Fig. 7
From: Method for detection of unsafe actions in power field based on edge computing architecture

Yolov3 equipment detection model model
Advances, Systems and Applications
From: Method for detection of unsafe actions in power field based on edge computing architecture
Yolov3 equipment detection model model