Fig. 8
From: Method for detection of unsafe actions in power field based on edge computing architecture

Three execution modes. a Detection at the Terminal (b) Detection in Edge Computing (c) Detection in Central Cloud
Advances, Systems and Applications
From: Method for detection of unsafe actions in power field based on edge computing architecture
Three execution modes. a Detection at the Terminal (b) Detection in Edge Computing (c) Detection in Central Cloud