%PDF-1.7
%
1 0 obj
<>stream
application/pdfIntuitive Traffic Regulation Breach Detection using Deep LearningJayandhi.G , Jaya Chithra P , Mansi Milan Dave , Rajasri K, Kruthika S
A-PDF Watermark 4.7.6 ; modified using iTextSharp 4.1.6 by 1T3XTijert
endstream
endobj
2 0 obj
<>/Lang(en-US)/Pages 3 0 R/Metadata 1 0 R/Type/Catalog>>
endobj
3 0 obj
<>
endobj
4 0 obj
<>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI]>>/Contents[29 0 R 30 0 R 31 0 R 32 0 R 33 0 R 34 0 R 35 0 R 36 0 R 37 0 R 38 0 R 39 0 R 40 0 R 41 0 R 42 0 R 43 0 R 44 0 R 45 0 R 46 0 R 47 0 R 48 0 R 49 0 R 50 0 R 51 0 R 52 0 R 53 0 R 54 0 R 55 0 R 56 0 R 57 0 R 58 0 R 59 0 R 60 0 R 61 0 R 62 0 R]/Group<>/Annots[63 0 R 64 0 R 65 0 R]/Type/Page/Tabs/S>>
endobj
40 0 obj
<>stream
x][s6~wvfb r+*NDljksGbL](~ &pdȼ ht}&Mx2J"zE'IyDDiRFdqGW'?=:O>E\FO0]4XXJ.;lwOw꼽|bq.U^mV'M\-t=}=}k%WJ.cOM^Vmjr㝷eV8)"Ŋ8|OUu}[Wn'2jX/^DǞ~#u
eE>HEK N +]#HD:(S*γQGbGbudlQ'5poN I>m#/qIIҸOf̀,YljAh7W@JJLjGZ(DbH%#UTDY*t/A7Z!;!%OD@58Xڝϖjq T>wz&N9Ԫ*s*=7$ljhG{\$c'kȩ
=C8MiMj~zf"Nөqlg6=HLt?S9P!"z7b@',.D'>O싹ɟPSÞ$Se '"BB`s#S1^ѩ7ar!Ll
(w@iph{hO|S@:q-
2z3O4d]/ClRƮYz|8K<<{NkUt4{'\sy15YO#4iE̳(U<ŧBL[2LNtb/he2fgg
ijA+42 Ach`xZDvUԏR,SZ@/=\`LaRx!y<9Yi>ТM?\HA+&aϬğ ӭ8
X X;Ftdyd|QqΦ5+5eyΉ[xϣέǬğg{ޗnX<Ȥ[ |m-HY V/g\-I@"f>G졾<Ԥ~@j?/D1@(;: p:X!px: px pOAl,x$$$¼
%j 9Ls:h\Xr9:'zbt3-ޟb$i!-JP?ڼo&p8_5@HAxXX+LSl^aaHmWutK۫
>knv-TISuI]8C.bd¼l%ּR{e_#)hy9-"BV_>d̝/83sf/8~d~h #PMf7auc2$a9o*+?}|̚_RnbvU
t0O]PX{aɜSI/
mn- Ըp
,K5Sfą2'OTf\$BA)*\G<$jf"/ϧ-aY dT{ak4s%x[;f8"ϑi`F^GF8Ƃ8
ƯEZ'L**/> Jl>WNHbN\d$HobiןkFByDe9fY2XW.|A6 syT;jB9XSlc>0Pi@}6I >ds#vhzx6^bADpܐ"P8s27%i.7q1HuߦuewZ5u=a*Q8cK.B2:p`Led_Vż1*XEJ7OӺs\J4[:v,thys3r]V@cp艜4bɩb0+:8ؤ^i_l;YvRݎW[,1$AAzhSlRЊO@iˮSs02ka(8Ɓ6!5~(Mk
?ڇ
}ۺen(T#2I'ow=A|ڮ
ًX@("XDsyՉ+:vE'SڑrPNr=02D9iu&ՠ|/JY#%d%&MYYtRuEUP@uC`
xp~WsiѬ`6Ӻib=l