, September 2003, SN: 4504.

Kaiser J., Stenzel P., Schär R. (2015): eeEmbedded D4.2: Energy System Information Model - ESIM,

© eeEmbedded Consortium, Brussels.

Klugman S.A., Panjer H. H., Wilmot G. E. (2004): Loss Models, From Data to Decisions, 2nd Edition.,

Wiley Interscience, John Wiley & Sons, Inc., New York.

Koo So Y., Yeo, M. S., Kim K. W. (2010): Automated blind control to maximize the benefits of daylight

in buildings, Building and Environment 45(6), 1508–1520 [Status 2012-09-19].

Laine T., Forns-Samso F., Katranuchkov P., Hoch R., Freudenberg P. (2914): Application of multi-step

simulation and multi-eKPI sensitivity analysis in building energy design optimization, Proc.

eWork and eBusiness in Architecture, Engineering and Construction: ECPPM 2014, 799-804

Leuthold F., Weigt H., van Hirschhausen C. (2008): ELMOD - A Model of the European Electricity

Market: Electricity Markets Working Papers WP-EM-00, Dresden,

http://ssrn.com/abstract=1169082 [Stand 2015-06-08].

Liao C., Barooah P. (2010): An integrated approach to occupancy modeling and estimation in com-

mercial buildings, Proc.American Control Conference (ACC) (June 2010), pp. 3130-3135, IEEE.

Loulou, R., Goldstein G., Noble K. (2004): Documentation for the MARKAL Family of Models,

http://www.etsap.org/MrklDoc-I_StdMARKAL.pdf [Status 2015-06-08].

Managan K. (2013): Fault Detection and Diagnostics - Enabling techno-commissioning to ease

building operation and improve performance, Johnson Controls, Inc., Washington DC.

Marathe R., Ryan S. (2005): On the Validity of the Geometric Brownian Motion Assumption, The

Engineering Economist, Volume 50, Issue 2.

Martani, C. et al. (2012): ENERNET: Studying the dynamic relationship between building occupancy

and energy consumption, Energy and Buildings 47, 584–591 [Status 2012-09-19].

Masoso O.T., Grobler L.J. (2010): The dark side of occupants’ behaviour on building energy use,

Energy and Buildings 42(2), 173–177 [Status 2012-09-19].

McKay M. D., Beckman R.J., Conover W. J. (1979): Comparison of three methods for selecting values of

input variables in the analysis of output from a computer code, Technometrics 21.2, 239-245.

McKay M. D. (1995): Evaluating prediction uncertainty, Nuclear Regulatory Commission, Washington,

D.C., Div. of Systems Technology.

Meisenbach C., Gnüchtel S. (1999): Lastprognose konventionell oder mit neuronalen Netzen: ein Ver-

gleich, VDI-Berichte, ISSN 0083-5560

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 125/127

© eeEmbedded Consortium www.eeEmbedded.eu

Meyna A., Pauli B. (2010): Taschenbuch der Zuverlässigkeitstechnik: Quantitative Bewertungs-

verfahren, 2., überarb. und erw. Aufl. München, Wien: Hanser (Praxisreihe Qualitätswissen).

Morris M. D. (1991): Factorial sampling plans for preliminary computational experiments, Techno-

metrics 33.2, 161-174.

Mosch M., Kaiser J. (2015): eeEmbedded D4.1: BIM Multi-Model, Multi-Physics Models and

Management Methods, © eeEmbedded Consortium, Brussels.

Motegi N., Piette M. A., Watson D. S., Kiliccote S., Xu P. (2007): Introduction to Commercial Building

Control Strategies and Techniques for Demand Response, Lawrence Berkeley National Labo-

ratory LBNL-59975, 2007.

Moujalled B., Cantin R., Guarracino G. (2008): Comparison of thermal comfort algorithms in naturally

ventilated office buildings, Energy and Buildings 40(12), 2215–2223 [Status 2012-09-19].

