Advances, Systems and Applications
From: Method for detection of unsafe actions in power field based on edge computing architecture
Mode | Transmission time (s) | Calculation time (s) | Total time (s) |
---|---|---|---|
Detection at the Terminal | 0 | 17.305 1 | 7.305 |
Detection in Edge Computing | 0.390 | 1.619 | 2.009 |
Detection in Central Cloud | 3.386 | 5.899 | 9.285773 |