CN115931038A - Method for identifying blocked hole and sample analyzer - Google Patents

Method for identifying blocked hole and sample analyzer Download PDF

Info

Publication number
CN115931038A
CN115931038A CN202211662963.9A CN202211662963A CN115931038A CN 115931038 A CN115931038 A CN 115931038A CN 202211662963 A CN202211662963 A CN 202211662963A CN 115931038 A CN115931038 A CN 115931038A
Authority
CN
China
Prior art keywords
value
identification vector
pulse
hole
linked list
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211662963.9A
Other languages
Chinese (zh)
Inventor
许涛
王兴红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Comen Medical Instruments Co Ltd
Original Assignee
Shenzhen Comen Medical Instruments Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Comen Medical Instruments Co Ltd filed Critical Shenzhen Comen Medical Instruments Co Ltd
Priority to CN202211662963.9A priority Critical patent/CN115931038A/en
Publication of CN115931038A publication Critical patent/CN115931038A/en
Pending legal-status Critical Current

Links

Images

Abstract

The embodiment of the application discloses a method for identifying a blocked hole and a sample analyzer, wherein the method comprises the following steps: obtaining all voltage pulse signals generated in the process that the sample passes through a jewel hole counting detection of a blood cell analyzer in a sampling time period; calculating the average value of the widths of all the voltage pulse signals to obtain a first pulse width average value; setting a first threshold value and a first identification vector, and constructing a first pulse array by using the first threshold value, the first identification vector and a first pulse width average value; and judging whether the gem hole is blocked in the sampling time period by using the first pulse array. The method utilizes the pulse width average value, the set threshold value and the set identification vector to construct the pulse array, and identifies whether the sample is blocked in the gem hole or not based on the pulse array, wherein the pulse width average value is only related to the flow velocity of the sample and is not influenced by temperature, so that the problem that the conductivity of the sample is changed due to the change of the temperature can be effectively avoided, and the accuracy of hole blocking identification is improved.

