On Wednesday, May 30, 2012 12:06:22 PM John Thornton did opine: > A subroutine using a coordinate system rotate might be the simplest > method. Establish the center of your disk as X and Y0 and do a G10 L2 R > between slots. Something like the following partly tested code should > do the trick.
I think I'm following this but let me ask some questions. > Position tool at safe point > #<current-r> = 0 I'd assume this starts at zero, where the current code starts at 360 & counts down by 360/slots > G10 L2 P1 R#<current-r> (just to make sure in case of an abort) Yup. > o100 repeat [45] And this 45 is the number of slots? Kewl. > Position tool at start of cut > Slot cutting Which is the calculate the cut and do it subroutine I assume? > Position tool at safe Z > G0 X0 Y0 Once we are at the cutting position, the above seems like a time waster. > #<current-r> = [#<current-r> + 8] And this '8' is actually the 360/slots? Kewl. > G10 L2 P1 R#<current-r> > o100 endrepeat > M2 This would appear to be a rather lot of time running back and forth between the X0Y0 position and the center of each slot. Or am I seeing ghosts? To ease the stress on the bit, each incarnation of the call moves to the geometric center of the slot with z at the depth of the previous cut, then ramps from there down to the depth of the current cut at the inner, CW corner of the slot. Then runs around the slot and goes back to SafeZ. It would definitely be an all in one solution though, printed for incorporation into what I have now as I believe it will nicely simplify things, many thanks John. Cheers, Gene -- "There are four boxes to be used in defense of liberty: soap, ballot, jury, and ammo. Please use in that order." -Ed Howdershelt (Author) My web page: <http://coyoteden.dyndns-free.com:85/gene> Only fools are quoted. -- Anonymous ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ Emc-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/emc-users
