Fig. 11
From: Method for detection of unsafe actions in power field based on edge computing architecture

Object detection results
Advances, Systems and Applications
From: Method for detection of unsafe actions in power field based on edge computing architecture
Object detection results