Fig. 7From: Method for detection of unsafe actions in power field based on edge computing architectureYolov3 equipment detection model modelBack to article page