Chapter 5: Programming commands  141

Return: This uses the message structure/protocol transmission format that matches Scan & Transmit except for the command ID code:

Value

Definition

 

 

 

 

1D

Command return indicator

 

 

 

49

Image Scanner

 

 

 

 

B9

Imaging function = transmit

s

Standard imaging status

 

Decimal

Meaning

 

0

OK

 

 

 

 

1

Jam detected

 

 

 

 

2

Wait for scan document cancelled

 

 

 

 

3

Imager cover open

 

7

Unrecoverable hardware error

 

8

No stored document

 

9

Bottom side only

 

 

 

 

10

Top side only

 

 

 

 

11

Internal interface timeout error

 

 

 

 

12

Internal interface other error

 

16

No bottom image

 

17

No top image

 

18

Unsupported format

 

 

 

 

19

Tag block full

 

 

 

m

Scanning command entry point used: 0 = no outstanding scan, 1 = slip entry, 2 =

 

top entry

 

 

 

n

Sensors currently covered: none = 0 value

 

 

 

Bit 0 =1: rear image sensor covered

 

 

 

Bit 1 =1: front image sensor covered

 

Bit 2 =1: image cover open

 

Bit 3=1: casette cover open

 

Bit 5=1: upper slip sensor covered

 

 

 

Bit 6=1: lower slip sensor covered

 

 

pLpH

The File Index to be used by the next scan

 

 

rLrH

Remaining space count of typical document scans to fit in image buffer free space

4 bytes

Scanned image TIFF structure length

TIFF

Structure containing the tags and images

Description: This sends back the images at index n in a TIFF structure using the currently configured image format.

Transmission of the image follows the command return header. If only a top (or bottom) scan image is requested then its TIFF tags will contain the same application set tags as for the other side image, with the only difference being the 297 tag indicating side and tag 65000 will have its true File Index value.

The TIFF structure always returns all automatic Tags, and should usually include a UserTag and FileID that the host may have defined and later set to be associated with the image. If n is 0 (current image) and no Attach Scan Identifying Tags command was given after the scan, then the image file will be formed as if the attachment command had been given with 0 application set tags.

Continued . . .

A776-PG00001 C 12/09

A776 (B780) Programming Guide

Page 153
Image 153
Cognitive Solutions A776, B780 manual Bytes Scanned image Tiff structure length, Structure containing the tags and images

B780, A776 specifications

Cognitive Solutions A776 is an advanced technology platform designed to enhance decision-making processes through the application of artificial intelligence and cognitive computing. This state-of-the-art solution seamlessly integrates multiple technologies to optimize business operations and drive innovation across various sectors, including finance, healthcare, and manufacturing.

One of the main features of A776 is its robust data processing capabilities. Leveraging powerful machine learning algorithms, the platform can analyze vast amounts of data in real-time, identifying patterns and insights that would otherwise be overlooked. This enables organizations to make informed decisions based on actionable intelligence, significantly improving efficiency and productivity.

Another key characteristic of the A776 system is its natural language processing (NLP) capability. This feature allows the platform to understand and interpret human language, making it easier for users to interact with the system and obtain valuable insights. By integrating NLP, Cognitive Solutions A776 can provide intuitive user experiences, enabling workforce members to query data using everyday language rather than complex coding skills.

The A776 is also built on a flexible architecture that supports seamless integration with existing IT ecosystems. This interoperability allows organizations to harness their current data sources while taking advantage of the innovative features offered by A776. The platform’s API support enables smooth connections with third-party tools, enhancing collaboration and expanding its range of applications.

Security is a major focus of the Cognitive Solutions A776. The platform is equipped with advanced encryption protocols and compliance measures to ensure that sensitive data is protected against breaches and unauthorized access. This commitment to security helps businesses maintain customer trust and safeguard their competitive advantage.

Scalability is another defining feature of the A776. As businesses grow and evolve, the platform can be easily adapted to meet changing demands. Whether a small startup or a large enterprise, organizations can scale their cognitive solutions according to their operational needs.

Furthermore, the Cognitive Solutions A776 is designed with user accessibility in mind. The interface features customizable dashboards that provide a clear overview of insights and performance metrics, enabling users at all levels to harness the power of cognitive computing without requiring extensive training or technical expertise.

In conclusion, Cognitive Solutions A776 is a cutting-edge platform that offers a range of features, including advanced data processing, natural language processing, robust security measures, and user-friendly design. Its flexible architecture allows it to integrate seamlessly with existing systems, making it an indispensable tool for organizations looking to leverage artificial intelligence in their decision-making processes.