Fig. 2From: Method for detection of unsafe actions in power field based on edge computing architectureNetwork architectureBack to article page