摘要:
A multi-pass printing apparatus and a method thereof are provided. The print data is divided into multiple passes of print data. Each of the print passes is printed according to different delay position signals, such that a complete print output is achieved. Each pass of the print data to be printed corresponds to multiple pixels, and the pixels corresponding to each pass of print data to be printed are obtained by a complementary mask method, or by classifying the pixels with a same remainder got by dividing the horizontal positions of the print data with the number of the M passes into a same group.
摘要:
A multi-pass printing apparatus and a method thereof are provided. The print data is divided into multiple passes of print data. Each of the print passes is printed according to different delay position signals, such that a complete print output is achieved. Each pass of the print data to be printed corresponds to multiple pixels, and the pixels corresponding to each pass of print data to be printed are obtained by a complementary mask method, or by classifying the pixels with a same remainder got by dividing the horizontal positions of the print data with the number of the M passes into a same group.
摘要:
An image processing mechanism combines the halftone method and image enhancement technique for processing halftone and improving image performance. The mechanism includes an image input module, an image enhancement module and a halftone module. The image input module sends the original image data to the image enhancement module to enhance the image by filtering. The halftone module processes the enhanced image data by the algorithm of error diffusion. It combines two different processes into one mechanism to simplify the hardware architecture and to decrease the usage of memory.
摘要:
A method and a device are used to generate print data of any resolutions based on ink volume from the original print data. The print data in the form of halftoned levels are first transferred to the ink image according to the relation between halftone level and drop number obtained by the experiment of ink control. Then, the ink image of original resolution is converted to the ink image of desired resolution by the concept of conservation ink volume per pixel where the amount of ink drops in the unit area stays coherent in the conversion. Finally, each drop number of the converted ink image is transferred to the corresponding halftone level to generate the printing data that can be accepted by the printing device.
摘要:
A method and a device are used to generate print data of any resolutions based on ink volume from the original print data. The print data in the form of halftoned levels are first transferred to the ink image according to the relation between halftone level and drop number obtained by the experiment of ink control. Then, the ink image of original resolution is converted to the ink image of desired resolution by the concept of conservation ink volume per pixel where the amount of ink drops in the unit area stays coherent in the conversion. Finally, each drop number of the converted ink image is transferred to the corresponding halftone level to generate the printing data that can be accepted by the printing device.
摘要:
Methods, software tools and systems for analyzing software applications, e.g., Web applications, are described. A software application to be analyzed is transformed into an abstract representation which preserves its information flow properties. The abstract interpretation is evaluated to identify vulnerabilities using, for example, type qualifiers to associate security levels with variables and/or functions in the application being analyzed and typestate checking. Runtime guards are inserted into the application to secure identified vulnerabilities.
摘要:
Methods, software tools and systems for analyzing software applications, e.g., Web applications, are described. A software application to be analyzed is transformed into an abstract representation which preserves its information flow properties. The abstract interpretation is evaluated to identify vulnerabilities using, for example, type qualifiers to associate security levels with variables and/or functions in the application being analyzed and typestate checking. Runtime guards are inserted into the application to secure identified vulnerabilities.
摘要:
Methods, software tools and systems for analyzing software applications, e.g., Web applications, are described. A software application to be analyzed is transformed into an abstract representation which preserves its information flow properties. The abstract interpretation is evaluated to identify vulnerabilities using, for example, type qualifiers to associate security levels with variables and/or functions in the application being analyzed and typestate checking. Runtime guards are inserted into the application to secure identified vulnerabilities.
摘要:
Methods, software tools and systems for analyzing software applications, e.g., Web applications, are described. A software application to be analyzed is transformed into an abstract representation which preserves its information flow properties. The abstract interpretation is evaluated to identify vulnerabilities using, for example, type qualifiers to associate security levels with variables and/or functions in the application being analyzed and typestate checking. Runtime guards are inserted into the application to secure identified vulnerabilities.