Uses of Package
com.powsybl.security
-
Packages that use com.powsybl.security Package Description com.powsybl.action.simulator.loadflow com.powsybl.action.simulator.tools com.powsybl.security com.powsybl.security.comparator com.powsybl.security.converter com.powsybl.security.detectors Base classes and default implementation of limit violation detectors.com.powsybl.security.distributed Copyright (c) 2019, RTE (http://www.rte-france.com) This Source Code Form is subject to the terms of the Mozilla Public License, v. 2.0.com.powsybl.security.execution Copyright (c) 2019, RTE (http://www.rte-france.com) This Source Code Form is subject to the terms of the Mozilla Public License, v. 2.0.com.powsybl.security.extensions com.powsybl.security.interceptors com.powsybl.security.json com.powsybl.security.preprocessor Copyright (c) 2019, RTE (http://www.rte-france.com) This Source Code Form is subject to the terms of the Mozilla Public License, v. 2.0. -
Classes in com.powsybl.security used by com.powsybl.action.simulator.loadflow Class Description LimitViolation A generic representation of a violation of a network equipment security limit.SecurityAnalysisResult -
Classes in com.powsybl.security used by com.powsybl.action.simulator.tools Class Description LimitViolation A generic representation of a violation of a network equipment security limit.SecurityAnalysisResult -
Classes in com.powsybl.security used by com.powsybl.security Class Description AbstractSecurityAnalysis Implements some common methods of interfaceSecurityAnalysis
, and provides aSecurityAnalysisResultBuilder
to ease creation of results.LimitViolation A generic representation of a violation of a network equipment security limit.LimitViolationBuilder A builder class forLimitViolation
s.LimitViolationDetector Being given some physical values (currents, voltages, ...) for network elements, is in charge of deciding whether there are limit violations or not.LimitViolationFilter LimitViolationsResult LimitViolationType NetworkMetadata PostContingencyResult Security.CurrentLimitType Permanently or temporarily admissible currents, as defined in the ENTSO-E operation handbook.Security.LimitViolationWriteConfig Security.PostContingencyLimitViolationWriteConfig SecurityAnalysis ASecurityAnalysis
is a power system computation which computes, for aNetwork
, theLimitViolations
on N-situation and the ones caused by a specified list ofContingencies
.SecurityAnalysisConfig Configuration for aSecurityAnalysis
.SecurityAnalysisFactory TODO: deprecate priority parameterSecurityAnalysisInput Input data/configuration for aSecurityAnalysis
computation.SecurityAnalysisParameters Parameters for security analysis computation.SecurityAnalysisResult SecurityAnalysisResultBuilder Facilitates the creation of security analysis results, in particular for subclasses ofAbstractSecurityAnalysis
.SecurityAnalysisResultBuilder.AbstractLimitViolationsResultBuilder Base class for the pre and post contingency builders.SecurityAnalysisResultBuilder.PostContingencyResultBuilder SecurityAnalysisResultBuilder.PreContingencyResultBuilder Builder for the pre-contingency resultSecurityAnalysisResultWithLog -
Classes in com.powsybl.security used by com.powsybl.security.comparator Class Description LimitViolation A generic representation of a violation of a network equipment security limit.LimitViolationsResult PostContingencyResult SecurityAnalysisResult -
Classes in com.powsybl.security used by com.powsybl.security.converter Class Description SecurityAnalysisResult -
Classes in com.powsybl.security used by com.powsybl.security.detectors Class Description LimitViolation A generic representation of a violation of a network equipment security limit.LimitViolationDetector Being given some physical values (currents, voltages, ...) for network elements, is in charge of deciding whether there are limit violations or not.Security.CurrentLimitType Permanently or temporarily admissible currents, as defined in the ENTSO-E operation handbook. -
Classes in com.powsybl.security used by com.powsybl.security.distributed Class Description LimitViolationType SecurityAnalysis ASecurityAnalysis
is a power system computation which computes, for aNetwork
, theLimitViolations
on N-situation and the ones caused by a specified list ofContingencies
.SecurityAnalysisParameters Parameters for security analysis computation.SecurityAnalysisResult SecurityAnalysisResultWithLog -
Classes in com.powsybl.security used by com.powsybl.security.execution Class Description LimitViolationType SecurityAnalysisFactory TODO: deprecate priority parameterSecurityAnalysisInput Input data/configuration for aSecurityAnalysis
computation.SecurityAnalysisParameters Parameters for security analysis computation.SecurityAnalysisResult SecurityAnalysisResultWithLog -
Classes in com.powsybl.security used by com.powsybl.security.extensions Class Description LimitViolation A generic representation of a violation of a network equipment security limit. -
Classes in com.powsybl.security used by com.powsybl.security.interceptors Class Description LimitViolation A generic representation of a violation of a network equipment security limit.LimitViolationsResult PostContingencyResult SecurityAnalysisResult -
Classes in com.powsybl.security used by com.powsybl.security.json Class Description LimitViolation A generic representation of a violation of a network equipment security limit.LimitViolationsResult NetworkMetadata SecurityAnalysisParameters Parameters for security analysis computation.SecurityAnalysisResult -
Classes in com.powsybl.security used by com.powsybl.security.preprocessor Class Description SecurityAnalysisConfig Configuration for aSecurityAnalysis
.SecurityAnalysisInput Input data/configuration for aSecurityAnalysis
computation.