Fig. 5From: Method for detection of unsafe actions in power field based on edge computing architectureAction recognition modelBack to article page