Browse
Assessing Learning
Posted on: #iteachmsu
ASSESSING LEARNING
Department of Haematology
Department of Haematology
Notes
Full blood counts are performed on automated equipment and provide haemoglobin concentration, red cell indices, white cell count (with a differential count) and platelet count.
The presence of abnormal white cell and red cell morphology is flagged by the analysers.
Blood films may be inspected to confirm and interpret abnormalities identified by the cell counter, or to look for certain specific haematological abnormalities.
Grossly abnormal FBC results and abnormal blood films will be phoned through to the requestor.
There is no need to request a blood film to obtain a differential white count. It is, however, important that clinical details are provided to allow the laboratory to decide whether a blood film, in addition to the automated analysis, is required.
Under some circumstances a differential is not routinely performed, e.g. pre-op, post-op, antenatal and postnatal requests.
Full Blood Counts are performed at CGH and GRH
See also: Reticulocyte Count
The FBC comprises the following tests
Standard
Haemoglobin (Hb)
White Blood Count (WBC)
Platelet Count (Plt)
Red Cell Count (RBC)
Haematocrit (HCT)
Mean Cell Volume - Red cell (MCV)
Mean Cell Haemoglobin (MCH)
Differential White Cell Count (where applicable)
Neutrophils
Lymphocytes
Monocytes
Eosinophils
Basophils
And if appropriate
Blood Film
Sample Requirements
2ml or 4ml EDTA sample or a Paediatric 1ml EDTA sample.
Sample Storage and Retention
Pre analysis storage: do not store, send to laboratory within 4 hours.
Sample retention by lab: EDTA samples are retained for a minimum of 48 hours at 2-10°C
Transport of samples may affect sample viability, i.e. FBC results will degenerate if exposed to high temperatures, such as prolonged transportation in a hot car in summer.
This test can be added on to a previous request as long as there is sufficient sample remaining and the sample is less than 24 hours old.
Turnaround Times
Clinical emergency: 30 mins
Other urgent sample: 60 mins
Routine: within 2 hours
Reference Ranges
If references ranges are required for paediatric patients please contact the laboratory for these.
Parameter Patient Reference Range Units Haemoglobin Adult Male 130 - 180 g/L Adult Female 115 - 165 g/L Red Cell Count Adult Male 4.50 - 6.50 x10^12/L Adult Female 3.80 - 5.80 x10^12/L Haematocrit Adult Male 0.40 - 0.54 L/L Adult Female 0.37 - 0.47 L/L Mean Cell Volume Adult 80 - 100 fL Mean Cell Haemoglobin Adult 27 - 32 pg White Cell Count Adult 3.6 - 11.0 x10^9/L Neutrophils Adult 1.8 - 7.5 x10^9/L Lymphocytes Adult 1.0 - 4.0 x10^9/L Monocytes Adult 0.2 - 0.8 x10^9/L Eosinophils Adult 0.1 - 0.4 x10^9/L Basophils Adult 0.02 - 0.10 x10^9/L Platelet Count Adult 140 - 400 x10^9/L
Notes
Full blood counts are performed on automated equipment and provide haemoglobin concentration, red cell indices, white cell count (with a differential count) and platelet count.
The presence of abnormal white cell and red cell morphology is flagged by the analysers.
Blood films may be inspected to confirm and interpret abnormalities identified by the cell counter, or to look for certain specific haematological abnormalities.
Grossly abnormal FBC results and abnormal blood films will be phoned through to the requestor.
There is no need to request a blood film to obtain a differential white count. It is, however, important that clinical details are provided to allow the laboratory to decide whether a blood film, in addition to the automated analysis, is required.
Under some circumstances a differential is not routinely performed, e.g. pre-op, post-op, antenatal and postnatal requests.
