Fig. 2
From: Method for detection of unsafe actions in power field based on edge computing architecture
![Fig. 2](http://media.springernature.com/full/springer-static/image/art%3A10.1186%2Fs13677-021-00234-w/MediaObjects/13677_2021_234_Fig2_HTML.png)
Network architecture
Advances, Systems and Applications
From: Method for detection of unsafe actions in power field based on edge computing architecture
Network architecture