Today will test with g64 p0.05. I want to know if theres rotary (A)
linear(X) blending implemented.
By the nature of spatial motion i see dificult to do a code that blend 3
joints simultaneously, but the one in emc2 seems to do in XYZ.
Regards
Rick

2012/8/22 Dave <[email protected]>

> Yes, but the G64 with the P0.05 does work very well blending at high
> speeds at least with the X-Y axes..
>
> If you read the manual page I cited, the G64 alone does not invoke the
> naive cam detector and it is mentioned that just using the G64 alone
> invoke the old code.
>
> Don't assume that just because G64 is shown in the sample code that is
> the best setup for your machine.  Although the docs are really good,
> they aren't that good!
>
> Dave
>
> On 8/22/2012 4:09 PM, Ricardo Moscoloni wrote:
> > Yes, so far no results, im away from the machine until tomorrow, will
> give
> > another try, anyway a g64 without p parameter is in the sample code.
> > regards
> > rick
> >
> >
> > 2012/8/22 Dave<[email protected]>
> >
> >
> >> Have you tried G64 P.05 or something similar??
> >>
> >> http://linuxcnc.org/docs/html/common/User_Concepts.html
> >>
> >> Dave
> >>
> >> On 8/22/2012 12:52 PM, Ricardo Moscoloni wrote:
> >>
> >>> Hi andy:
> >>>
> >>> I have change A with Y, interpolation and blending goes really well,
> >>>
> >> with Y
> >>
> >>> axis almost spining at a constant rate. But have to remove all the F
> >>>
> >> words
> >>
> >>> by only at the beginning and change to units/min the feedrate mode, for
> >>> this. (i asume units dont correlate any more to the actual movement)
> >>> Seems that my original  gcode´s F´s (inverse time) doesnt have a CV
> >>> continuity or the EMC2 doesnt like that!?
> >>> I dont have look at the code, but theres a chance that blending isnt
> >>> working nor implemented, or something else. I think nature of the
> spatial
> >>> move come into this
> >>> If you will run the code for testing, remember to put in  AXIS GUI
> >>>
> >> display
> >>
> >>> section GEOMETRY = AXYBC to plot the actual geometry (surely you
> already
> >>> know this!)
> >>> Do you know where to look at the source code?
> >>> I will look for the hal offset, surely i will find a use for  that at
> >>>
> >> time.
> >>
> >>> Regards
> >>> Rick
> >>>
> >>>
> >>>
> >>> 2012/8/22 andy pugh<[email protected]>
> >>>
> >>>
> >>>
> >>>> On 22 August 2012 17:51, Ricardo Moscoloni<[email protected]>
> >>>>
> >>   wrote:
> >>
> >>>>
> >>>>> Is an option, but the machine has more joints, like B and C,
> >>>>>
> >> coordinated
> >>
> >>>>> too, for more complex geometries, varying winding angles, tape width,
> >>>>> diferent layups patterns, etc,
> >>>>>
> >>>>>
> >>>> OK, in that case you might want to consider using the HAL "Offset"
> >>>> function for slaved motions. That allows you to move the axes
> >>>> normally, but to do wierd things with them. (I have used such a system
> >>>> to bore hexagonal holes using a lathe, for example).
> >>>>
> >>>> I am away from my machines until the weekend, so can't check out your
> >>>> code, but I think that the underlying problem might be that the rotary
> >>>> axes are not part of the blending algorithm. (this is a guess, as I
> >>>> haven't checked).
> >>>>
> >>>> You could try using Y as your rotary axis. As far as HAL is concerned
> >>>> they are all just stepgens..
> >>>>
> >>>>
> >>>> --
> >>>> atp
> >>>> If you can't fix it, you don't own it.
> >>>> http://www.ifixit.com/Manifesto
> >>>>
> >>>>
> >>>>
> >>>>
> >>
> ------------------------------------------------------------------------------
> >>
> >>>> Live Security Virtual Conference
> >>>> Exclusive live event will cover all the ways today's security and
> >>>> threat landscape has changed and how IT managers can respond.
> >>>>
> >> Discussions
> >>
> >>>> will include endpoint security, mobile security and the latest in
> >>>>
> >> malware
> >>
> >>>> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> >>>> _______________________________________________
> >>>> Emc-users mailing list
> >>>> [email protected]
> >>>> https://lists.sourceforge.net/lists/listinfo/emc-users
> >>>>
> >>>>
> >>>>
> >>>
> >>
> ------------------------------------------------------------------------------
> >>
> >>> Live Security Virtual Conference
> >>> Exclusive live event will cover all the ways today's security and
> >>> threat landscape has changed and how IT managers can respond.
> Discussions
> >>> will include endpoint security, mobile security and the latest in
> malware
> >>> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> >>> _______________________________________________
> >>> Emc-users mailing list
> >>> [email protected]
> >>> https://lists.sourceforge.net/lists/listinfo/emc-users
> >>>
> >>>
> >>>
> >>
> >>
> >>
> ------------------------------------------------------------------------------
> >> Live Security Virtual Conference
> >> Exclusive live event will cover all the ways today's security and
> >> threat landscape has changed and how IT managers can respond.
> Discussions
> >> will include endpoint security, mobile security and the latest in
> malware
> >> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> >> _______________________________________________
> >> Emc-users mailing list
> >> [email protected]
> >> https://lists.sourceforge.net/lists/listinfo/emc-users
> >>
> >>
> >
> ------------------------------------------------------------------------------
> > Live Security Virtual Conference
> > Exclusive live event will cover all the ways today's security and
> > threat landscape has changed and how IT managers can respond. Discussions
> > will include endpoint security, mobile security and the latest in malware
> > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> > _______________________________________________
> > Emc-users mailing list
> > [email protected]
> > https://lists.sourceforge.net/lists/listinfo/emc-users
> >
> >
>
>
>
> ------------------------------------------------------------------------------
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and
> threat landscape has changed and how IT managers can respond. Discussions
> will include endpoint security, mobile security and the latest in malware
> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> _______________________________________________
> Emc-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/emc-users
>
------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Emc-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/emc-users

Reply via email to