Fig. 8
From: Method for detection of unsafe actions in power field based on edge computing architecture
![Fig. 8](http://media.springernature.com/full/springer-static/image/art%3A10.1186%2Fs13677-021-00234-w/MediaObjects/13677_2021_234_Fig8_HTML.png)
Three execution modes. a Detection at the Terminal (b) Detection in Edge Computing (c) Detection in Central Cloud
Advances, Systems and Applications
From: Method for detection of unsafe actions in power field based on edge computing architecture
Three execution modes. a Detection at the Terminal (b) Detection in Edge Computing (c) Detection in Central Cloud