Uses of Package
com.powsybl.security
-
Packages that use com.powsybl.security Package Description com.powsybl.security com.powsybl.security.comparator com.powsybl.security.condition com.powsybl.security.converter com.powsybl.security.detectors Base classes and default implementation of limit violation detectors.com.powsybl.security.distributed Classes used for the security analysis distribution or simple forwarding to other itools process(es).com.powsybl.security.execution Explicits the common interface for executing security analysis either in this preprocess or by delegating it to other itools processes.com.powsybl.security.extensions com.powsybl.security.interceptors com.powsybl.security.json com.powsybl.security.preprocessor Utilities to preprocess security analysis inputs before the actual execution.com.powsybl.security.results -
Classes in com.powsybl.security used by com.powsybl.security.comparator Class Description LimitViolation A generic representation of a violation of a network equipment security limit.LimitViolationsResult SecurityAnalysisResult -
Classes in com.powsybl.security used by com.powsybl.security.condition Class Description LimitViolationType -
Classes in com.powsybl.security used by com.powsybl.security.converter Class Description SecurityAnalysisResult -
Classes in com.powsybl.security used by com.powsybl.security.detectors Class Description LimitViolation A generic representation of a violation of a network equipment security limit.LimitViolationDetector Being given some physical values (currents, voltages, ...) for network elements, is in charge of deciding whether there are limit violations or not. -
Classes in com.powsybl.security used by com.powsybl.security.distributed Class Description LimitViolationType SecurityAnalysisReport -
Classes in com.powsybl.security used by com.powsybl.security.execution Class Description LimitViolationType SecurityAnalysis.Runner A security analysis runner is responsible for providing convenient methods on top ofSecurityAnalysisProvider
: several variants of synchronous and asynchronous run with default parameters.SecurityAnalysisInput Input data/configuration for aSecurityAnalysis
computation.SecurityAnalysisParameters Parameters for security analysis computation.SecurityAnalysisReport -
Classes in com.powsybl.security used by com.powsybl.security.extensions Class Description LimitViolation A generic representation of a violation of a network equipment security limit. -
Classes in com.powsybl.security used by com.powsybl.security.interceptors Class Description LimitViolation A generic representation of a violation of a network equipment security limit.SecurityAnalysisResult -
Classes in com.powsybl.security used by com.powsybl.security.json Class Description LimitViolation A generic representation of a violation of a network equipment security limit.LimitViolationsResult NetworkMetadata SecurityAnalysisParameters Parameters for security analysis computation.SecurityAnalysisResult -
Classes in com.powsybl.security used by com.powsybl.security.preprocessor Class Description SecurityAnalysisConfig Configuration for aSecurityAnalysis
.SecurityAnalysisInput Input data/configuration for aSecurityAnalysis
computation. -
Classes in com.powsybl.security used by com.powsybl.security.results Class Description LimitViolation A generic representation of a violation of a network equipment security limit.LimitViolationsResult PostContingencyComputationStatus