Full Blood Counts are performed at CGH and GRH
See also: Reticulocyte Count
The FBC comprises the following tests
Standard
Haemoglobin (Hb)
White Blood Count (WBC)
Platelet Count (Plt)
Red Cell Count (RBC)
Haematocrit (HCT)
Mean Cell Volume - Red cell (MCV)
Mean Cell Haemoglobin (MCH)
Differential White Cell Count (where applicable)
Neutrophils
Lymphocytes
Monocytes
Eosinophils
Basophils
And if appropriate
Blood Film
Sample Requirements
2ml or 4ml EDTA sample or a Paediatric 1ml EDTA sample.
Sample Storage and Retention
Pre analysis storage: do not store, send to laboratory within 4 hours.
Sample retention by lab: EDTA samples are retained for a minimum of 48 hours at 2-10°C
Transport of samples may affect sample viability, i.e. FBC results will degenerate if exposed to high temperatures, such as prolonged transportation in a hot car in summer.
This test can be added on to a previous request as long as there is sufficient sample remaining and the sample is less than 24 hours old.
Turnaround Times
Clinical emergency: 30 mins
Other urgent sample: 60 mins
Routine: within 2 hours
Reference Ranges
If references ranges are required for paediatric patients please contact the laboratory for these.
Parameter Patient Reference Range Units Haemoglobin Adult Male 130 - 180 g/L Adult Female 115 - 165 g/L Red Cell Count Adult Male 4.50 - 6.50 x10^12/L Adult Female 3.80 - 5.80 x10^12/L Haematocrit Adult Male 0.40 - 0.54 L/L Adult Female 0.37 - 0.47 L/L Mean Cell Volume Adult 80 - 100 fL Mean Cell Haemoglobin Adult 27 - 32 pg White Cell Count Adult 3.6 - 11.0 x10^9/L Neutrophils Adult 1.8 - 7.5 x10^9/L Lymphocytes Adult 1.0 - 4.0 x10^9/L Monocytes Adult 0.2 - 0.8 x10^9/L Eosinophils Adult 0.1 - 0.4 x10^9/L Basophils Adult 0.02 - 0.10 x10^9/L Platelet Count Adult 140 - 400 x10^9/L
Posted by:
Super Admin
Posted on: #iteachmsu
Department of Haematology
Department of Haematology
Notes
Full blood counts are performed on...
Notes
Full blood counts are performed on...
Posted by:
ASSESSING LEARNING
Friday, Sep 8, 2023
Posted on: #iteachmsu
ASSESSING LEARNING
What is Attention Deficit Hyperactivity Disorder?
Classroom Interventions for Attention Deficit/ Hyperactivity Disorder Considerations Packet
Primer text from The College of William & MaryADHD is one of the most commonly diagnosed conditions of children (Centers for DiseaseControl and Prevention, 2015).
In a 2016 Centers for Disease Control and Prevention study, scientists found that 6.1 million children aged 2-17 years living in the U.S. had been diagnosed with attention-deficit/hyperactivity disorder (ADHD), which is similar to previous en
Ages 6-11: Approximately 2.4 million children
Ages 12-17: Approximately 3.3 million children
The diagnostic term attention deficit/hyperactivity disorder (ADHD) refers to individuals who display patterns of inattention, impulsivity, and overactive behavior that interfere with daily functioning (American Psychiatric Association [APA], 2013).
The Diagnostic and Statistical Manual (DSM) V (APA, 2013) criteria for diagnosing ADHD listthree types of ADHD and the accompanying characteristics.
Primer text from The College of William & MaryADHD is one of the most commonly diagnosed conditions of children (Centers for DiseaseControl and Prevention, 2015).
In a 2016 Centers for Disease Control and Prevention study, scientists found that 6.1 million children aged 2-17 years living in the U.S. had been diagnosed with attention-deficit/hyperactivity disorder (ADHD), which is similar to previous en
Ages 6-11: Approximately 2.4 million children
Ages 12-17: Approximately 3.3 million children
The diagnostic term attention deficit/hyperactivity disorder (ADHD) refers to individuals who display patterns of inattention, impulsivity, and overactive behavior that interfere with daily functioning (American Psychiatric Association [APA], 2013).
