Fig. 10From: Method for detection of unsafe actions in power field based on edge computing architectureSafe and unsafe actionsBack to article page