140 Chapter 5: Programming commands

Description: If a document is present in the imager that has already been imaged, it is ejected out the imager back. When a document is presented at the appropriate entry point, scan and save the front and back image into the image buffer. Assign the next free FileIndex numbers so that both sides can be identified for subsequent image retrieval. This command waits for a document to be placed at an image source insertion position. A front entry will leave the document in a position ready for ejection; a back slip entry will be left ready for ejection or backup to a slip print position. Entry from the slip position will wait and clamp an inserted document (if not already clamped) and scan and also MICR read the document.

After scanning, possibly reorient then process into the current format and save all firmware set tags. If transmitting then also save the current application set identifying properties (tags) to the document TIFF image structure. Transmit status to the command issuing port, with the TIFF file optionally appended as specified by m. If transmission has been configured to use the 2nd port, then both status and the TIFF file will be sent to that port.

If a document is not already present at the designated imager insertion point, the capture operation will wait for the configured slip waiting time (only real-time commands are accepted while waiting; use the standard Cancel Slip Wait command 10 05 03 to cancel this wait). If a document is successfully captured, its storage updates the on-going average size for the capture modes used. This average is then used to determine the amount of free image storage.

Transmit Image

Hexadecimal: 1D B9 s t m nL nH pL pH

Parameters: s specifies the sides to transmit: 0 = both (default), 1 = bottom only, 2 = top only. t = 0 do not mark the buffer image space free upon successful transmission, default; t = 1 mark the buffer space free upon successful image transmission.

Transmission creates the image format specified by m as follows:

Value

Definition

 

 

0

Reserved, value is treated as no change from previous format

 

 

1

LZW (lossless, also used in GIF) compressed grayscale TIFF

 

 

2

CCITT T.6 compression (binary) TIFF

 

 

3

Reserved for JPEG (lossy)

4

Binarized, No Compression (in TIFF Wrapper)

6

16 level (4 bit) TIFF packed bytes format (1/2 size of raw, ignores R parameter drop bits)

 

 

7

No compression, raw (256 level) grayscale in TIFF format, default

 

 

n is the FileIndex of the image to be returned (if only one of the two images is desired, it corrects the supplied file index +- 1). n = 0 transmits the latest scan.

p is a 2-byte length of the blocking factor to use if transmitting on an RS232 port, and is ignored if imaging is configured (default) to use the high speed port. On RS232 the printer sends P bytes and waits for either an ACK byte = transmit next, a NAK byte = retransmit previous, CAN terminates transmission. p = 0 says use the default size of 1024 bytes, = FFFF use no blocking (i.e. transmit the M designated images in the configured formats). If blocking, the last block is transmitted at its actual remnant size.

A776 (B780) Programming Guide

A776-PG00001 C 12/09

Page 152
Image 152
Cognitive Solutions B780 Transmit Image, LZW lossless, also used in GIF compressed grayscale Tiff, Reserved for Jpeg lossy

B780, A776 specifications

Cognitive Solutions A776 is an advanced technology platform designed to enhance decision-making processes through the application of artificial intelligence and cognitive computing. This state-of-the-art solution seamlessly integrates multiple technologies to optimize business operations and drive innovation across various sectors, including finance, healthcare, and manufacturing.

One of the main features of A776 is its robust data processing capabilities. Leveraging powerful machine learning algorithms, the platform can analyze vast amounts of data in real-time, identifying patterns and insights that would otherwise be overlooked. This enables organizations to make informed decisions based on actionable intelligence, significantly improving efficiency and productivity.

Another key characteristic of the A776 system is its natural language processing (NLP) capability. This feature allows the platform to understand and interpret human language, making it easier for users to interact with the system and obtain valuable insights. By integrating NLP, Cognitive Solutions A776 can provide intuitive user experiences, enabling workforce members to query data using everyday language rather than complex coding skills.

The A776 is also built on a flexible architecture that supports seamless integration with existing IT ecosystems. This interoperability allows organizations to harness their current data sources while taking advantage of the innovative features offered by A776. The platform’s API support enables smooth connections with third-party tools, enhancing collaboration and expanding its range of applications.

Security is a major focus of the Cognitive Solutions A776. The platform is equipped with advanced encryption protocols and compliance measures to ensure that sensitive data is protected against breaches and unauthorized access. This commitment to security helps businesses maintain customer trust and safeguard their competitive advantage.

Scalability is another defining feature of the A776. As businesses grow and evolve, the platform can be easily adapted to meet changing demands. Whether a small startup or a large enterprise, organizations can scale their cognitive solutions according to their operational needs.

Furthermore, the Cognitive Solutions A776 is designed with user accessibility in mind. The interface features customizable dashboards that provide a clear overview of insights and performance metrics, enabling users at all levels to harness the power of cognitive computing without requiring extensive training or technical expertise.

In conclusion, Cognitive Solutions A776 is a cutting-edge platform that offers a range of features, including advanced data processing, natural language processing, robust security measures, and user-friendly design. Its flexible architecture allows it to integrate seamlessly with existing systems, making it an indispensable tool for organizations looking to leverage artificial intelligence in their decision-making processes.