The Diagnostic and Statistical Manual (DSM) V (APA, 2013) criteria for diagnosing ADHD listthree types of ADHD and the accompanying characteristics.
Posted by:
Chathuri Super admin..

Posted on: #iteachmsu

What is Attention Deficit Hyperactivity Disorder?
Classroom Interventions for Attention Deficit/ Hyperactivity Disord...
Posted by:
ASSESSING LEARNING
Thursday, Dec 22, 2022
Posted on: #iteachmsu
ASSESSING LEARNING
Adaptive Software Development
Adaptive Software Development is a move towards adaptive practices, leaving the deterministic practices in the context of complex systems and complex environments. Adaptive Software Development focuses on collaboration and learning as a technique to build complex systems. It is evolved from the best practices of Rapid Application Development (RAD) and Evolutionary Life Cycles.
Posted by:
Kiren awasti

Posted on: #iteachmsu

Adaptive Software Development
Adaptive Software Development is a move towards adaptive practices,...
Posted by:
ASSESSING LEARNING
Monday, Apr 4, 2022
Posted on: #iteachmsu
ASSESSING LEARNING
Computer Programming
Introduction to Computer Program
Before getting into computer programming, let us first understand computer programs and what they do.
A computer program is a sequence of instructions written using a Computer Programming Language to perform a specified task by the computer.
The two important terms that we have used in the above definition are −
Sequence of instructions
Computer Programming Language
To understand these terms, consider a situation when someone asks you about how to go to a nearby KFC. What exactly do you do to tell him the way to go to KFC?
You will use Human Language to tell the way to go to KFC, something as follows −
First go straight, after half kilometer, take left from the red light and then drive around one kilometer and you will find KFC at the right.
Here, you have used English Language to give several steps to be taken to reach KFC. If they are followed in the following sequence, then you will reach KFC −
1. Go straight
2. Drive half kilometer
3. Take left
4. Drive around one kilometer
5. Search for KFC at your right side
Now, try to map the situation with a computer program. The above sequence of instructions is actually a Human Program written in English Language, which instructs on how to reach KFC from a given starting point. This same sequence could have been given in Spanish, Hindi, Arabic, or any other human language, provided the person seeking direction knows any of these languages.
Now, let's go back and try to understand a computer program, which is a sequence of instructions written in a Computer Language to perform a specified task by the computer. Following is a simple program written in Python programming Language −
print "Hello, World!"
The above computer program instructs the computer to print "Hello, World!" on the computer screen.
A computer program is also called a computer software, which can range from two lines to millions of lines of instructions.
Computer program instructions are also called program source code and computer programming is also called program coding.
A computer without a computer program is just a dump box; it is programs that make computers active.
As we have developed so many languages to communicate among ourselves, computer scientists have developed several computer-programming languages to provide instructions to the computer (i.e., to write computer programs). We will see several computer programming languages in the subsequent chapters.
Introduction to Computer Programming
If you understood what a computer program is, then we will say: the act of writing computer programs is called computer programming.
As we mentioned earlier, there are hundreds of programming languages, which can be used to write computer programs and following are a few of them −
Java
C
C++
Python
PHP
Perl
Ruby
Uses of Computer Programs
Today computer programs are being used in almost every field, household, agriculture, medical, entertainment, defense, communication, etc. Listed below are a few applications of computer programs −
MS Word, MS Excel, Adobe Photoshop, Internet Explorer, Chrome, etc., are examples of computer programs.
Computer programs are being used to develop graphics and special effects in movie making.
Computer programs are being used to perform Ultrasounds, X-Rays, and other medical examinations.
Computer programs are being used in our mobile phones for SMS, Chat, and voice communication.
Computer Programmer
Someone who can write computer programs or in other words, someone who can do computer programming is called a Computer Programmer.
