Fig. 6From: Method for detection of unsafe actions in power field based on edge computing architectureThe structure and parameter settings of the action recognition modelBack to article page