Newsham G. R. (1997): Clothing as a thermal comfort moderator and the effect on energy

consumption: PII: S0378-7788(97)00009-1, Energy and Buildings 26, 283–291 [Status 2012-

09-19].

Nicolai A. (2013): Physical Foundations of the Thermal Space Model THERAKLES (in German: Physi-

kalische Grundlagen des thermischen Raummodells THERAKLES), Research Report, Institut

für Bauklimatik, Fakultät Architektur, TU Dresden.

Nicolai A., Paepke A. (2012): The Building Simulation Platform NANDRAD – Overview of the Physical

Model, the Implementation Concept and the Applied Technologies (in German: Die Gebäude-

simulationsplattform NANDRAD – physikalisches Modell, Umsetzungskonzept und Techno-

logien im Überblick), Proc. BauSIM 2012, Berlin.

Odyssee-Mure (2015): Odyssee energy eficiency indwx (ODEX), EU28, http://www.odyssee-mure.eu/

publications/efficiency-by-sector/buildings/; last check on 2015-03-27

Page J. et al. (2008): A generalised stochastic model for the simulation of occupant presence, Energy

and Buildings 40(2), 83–98 [Status 2012-09-19].

Perschk A. (2010): Gebäude- und Anlagensimulation: Ein Dresdner Modell, Gesundheits-Ingenieur

131(4) [Status 2015-03-16].

Persin S., Tovornik B. (2005): Fault Detection and Diagnosis Methods in HVAC Building Automation

Systems using Industrial Solutions.

Pruessner A. (2015): General Algebraic Modeling System (GAMS): High-Performance Modeling.

http://tu-dresden.de/die_tu_dresden/fakultaeten/fakultaet_maschinenwesen/iet/ew/

vorlesungen/opti/uebung_neu/brochure.pdf [Stand 2015-06-12].

R Project (2015): The R Project for Statistical Computing, http://www.r-project.org/, last checked

2015-03-27

Ryan E. M., Sanquist T. F. (2012): Validation of building energy modeling tools under idealized and

realistic conditions, Energy and Buildings 47, 375–382 [Status 2012-09-19].

Richardson I., Thomson M., Infield D. (2008): A high-resolution domestic building occupancy model

for energy demand simulations, Energy and Buildings, 40(8), 1560-1566

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 126/127

© eeEmbedded Consortium www.eeEmbedded.eu

Richardson Ian et al. (2010): Domestic electricity use: A high-resolution energy demand model,

Energy and Buildings 42(10), 1878–1887 [Status 2012-09-19].

Rijal H. B. et al. (2012): Considering the impact of situation-specific motivations and constraints in the

design of naturally ventilated and hybrid buildings [Status 2012-09-19].

Rijal H.B et al. (2007): Using results from field surveys to predict the effect of open windows on

thermal comfort and energy use in buildings, Energy and Buildings 39(7), 823–836 [Status

2012-09-19].

Saltelli A., Tarantola S., Chan K-S. (1999): A quantitative model-independent method for global sensi-

tivity analysis of model output, Technometrics 41.1: 39-56.

Siemens AG (2012): Siemens entwickelt europäisches Architekturmodell für Smart Grids [online],

http://www.siemens.com/press/de/pressemitteilungen/?press=/de/pressemitteilungen/201

2/infrastructure-cities/smart-grid/icsg201205018.htm

Sobol’ I. M. (2001): Global sensitivity indices for nonlinear mathematical models and their Monte

Carlo estimates, Mathematics and computers in simulation 55.1: 271-280.

Socorro R. et al. (2010): eDIANA Deliverable D4.3-A: Control Strategies Analysis. eDIANA Consortium.

Solvik K., Kaiser J., Geißler M. C., Stenzel P. (2014); eeEmbedded D1.4: Requirements for knowledge-

based design support and templates, © eeEmbedded Consortium, Brussels.