Based on computer programming language expertise, we can name a computer programmers as follows −
C Programmer
C++ Programmer
Java Programmer
Python Programmer
PHP Programmer
Perl Programmer
Ruby Programmer
Algorithm
From programming point of view, an algorithm is a step-by-step procedure to resolve any problem. An algorithm is an effective method expressed as a finite set of well-defined instructions.
Thus, a computer programmer lists down all the steps required to resolve a problem before writing the actual code. Following is a simple example of an algorithm to find out the largest number from a given list of numbers −
1. Get a list of numbers L1, L2, L3....LN
2. Assume L1 is the largest, Largest = L1
3. Take next number Li from the list and do the following
4. If Largest is less than Li
5. Largest = Li
6. If Li is last number from the list then
7. Print value stored in Largest and come out
8. Else repeat same process starting from step 3
The above algorithm has been written in a crude way to help beginners understand the concept. You will come across more standardized ways of writing computer algorithms as you move on to advanced levels of computer programming.
Before getting into computer programming, let us first understand computer programs and what they do.
A computer program is a sequence of instructions written using a Computer Programming Language to perform a specified task by the computer.
The two important terms that we have used in the above definition are −
Sequence of instructions
Computer Programming Language
To understand these terms, consider a situation when someone asks you about how to go to a nearby KFC. What exactly do you do to tell him the way to go to KFC?
You will use Human Language to tell the way to go to KFC, something as follows −
First go straight, after half kilometer, take left from the red light and then drive around one kilometer and you will find KFC at the right.
Here, you have used English Language to give several steps to be taken to reach KFC. If they are followed in the following sequence, then you will reach KFC −
1. Go straight
2. Drive half kilometer
3. Take left
4. Drive around one kilometer
5. Search for KFC at your right side
Now, try to map the situation with a computer program. The above sequence of instructions is actually a Human Program written in English Language, which instructs on how to reach KFC from a given starting point. This same sequence could have been given in Spanish, Hindi, Arabic, or any other human language, provided the person seeking direction knows any of these languages.
Now, let's go back and try to understand a computer program, which is a sequence of instructions written in a Computer Language to perform a specified task by the computer. Following is a simple program written in Python programming Language −
print "Hello, World!"
The above computer program instructs the computer to print "Hello, World!" on the computer screen.
A computer program is also called a computer software, which can range from two lines to millions of lines of instructions.
Computer program instructions are also called program source code and computer programming is also called program coding.
A computer without a computer program is just a dump box; it is programs that make computers active.
As we have developed so many languages to communicate among ourselves, computer scientists have developed several computer-programming languages to provide instructions to the computer (i.e., to write computer programs). We will see several computer programming languages in the subsequent chapters.
Introduction to Computer Programming
If you understood what a computer program is, then we will say: the act of writing computer programs is called computer programming.
As we mentioned earlier, there are hundreds of programming languages, which can be used to write computer programs and following are a few of them −
Java
C
C++
Python
PHP
Perl
Ruby
Uses of Computer Programs
Today computer programs are being used in almost every field, household, agriculture, medical, entertainment, defense, communication, etc. Listed below are a few applications of computer programs −
MS Word, MS Excel, Adobe Photoshop, Internet Explorer, Chrome, etc., are examples of computer programs.
Computer programs are being used to develop graphics and special effects in movie making.
Computer programs are being used to perform Ultrasounds, X-Rays, and other medical examinations.
Computer programs are being used in our mobile phones for SMS, Chat, and voice communication.
Computer Programmer
Someone who can write computer programs or in other words, someone who can do computer programming is called a Computer Programmer.
Based on computer programming language expertise, we can name a computer programmers as follows −
C Programmer
C++ Programmer
Java Programmer
Python Programmer
PHP Programmer
Perl Programmer
Ruby Programmer
Algorithm
From programming point of view, an algorithm is a step-by-step procedure to resolve any problem. An algorithm is an effective method expressed as a finite set of well-defined instructions.
