Fig. 6
From: Method for detection of unsafe actions in power field based on edge computing architecture

The structure and parameter settings of the action recognition model
Advances, Systems and Applications
From: Method for detection of unsafe actions in power field based on edge computing architecture
The structure and parameter settings of the action recognition model