Solved

Joe Campbell's CRC Algorithm

Posted on 2002-06-24
7
455 Views
Last Modified: 2012-08-14
Hi All,

Is there any Campbell's CRC Algorithm in Visual Basic?

Regards,
Iskandar
0
Comment
Question by:karnaini
7 Comments
 
LVL 1

Expert Comment

by:SiM99
Comment Utility
I once tried converting a C version of the CRC algorithm to VB... mind if i watch this Q? :)
0
 
LVL 43

Accepted Solution

by:
TimCottee earned 100 total points
Comment Utility
http://www.freevbcode.com/ShowCode.Asp?ID=2755

Is a VB example of CRC calculation with links etc.
0
 
LVL 45

Expert Comment

by:aikimark
Comment Utility
Iskandar,

I'm familiar with CRC16 and CRC32 algorithms and their VB implementations.  What is Campbell's CRC?
0
What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

 

Author Comment

by:karnaini
Comment Utility
Hi,

The algorithm is taken from the book "C Programmer's Guide to Serial Communication" by Joe Campbell.

Regards,
Iskandar
0
 
LVL 45

Expert Comment

by:aikimark
Comment Utility
0
 
LVL 49

Expert Comment

by:DanRollins
Comment Utility
Hi karnaini,
It appears that you have forgotten this question. I will ask Community Support to close it unless you finalize it within 7 days. I will ask a Community Support Moderator to:

    Accept TimCottee's comment(s) as an answer.

karnaini, if you think your question was not answered at all or if you need help, just post a new comment here; Community Support will help you.  DO NOT accept this comment as an answer.

EXPERTS: If you disagree with that recommendation, please post an explanatory comment.
==========
DanRollins -- EE database cleanup volunteer
0
 
LVL 5

Expert Comment

by:Netminder
Comment Utility
Per recommendation, force-accepted.

Netminder
EE Admin
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

You can of course define an array to hold data that is of a particular type like an array of Strings to hold customer names or an array of Doubles to hold customer sales, but what do you do if you want to coordinate that data? This article describes…
If you need to start windows update installation remotely or as a scheduled task you will find this very helpful.
As developers, we are not limited to the functions provided by the VBA language. In addition, we can call the functions that are part of the Windows operating system. These functions are part of the Windows API (Application Programming Interface). U…
Show developers how to use a criteria form to limit the data that appears on an Access report. It is a common requirement that users can specify the criteria for a report at runtime. The easiest way to accomplish this is using a criteria form that a…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now