On Friday, June 01, 2012 08:50:05 AM John Thornton did opine:

> Gene,
> 
> I used debug to capture the path of the first slot and put it into my
> subroutine. Run the following in sim and see what you think. Even at F2
> and 0.001" DOC one slot only takes a smidgen over 2 minutes to cut in my
> sim.
> 
> F2
> T1 M6 G43
> #<z-final> = -0.025
> #<z-step>  = 0.001
> G0 X1.1 Y0 Z0.05
> #<current-r> = 0
> G10 L2 P1 R#<current-r>
> o100 repeat [60]
>    G0 X1.15 Y0
>    G1 X1.093745 Y-0.003410 Z0
>    o110 while [#5422 GT #<z-final>]
>      G1 X1.093745 Y-0.003410 Z[#5422 - #<z-step>]
>      G3 X1.093747 Y0.002728 R1.09375
>      G1 X1.183744 Y0.003611
>      G2 X1.183744 Y-0.003611 R1.18375
>      G1 X1.093747 Y-0.002728
>    o110 endwhile
> G0 Z0.05
> X0 Y0
> #<current-r> = [#<current-r> + 6]
> G10 L2 P1 R#<current-r>
> o100 endrepeat
> M2
> 
Printed.  I'll likely put in some named vars if I use it, but I'll give it 
a shot as is after the current one is finished.

Thanks a bunch, John.

Cheers, Gene
-- 
"There are four boxes to be used in defense of liberty:
 soap, ballot, jury, and ammo. Please use in that order."
-Ed Howdershelt (Author)
My web page: <http://coyoteden.dyndns-free.com:85/gene>
Absolutely nothing should be concluded from these figures except that
no conclusion can be drawn from them.
        -- Joseph L. Brothers, Linux/PowerPC Project)

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Emc-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/emc-users

Reply via email to