Fig. 4From: Method for detection of unsafe actions in power field based on edge computing architectureThe working principle framework of the whole systemBack to article page