Fig. 5
From: Method for detection of unsafe actions in power field based on edge computing architecture

Action recognition model
Advances, Systems and Applications
From: Method for detection of unsafe actions in power field based on edge computing architecture
Action recognition model