Fig. 3From: Method for detection of unsafe actions in power field based on edge computing architectureModule function deploymentBack to article page