Fig. 8From: Method for detection of unsafe actions in power field based on edge computing architectureThree execution modes. a Detection at the Terminal (b) Detection in Edge Computing (c) Detection in Central CloudBack to article page