Thus, a computer programmer lists down all the steps required to resolve a problem before writing the actual code. Following is a simple example of an algorithm to find out the largest number from a given list of numbers −
1. Get a list of numbers L1, L2, L3....LN
2. Assume L1 is the largest, Largest = L1
3. Take next number Li from the list and do the following
4. If Largest is less than Li
5. Largest = Li
6. If Li is last number from the list then
7. Print value stored in Largest and come out
8. Else repeat same process starting from step 3
The above algorithm has been written in a crude way to help beginners understand the concept. You will come across more standardized ways of writing computer algorithms as you move on to advanced levels of computer programming.
Authored by:
Komal

Posted on: #iteachmsu

Computer Programming
Introduction to Computer Program
Before getting into computer progr...
Before getting into computer progr...
Authored by:
ASSESSING LEARNING
Wednesday, Mar 30, 2022
Posted on: #iteachmsu
ASSESSING LEARNING
Q & A with Garth Sabo & Stokes Schwartz: MSU Learning Q & A with Garth Sabo & Stokes Schwartz: MSU L
In recent years, there is a lot of buzz on Blockchain. Many have described this as a most disruptive technology of the decade. Especially, the financial markets could be the most affected ones.
The technology is being adapted into many verticals like Healthcare, Medicines, Insurance, Smart Properties, Automobiles, and even Governments.
However, so far the most successful implementation of Blockchain is the Bitcoin - A Peer-to-Peer Electronic Cash System, which incidentally is also the first implementation of blockchain technology. Thus, to understand blockchain technology, it is best to understand how Bitcoin System is designed and implemented.
In this article, you will learn what is Blockchain, its architecture, how it is implemented and its various features. I will site Bitcoin implementation while describing the intricacies of blockchain.
The blockchain architecture is not so trivial and many have written good articles, tutorials including several videos. These range audience from Novice to Professionals. In this tutorial, I will focus on the conceptual understanding of blockchain architecture, keeping both Novice and Professionals on mind. Before delving into the blockchain, it is important to know why the need for this new technology emerged? The answer to this question lies in what is known as Double − Spending.
The technology is being adapted into many verticals like Healthcare, Medicines, Insurance, Smart Properties, Automobiles, and even Governments.
However, so far the most successful implementation of Blockchain is the Bitcoin - A Peer-to-Peer Electronic Cash System, which incidentally is also the first implementation of blockchain technology. Thus, to understand blockchain technology, it is best to understand how Bitcoin System is designed and implemented.
In this article, you will learn what is Blockchain, its architecture, how it is implemented and its various features. I will site Bitcoin implementation while describing the intricacies of blockchain.
The blockchain architecture is not so trivial and many have written good articles, tutorials including several videos. These range audience from Novice to Professionals. In this tutorial, I will focus on the conceptual understanding of blockchain architecture, keeping both Novice and Professionals on mind. Before delving into the blockchain, it is important to know why the need for this new technology emerged? The answer to this question lies in what is known as Double − Spending.
Authored by:
Joseph
Posted on: #iteachmsu
Q & A with Garth Sabo & Stokes Schwartz: MSU Learning Q & A with Garth Sabo & Stokes Schwartz: MSU L
In recent years, there is a lot of buzz on Blockchain. Many have de...
Authored by:
ASSESSING LEARNING
Wednesday, Feb 23, 2022
Posted on: #iteachmsu
ASSESSING LEARNING
Different terminology used in Computer Security.
Different terminology used in Computer Security.
Unauthorized access − An unauthorized access is when someone gains access to a server, website, or other sensitive data using someone else's account details.
Hacker − Is a Person who tries and exploits a computer system for a reason which can be money, a social cause, fun etc.
Threat − Is an action or event that might compromise the security.
Vulnerability − It is a weakness, a design problem or implementation error in a system that can lead to an unexpected and undesirable event regarding security system.
Attack − Is an assault on the system security that is delivered by a person or a machine to a system. It violates security.
Antivirus or Antimalware − Is a software that operates on different OS which is used to prevent from malicious software.
Social Engineering − Is a technique that a hacker uses to stole data by a person for different for purposes by psychological manipulation combined with social scenes.
