694 research outputs found
Kidney regeneration: common themes from the embryo to the adult
The vertebrate kidney has an inherent ability to regenerate following acute damage. Successful regeneration of the injured kidney requires the rapid replacement of damaged tubular epithelial cells and reconstitution of normal tubular function. Identifying the cells that participate in the regeneration process as well as the molecular mechanisms involved may reveal therapeutic targets for the treatment of kidney disease. Renal regeneration is associated with the expression of genetic pathways that are necessary for kidney organogenesis, suggesting that the regenerating tubular epithelium may be âreprogrammedâ to a less-differentiated, progenitor state. This review will highlight data from various vertebrate models supporting the hypothesis that nephrogenic genes are reactivated as part of the process of kidney regeneration following acute kidney injury (AKI). Emphasis will be placed on the reactivation of developmental pathways and how our understanding of the resulting regeneration process may be enhanced by lessons learned in the embryonic kidney.Fil: Cirio, Maria Cecilia. University of Pittsburgh; Estados Unidos. Consejo Nacional de Investigaciones CientĂficas y TĂ©cnicas; ArgentinaFil: de Groh, Eric D.. University of Pittsburgh; Estados UnidosFil: de Caestecker, Mark P.. Vanderbilt University; Estados UnidosFil: Davidson, Alan J.. The University of Auckland; Nueva ZelandaFil: Hukriede, Neil A.. University of Pittsburgh; Estados Unido
An Efficient Method to Take into Account Forecast Uncertainties in Large Scale Probabilistic Power Flow
The simulation of uncertainties due to renewable and load forecasts is becoming more and more important in security assessment analyses performed on large scale networks. This paper presents an efficient method to account for forecast uncertainties in probabilistic power flow (PPF) applications, based on the combination of PCA (Principal Component Analysis) and PEM (Point Estimate Method), in the context of
operational planning studies applied to large scale AC grids. The benchmark against the conventional PEM method applied to large power system models shows that the proposed method assures high speed up ratios, preserving a good accuracy of the marginal distributions of the outputs
Probabilistic assessment of Net Transfer Capacity considering forecast uncertainties
In transmission system planning, researchers propose methods to assess the effect of uncertainties of power system operating condition due to forecasting errors of intermittent generation and loads. In particular probabilistic power flow methods are used to calculate the probability distributions of the voltages and the branch currents, starting from the distributions of power injections/absorptions. These uncertainties play a key role in the operational planning of power systems, as certain configurations of load and intermittent generation can cause security problems. This paper aims to propose a probabilistic methodology to assess Net Transfer Capacity (NTC) among network areas, which quantifies forecast error uncertainties by applying the Point Estimate Method (PEM) combined with Third Order Polynomial Normal (TPN) Transformation. This approach is compared with a conventional NTC assessment technique and has been tested on an IEEE test system
A Risk-Based Methodology and Tool Combining Threat Analysis and Power System Security Assessment
A thorough investigation of power system security requires the analysis of the vulnerabilities to natural and man-related threats which potentially trigger multiple contingencies. In particular, extreme weather events are becoming more and more frequent due to climate changes and often cause large load disruptions on the system, thus the support for security enhancement gets tricky. Exploiting data coming from forecasting systems in a security assessment environment can help assess the risk of operating power systems subject to the disturbances provoked by the weather event itself. In this context, the paper proposes a security assessment methodology, based on an updated definition of risk suitable for power system risk evaluations. Big data analytics can be useful to get an accurate model for weather-related threats. The relevant software (SW) platform integrates the security assessment methodology with prediction systems which provide short term forecasts of the threats affecting the system. The application results on a real wet snow threat scenario in the Italian High Voltage grid demonstrate the effectiveness of the proposed approach with respect to conventional security approaches, by complementing the conventional "N - 1" security criterion and exploiting big data to link the security assessment phase to the analysis of incumbent threat
Hyperacute Incidental Late Myocardial Enhancement in Ischemic Stroke Using Chest Spectral CT: Relationship with Etiology
Background: Hyperacute cardiac imaging of patients with acute ischemic stroke (AIS), though desirable, is impractical. Using delayed-enhancement, low-dose, non-gated, chest spectral computed tomography scans (DESCT), we explored the prevalence and patterns of incidental myocardial late iodine enhancement (LIE) and embolic sources, and their relationship with stroke etiology. Methods: Since July 2020, DESCT was performed after cerebrovascular CT angiography (CTA) among patients with suspected AIS undergoing CT using a dual-layer spectral scanner, without additional contrast administration. Images were analyzed using monoenergetic reconstructions and iodine density maps, and the myocardial extracellular volume fraction (ECV, %) was calculated. Results: Eighty patients with AIS were included. DESCT identified a cardiac thrombi in 6 patients (7.5%), and a complex aortic plaque in 4 (5%) cases; reclassifying 5 embolic strokes of uncertain source (28% of ESUS) to cardioembolic (CE, n = 3) and non-CE (n = 2) etiologies. LIE was identified in 38 (48%) patients, most commonly (82%) of ischemic pattern. We did not identify significant relationships between AIS etiology and the presence, pattern, and extent of LIE (p > 0.05); ECV (p = 0.56), severe aortic (p = 0.25) or valvular (p = 0.26) disease, or the extent of coronary calcification (p = 0.39). Patients with evidence of major cardiovascular DESCT findings had higher rates of all-cause death at 90 days (42% vs. 19%, p = 0.037). Conclusions: In this study, hyperacute cardiac imaging of AIS with DESCT identified a high prevalence of incidental cardiac disease predominantly involving LIE of ischemic etiology and mostly not related to the stroke etiology.Fil: Rodriguez Granillo, Gaston Alfredo. Consejo Nacional de Investigaciones CientĂficas y TĂ©cnicas. Oficina de CoordinaciĂłn Administrativa Houssay. Instituto Alberto C. Taquini de Investigaciones en Medicina Traslacional - Universidad de Buenos Aires. Facultad de Medicina. Instituto de Investigaciones CardiolĂłgicas "Prof. Dr. Alberto C. Taquini". Instituto Alberto C. Taquini de Investigaciones en Medicina Traslacional; Argentina. Clinica La Sagrada Familia. Instituto Medico ENERI; ArgentinaFil: Cirio, Juan J.. Clinica La Sagrada Familia. Instituto Medico ENERI; ArgentinaFil: Ciardi, Celina. Clinica La Sagrada Familia. Instituto Medico ENERI; ArgentinaFil: Caballero, Maria L.. Clinica La Sagrada Familia. Instituto Medico ENERI; ArgentinaFil: Fontana, Lucia A.. Clinica La Sagrada Familia. Instituto Medico ENERI; ArgentinaFil: Buezas, Mariano D.. Clinica La Sagrada Familia. Instituto Medico ENERI; ArgentinaFil: Diluca, Pablo. Clinica La Sagrada Familia. Instituto Medico ENERI; ArgentinaFil: Lylyk, Pedro. Clinica La Sagrada Familia. Instituto Medico ENERI; Argentin
Online security assessment with load and renewable generation uncertainty: The iTesla project approach
The secure integration of renewable generation into modern power systems requires an appropriate assessment of the security of the system in real-time. The uncertainty associated with renewable power makes it impossible to tackle this problem via a brute-force approach, i.e. it is not possible to run detailed online static or dynamic simulations for all possible security problems and realizations of load and renewable power. Intelligent approaches for online security assessment with forecast uncertainty modeling are being sought to better handle contingency events. This paper reports the platform developed within the iTesla project for online static and dynamic security assessment. This innovative and open-source computational platform is composed of several modules such as detailed static and dynamic simulation, machine learning, forecast uncertainty representation and optimization tools to not only filter contingencies but also to provide the best control actions to avoid possible unsecure situations. Based on High Performance Computing (HPC), the iTesla platform was tested in the French network for a specific security problem: overload of transmission circuits. The results obtained show that forecast uncertainty representation is of the utmost importance, since from apparently secure forecast network states, it is possible to obtain unsecure situations that need to be tackled in advance by the system operator
Demonstration of Converter Control Interactions in MMC-HVDC Systems
Although the control of modular multi-level converters (MMCs) in high-voltage direct-current (HVDC) networks has become a mature subject these days, the potential for adverse interactions between different converter controls remains an under-researched challenge attracting the attention from both academia and industry. Even for point-to-point HVDC links (i.e., simple HVDC systems), converter control interactions may result in the shifting of system operating voltages, increased power losses, and unintended power imbalances at converter stations. To bridge this research gap, the risk of multiple cross-over of control characteristics of MMCs is assessed in this paper through mathematical analysis, computational simulation, and experimental validation. Specifically, the following point-to-point HVDC link configurations are examined: (1) one MMC station equipped with a current versus voltage droop control and the other station equipped with a constant power control; and (2) one MMC station equipped with a power versus voltage droop control and the other station equipped with a constant current control. Design guidelines for droop coefficients are provided to prevent adverse control interactions. A 60-kW MMC test-rig is used to experimentally verify the impact of multiple crossing of control characteristics of the DC system configurations, with results verified through software simulation in MATLAB/Simulink using an open access toolbox. Results show that in operating conditions of 650 V and 50 A (DC voltage and DC current), drifts of 7.7% in the DC voltage and of 10% in the DC current occur due to adverse control interactions under the current versus voltage droop and power control scheme. Similarly, drifts of 7.7% both in the DC voltage and power occur under the power versus voltage droop and current control scheme.This work was supported by the EU FP7 program, through the project âBEyond State of the art Technologies for re-Powering AC corridors and multi-Terminal HVDC Systemsâ (BEST-PATHS), grant agreement 612748.
The simulation toolbox can be downloaded from the project website at www.bestpaths-project.eu (accessed on 10 December 2021)
Benchmarking and Validation of Cascading Failure Analysis Tools
Cascading failure in electric power systems is a complicated problem for which a variety of models, software tools, and analytical tools have been proposed but are difficult to verify. Benchmarking and validation are necessary to understand how closely a particular modeling method corresponds to reality, what engineering conclusions may be drawn from a particular tool, and what improvements need to be made to the tool in order to reach valid conclusions. The community needs to develop the test cases tailored to cascading that are central to practical benchmarking and validation. In this paper, the IEEE PES working group on cascading failure reviews and synthesizes how benchmarking and validation can be done for cascading failure analysis, summarizes and reviews the cascading test cases that are available to the international community, and makes recommendations for improving the state of the art
- âŠ