Package | Description |
---|---|
com.powsybl.action.simulator.loadflow | |
com.powsybl.action.simulator.tools | |
com.powsybl.security | |
com.powsybl.security.comparator | |
com.powsybl.security.converter | |
com.powsybl.security.detectors |
Base classes and default implementation of limit violation detectors.
|
com.powsybl.security.distributed |
Copyright (c) 2019, RTE (http://www.rte-france.com)
This Source Code Form is subject to the terms of the Mozilla Public
License, v. 2.0.
|
com.powsybl.security.execution |
Copyright (c) 2019, RTE (http://www.rte-france.com)
This Source Code Form is subject to the terms of the Mozilla Public
License, v. 2.0.
|
com.powsybl.security.extensions | |
com.powsybl.security.interceptors | |
com.powsybl.security.json | |
com.powsybl.security.preprocessor |
Copyright (c) 2019, RTE (http://www.rte-france.com)
This Source Code Form is subject to the terms of the Mozilla Public
License, v. 2.0.
|
Class and Description |
---|
LimitViolation
A generic representation of a violation of a network equipment security limit.
|
SecurityAnalysisResult |
Class and Description |
---|
LimitViolation
A generic representation of a violation of a network equipment security limit.
|
SecurityAnalysisResult |
Class and Description |
---|
AbstractSecurityAnalysis
Implements some common methods of interface
SecurityAnalysis ,
and provides a SecurityAnalysisResultBuilder to ease creation of results. |
LimitViolation
A generic representation of a violation of a network equipment security limit.
|
LimitViolationBuilder
A builder class for
LimitViolation s. |
LimitViolationDetector
Being given some physical values (currents, voltages, ...) for network elements,
is in charge of deciding whether there are limit violations or not.
|
LimitViolationFilter |
LimitViolationsResult |
LimitViolationType |
NetworkMetadata |
PostContingencyResult |
Security.CurrentLimitType
Permanently or temporarily admissible currents,
as defined in the ENTSO-E operation handbook.
|
Security.LimitViolationWriteConfig |
Security.PostContingencyLimitViolationWriteConfig |
SecurityAnalysis
A
SecurityAnalysis is a power system computation which computes, for a Network ,
the LimitViolations on N-situation
and the ones caused by a specified list of Contingencies . |
SecurityAnalysisConfig
Configuration for a
SecurityAnalysis . |
SecurityAnalysisFactory
TODO: deprecate priority parameter
|
SecurityAnalysisInput
Input data/configuration for a
SecurityAnalysis computation. |
SecurityAnalysisParameters
Parameters for security analysis computation.
|
SecurityAnalysisResult |
SecurityAnalysisResultBuilder
Facilitates the creation of security analysis results, in particular
for subclasses of
AbstractSecurityAnalysis . |
SecurityAnalysisResultBuilder.AbstractLimitViolationsResultBuilder
Base class for the pre and post contingency builders.
|
SecurityAnalysisResultBuilder.PostContingencyResultBuilder |
SecurityAnalysisResultBuilder.PreContingencyResultBuilder
Builder for the pre-contingency result
|
SecurityAnalysisResultWithLog |
Class and Description |
---|
LimitViolation
A generic representation of a violation of a network equipment security limit.
|
LimitViolationsResult |
PostContingencyResult |
SecurityAnalysisResult |
Class and Description |
---|
SecurityAnalysisResult |
Class and Description |
---|
LimitViolation
A generic representation of a violation of a network equipment security limit.
|
LimitViolationDetector
Being given some physical values (currents, voltages, ...) for network elements,
is in charge of deciding whether there are limit violations or not.
|
Security.CurrentLimitType
Permanently or temporarily admissible currents,
as defined in the ENTSO-E operation handbook.
|
Class and Description |
---|
LimitViolationType |
SecurityAnalysis
A
SecurityAnalysis is a power system computation which computes, for a Network ,
the LimitViolations on N-situation
and the ones caused by a specified list of Contingencies . |
SecurityAnalysisParameters
Parameters for security analysis computation.
|
SecurityAnalysisResult |
SecurityAnalysisResultWithLog |
Class and Description |
---|
LimitViolationType |
SecurityAnalysisFactory
TODO: deprecate priority parameter
|
SecurityAnalysisInput
Input data/configuration for a
SecurityAnalysis computation. |
SecurityAnalysisParameters
Parameters for security analysis computation.
|
SecurityAnalysisResult |
SecurityAnalysisResultWithLog |
Class and Description |
---|
LimitViolation
A generic representation of a violation of a network equipment security limit.
|
Class and Description |
---|
LimitViolation
A generic representation of a violation of a network equipment security limit.
|
LimitViolationsResult |
PostContingencyResult |
SecurityAnalysisResult |
Class and Description |
---|
LimitViolation
A generic representation of a violation of a network equipment security limit.
|
LimitViolationsResult |
NetworkMetadata |
SecurityAnalysisParameters
Parameters for security analysis computation.
|
SecurityAnalysisResult |
Class and Description |
---|
SecurityAnalysisConfig
Configuration for a
SecurityAnalysis . |
SecurityAnalysisInput
Input data/configuration for a
SecurityAnalysis computation. |
Copyright © 2020. All rights reserved.