Virus − It is a malicious software that installs on your computer without your consent for a bad purpose.
Firewall − It is a software or hardware which is used to filter network traffic based on rules.
Unauthorized access − An unauthorized access is when someone gains access to a server, website, or other sensitive data using someone else's account details.
Hacker − Is a Person who tries and exploits a computer system for a reason which can be money, a social cause, fun etc.
Threat − Is an action or event that might compromise the security.
Vulnerability − It is a weakness, a design problem or implementation error in a system that can lead to an unexpected and undesirable event regarding security system.
Attack − Is an assault on the system security that is delivered by a person or a machine to a system. It violates security.
Antivirus or Antimalware − Is a software that operates on different OS which is used to prevent from malicious software.
Social Engineering − Is a technique that a hacker uses to stole data by a person for different for purposes by psychological manipulation combined with social scenes.
Virus − It is a malicious software that installs on your computer without your consent for a bad purpose.
Firewall − It is a software or hardware which is used to filter network traffic based on rules.
Posted by:
Rupali Jagtap
Posted on: #iteachmsu
Different terminology used in Computer Security.
Different terminology used in Computer Security.
Unauthorized acc...
Unauthorized acc...
Posted by:
ASSESSING LEARNING
Monday, Oct 18, 2021
Posted on: #iteachmsu
ASSESSING LEARNING
Deep Learning with Keras
Deep Learning essentially means training an Artificial Neural Network (ANN) with a huge amount of data. In deep learning, the network learns by itself and thus requires humongous data for learning. In this tutorial, you will learn the use of Keras in building deep neural networks. We shall look at the practical examples for teaching.
Audience
This tutorial is prepared for professionals who are aspiring to make a career in the field of deep learning and neural network framework. This tutorial is intended to make you comfortable in getting started with the Keras framework concepts.
Prerequisites
Before proceeding with the various types of concepts given in this tutorial, we assume that the readers have basic understanding of deep learning framework. In addition to this, it will be very helpful, if the readers have a sound knowledge of Python and Machine Learning.
Audience
This tutorial is prepared for professionals who are aspiring to make a career in the field of deep learning and neural network framework. This tutorial is intended to make you comfortable in getting started with the Keras framework concepts.
Prerequisites
Before proceeding with the various types of concepts given in this tutorial, we assume that the readers have basic understanding of deep learning framework. In addition to this, it will be very helpful, if the readers have a sound knowledge of Python and Machine Learning.
Authored by:
Komal Rupali

Posted on: #iteachmsu

Deep Learning with Keras
Deep Learning essentially means training an Artificial Neural Netwo...
Authored by:
ASSESSING LEARNING
Friday, Oct 8, 2021
Posted on: #iteachmsu
ASSESSING LEARNING
Engages students and creates active learners
Engages students and creates active learners.
Using a computer, tablet, or other device encourages self-directed learning and creates an active participant in the learning process, rather than the passive learners found in a lecture environment. Interactive lesson plans can help turn “boring” conceptual subjects like math and science into fun, engaging, and educational activities for students.The availability of appropriate software for the technology being integrated is also problematic in terms of software accessibility to students and educators. Another issue identified with technology integration is the lack of long-range planning for these tools within the educative districts they are being used.
Using a computer, tablet, or other device encourages self-directed learning and creates an active participant in the learning process, rather than the passive learners found in a lecture environment. Interactive lesson plans can help turn “boring” conceptual subjects like math and science into fun, engaging, and educational activities for students.The availability of appropriate software for the technology being integrated is also problematic in terms of software accessibility to students and educators. Another issue identified with technology integration is the lack of long-range planning for these tools within the educative districts they are being used.
Posted by:
Rupali Jagtap

Posted on: #iteachmsu

Engages students and creates active learners
Engages students and creates active learners.
Using a computer, tab...
Using a computer, tab...
Posted by:
ASSESSING LEARNING
Thursday, Sep 30, 2021