Encoding The Meaning
In Cryptography *
Message is protected through the use of codes; only those for whom the message is intended can read and process it.
It is the method by which information is converted into secret code that hides the information's true meaning.
It is the way of converting an encrypted message back to its original (readable) state.
Can we hide and interpret messages within the objects we design? How do we encode meaning through tangible forms?
Utilizing 3d modeling and parametric design functions to create machine tool paths
Convert the 3d line tool path into gcode through a c# algorithm
Upload the g-code into the 3d printer and let the machine do its magic!
Machine Tuning/Form Experimentation
Before finalizing the overall idea of the encrypting system, we first experimented with the machine settings (print speed, extruder temperature, start position...) and translating unique 3d forms into g-code.
This waffle-like geometry allowed us to experiment with layer height, inclination angles, and retraction.
One challenge we faced was the over-extrusion of filaments when the nozzle moves to a new location. Therefore, we adjusted the retraction distance and speed to avoid stringing.
2. Circular Bridge Test
We conducted bridge test by printing across a circle in mid air. To achieve the optimum bridging without stringing or sagging, we adjusted nozzle temperature, fan speed, extrusion rate, and printing speed.
We offset every other points and created attractor points to create this squiggly pattern. To avoid sagging, we adjusted fan speed and travel speed.
3. Squiggly Line
4. Weave Pattern
We experimented with the grasshopper components by trying out different weave patterns among control points.
Part 1: Encoding The Message
Each letter can be embodied through a unique weaving pattern along a circular periphery. The circular wall provides support for each layer of the shape to build upon one another. This is an ongoing investigation.
Part 2: Encoding Sound
We decided to embed sounds through this squiggly geometry. By assigning musical cords to specific positions along the circle, we were able to map the notes along the geometry of the cylinder. The points that corresponds to musical notes are offset to longer distance than the rest, thus creating an encryption of a song.
The c# algorithm contains a library of music notes being input as strings, each note corresponds to a specific number of points (evenly spaced) being offset farther from the center on the layer. Therefore, by inputting a list of strings, the algorithm would create a distinct 3D geometry with each layer representing a distinct note.
The c# further translates a set of 3D tool path curves into G-code commands. The algorithm also adds a start and ending G-code component to set up the 3d printer.
In order to maximize printing efficiency and avoid sagging, we employed 2 different feed rates to print the circle and the waved lines. We also experimented with different offset distance for the wave to test max threshold for sagging
Part 3: Encoding Image
When working with images, we used pixels as attractors to modify the height of the waves' peaks to create interesting results.