Fig. 11From: Method for detection of unsafe actions in power field based on edge computing architectureObject detection resultsBack to article page