Statistical Office of the European Union (Eurostat) (2015): Efficiency of conventional thermal power

production for district heating, Online available: http://www.eea.europa.eu/data-and-maps/

daviz/efficiency-of-conventional-thermal-power#tab-chart_1

Szentirmai L., Szarka T. (2003): Impact of cost and reliability on energy-saving for industrial electrical

drives, In: Parasiliti, F. and Bertoldi, P. (editors): Energy Efficiency in Motor Driven Systems,

p.465-470, Springer-Verlag Berlin New York.

Todinov M. T. (2006): Risk-Based Reliability Analysis and Generic Principles for Risk Reduction,

Elsevier Science, Amsterdam.

TUD - Professur für Gebäudeenergietechnik und Wärmeversorgung ([ET-GEWV] (2011): LowEX-Fern-

wärme - MULTILEVEL DISTRICT HEATING, Dresden, http://tu-dresden.de/die_tu_dresden/

fakultaeten/fakultaet_maschinenwesen/iet/ew/forschung_und_projekte/mldh/mldh#tt4

[Status 2015-06-12].

U.S. Department of Energy [DOE] (2006): Benefits of Demand Response in Electricity Markets and

Recommendations for Achieving Them: A report to the United States Congress Pursuant to

Section 1252 of the Energy Policy Act of 2005.

Yao R., Steemers K. (2005): A method of formulating energy load profile for domestic buildings in the

UK, Energy and Buildings 37(6), 663–671 [Status 2012-09-19].

Yun G. Y., Tuohy P., Steemers K. (2009): Thermal performance of a naturally ventilated building using

a combined algorithm of probabilistic occupant behaviour and deterministic heat and mass

balance models, Energy and Buildings 41(5), 489–499 [Status 2012-09-19].

D3.1

Stochastic, risk and vulnerability models and control strategies

Version 0.1

Page 127/127

© eeEmbedded Consortium www.eeEmbedded.eu

van den Wymelenberg K. (2012): Patterns of occupant interaction with window blinds: A literature

review, Energy and Buildings 51, 165–176 [Status 2012-09-19].

Van Gelder L., Janssen H., Roels S. (2014): Probabilistic design and analysis of building performances:

Methodology and application example, Energy and Buildings, 202–211.

VDI (2007): Zuverlässigkeitsmanagement, Berlin: Beuth Verlag GmbH [Status 2014-07-02].

VDI 3813 – Part 2 (2011): Building automation and control systems (BACS) - Room control functions

(RA functions), VDI, Beuth Verlag, Berlin.

Verma A. K., Srividya A., Karanki, D. R. (2010): Reliability and safety engineering. London: Springer.

Vesely W. E. et al. (1981): Fault tree handbook, Report No. NUREG-0492, Nuclear Regulatory Com-

mission Washington D.C.

Virote J., Neves-Silva R. (2012): Stochastic models for building energy prediction based on occupant

behaviour assessment, Energy and Buildings 53, 183–193 [Status 2014-10-02].

Widén J., Nilsson A. M., Wäckelgård E. (2009): A combined Markov-chain and bottom-up approach to

modelling of domestic lighting demand, Energy and Buildings 41(10), 1001–1012 [Status

2012-09-19].

Wurm J., Donath U., Haufe J. (2013): SEEDS Deliverable D2.5: Optimized Models for the energy

system and for sub-systems verified and optimized for the demonstrator © SEEDS

Consortium, Brussels.

Zhang T., Siebers P.-O., Aickelin U. (2011): Modelling electricity consumption in office buildings: An

agent based approach, Energy and Buildings 43(10), 2882–2892 [Status 2012-09-19].

Zellner R., Guruz R., Mosch M., Katranuschkov P., Tøn A., Kaiser J. (2015): eeEmbedded Deliverable D1.5:

System architecture of the virtual holistic design lab and office, © eeEmbedded Consortium,

Brussels.

Zellner R., Kaiser J. (2015): eeEmbedded Deliverable D2.2: Templates for fast semi-automatic detai-

ling, © eeEmbedded Consortium, Brussels.