Package | Description |
---|---|
com.powsybl.security | |
com.powsybl.security.distributed |
Copyright (c) 2019, RTE (http://www.rte-france.com)
This Source Code Form is subject to the terms of the Mozilla Public
License, v. 2.0.
|
com.powsybl.security.execution |
Copyright (c) 2019, RTE (http://www.rte-france.com)
This Source Code Form is subject to the terms of the Mozilla Public
License, v. 2.0.
|
Class and Description |
---|
NetworkVariant
A network variant, simply embeds a
Network and the ID of one of its variants. |
Class and Description |
---|
SecurityAnalysisExecution
Represents a security analysis to be executed on inputs typically provided as files and
text-formatted options.
|
SecurityAnalysisExecutionInput
Arguments for a
SecurityAnalysisExecution :
a Network and the variant to be considered
some SecurityAnalysisParameters
a set of requested result extensions
the set of violation types to be considered
an optional ByteSource which describes contingencies
Design note: here we only want serializable objects for forwarding purpose,
therefore some fields are fully serializable business objects
while others are more in their "source" format as they do not support serialization out of the box. |
Class and Description |
---|
NetworkVariant
A network variant, simply embeds a
Network and the ID of one of its variants. |
SecurityAnalysisExecution
Represents a security analysis to be executed on inputs typically provided as files and
text-formatted options.
|
SecurityAnalysisExecutionBuilder
Helper class to build a
SecurityAnalysisExecution ,
based on specified options, in particular distribution options. |
SecurityAnalysisExecutionInput
Arguments for a
SecurityAnalysisExecution :
a Network and the variant to be considered
some SecurityAnalysisParameters
a set of requested result extensions
the set of violation types to be considered
an optional ByteSource which describes contingencies
Design note: here we only want serializable objects for forwarding purpose,
therefore some fields are fully serializable business objects
while others are more in their "source" format as they do not support serialization out of the box. |
SecurityAnalysisInputBuildStrategy
In charge of transforming an execution input to an actual
security analysis input.
|
Copyright © 2020. All rights reserved.