Description

Method for identifying blocked hole and sample analyzer
[ technical field ] A
The invention relates to the technical field of medical treatment, in particular to a method for identifying a blocked hole and a sample analyzer.
[ background of the invention ]
The existing hole plugging identification method for the blood cell analyzer is characterized in that when the blood cell analyzer is started, the voltage of a gem hole when diluent passes through the gem hole is taken as reference, the change of a gem Kong Dianya curve is combined to judge whether the hole plugging occurs or not, if the voltage of the gem hole is unchanged but is obviously higher than the starting voltage, the whole-course hole plugging is judged, and if the voltage of the gem hole changes obviously after a certain moment, the hole plugging is considered to occur. When the method for identifying the hole blockage by using the gem hole voltage as the reference is used, the reference voltage fails when the machine is started because the electric conductivity of the diluent is different at different temperatures and the temperature of the diluent is obviously different from the temperature when the machine is started, for example, the electric conductivity of the diluent is changed after the machine is started in the morning and the ambient temperature is increased at noon, the reference voltage loses the reference meaning when the machine is started in the morning and the hole blockage cannot be accurately identified.
[ summary of the invention ]
In view of this, the invention provides a method for identifying a plugged hole and a sample analyzer, so as to avoid the defect that the method for identifying the plugged hole is inaccurate due to the fact that the conductivity of a sample changes due to temperature change, and improve the accuracy of the identification of the plugged hole.
The first embodiment of the present invention provides a method for identifying a plugged hole, which has the following specific technical scheme:
a method of identifying a plugged hole, comprising: obtaining all voltage pulse signals generated in the process that the sample passes through the gem hole counting detection of the blood cell analyzer in the sampling time period; calculating the average value of the widths of all the voltage pulse signals to obtain a first pulse width average value; setting a first threshold value and a first identification vector, and constructing a first pulse array by using the first threshold value, the first identification vector and a first pulse width average value; and judging whether the gem hole is blocked in the sampling time period by using the first pulse array.
Preferably, the setting a first threshold and a first identification vector, and constructing a first pulse array by using the first threshold, the first identification vector and the first pulse width average value includes: storing the first pulse width average value into a linked list to obtain a first linked list; setting a first threshold value, setting a first identification vector for the first linked list, comparing the link table value of the first linked list with the first threshold value, assigning the first identification vector according to the comparison result of the link table value of the first linked list and the first threshold value, and forming a first pulse array by the assigned first identification vector.
Preferably, comparing the magnitude of the table value of the first linked list with the first threshold, and assigning a value to the first identification vector according to the comparison result of the table value of the first linked list with the first threshold, includes: when the linked list value of the first linked list is greater than or equal to a first threshold value, assigning the first identification vector as a first numerical value; when the linked list value of the first linked list is smaller than a first threshold value, assigning the first identification vector as a second numerical value; the first identification vector assigned to the first value or the identification vector assigned to the second value forms a first pulse array.
Preferably, judging whether the gem hole is blocked in the sampling time period by using the first pulse array comprises: when the first identification vector in the first pulse array is assigned as a first numerical value, the gem hole is blocked in the sampling time period; and when the first identification vector in the first pulse array is assigned as the second numerical value, the gem hole is not blocked in the sampling time period.
Preferably, the method further comprises the following steps: carrying out sectional processing on the sampling time periods according to preset time to obtain all sectional voltage pulse signals generated in the process that the sample passes through the gem hole counting detection in each period of time; carrying out average value calculation on the widths of all the segmented voltage pulse signals to obtain a segmented pulse width average value subset; setting a first threshold value and a second identification vector, and constructing a second pulse array by using the first threshold value, the second identification vector and the segmented pulse width average value subset; and judging whether the gem hole is blocked in each period of time by using the second pulse array.
Preferably, setting a first threshold and a second identification vector, and constructing the second pulse array by using the first threshold, the second identification vector and the segmented pulse width average subset includes: storing the subset of the segmented pulse width average values into a linked list to obtain a second linked list; setting a first threshold value, setting a second identification vector for each unit linked list in the second linked list, respectively comparing the link table value of each unit linked list with the first threshold value, assigning values to the second identification vectors according to the comparison result of the link table value of the unit linked list and the first threshold value, and forming a second pulse array by the assigned second identification vectors.
Preferably, the step of comparing the width of each unit linked list with the first threshold value respectively, and the step of assigning a value to the second identification vector according to the comparison result between the width of the unit linked list and the first threshold value comprises: when the linked list value of the unit linked list is greater than or equal to the first threshold value, assigning the second identification vector as a third numerical value; when the linked list value of the unit linked list is smaller than the first threshold value, assigning the second identification vector as a fourth numerical value; the second identification vector assigned to the third value and the second identification vector assigned to the fourth value form a second pulse array.
Preferably, the judging whether the gem hole is blocked in each period of time by using the second pulse array comprises: when the second identification vector in the second pulse array is assigned to be a third numerical value, the jewel hole is blocked in the segmented time; and when the second identification vector in the second pulse array is assigned as a fourth numerical value, the gem hole is not blocked in the segmentation time.
Preferably, the blood cell analyzer sends an alarm when the gem hole is blocked.
In a second aspect, the present invention provides a sample analyzer comprising: the sample counting module is used for counting samples passing through the jewel holes of the blood cell analyzer to generate voltage pulse signals; the storage module is used for storing program data; a control module, connected to the sample counting module and the storage module, for executing the program data to implement the method for identifying plugged holes according to any one of the first aspect.
The embodiment of the invention has the following beneficial effects:
the method comprises the steps of obtaining a pulse width average value by using a voltage pulse signal generated in a process of counting and detecting a sample through a gem hole of a blood cell analyzer, and constructing a pulse array based on the pulse width average value, a set threshold value and a set identification vector; and judging whether the gem hole is blocked by using the pulse array. The pulse array is constructed by utilizing the pulse width average value, the set threshold value and the set identification vector, whether the sample is blocked in the gem hole or not is identified based on the pulse array, the pulse width average value is only related to the flow velocity of the sample and is not influenced by temperature, the situation that the conductivity of the sample is changed due to temperature change can be effectively avoided, the defect that the hole blocking identification method is inaccurate is caused, and the accuracy of hole blocking identification is improved.
[ description of the drawings ]
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the embodiments or the prior art descriptions will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a schematic diagram of an impedance method detection;
FIG. 2 is a flow chart of a method for identifying plugged holes based on average pulse width;
FIG. 3 is a schematic diagram of a pulse marker;
FIG. 4 is a flow chart of a first pulse array construction;
FIG. 5 is a flow chart of a first identification vector assignment;
FIG. 6 is a flow chart of a method for identifying plugged holes based on a segmented average pulse width;
FIG. 7 is a flow chart for constructing a second pulse array;
FIG. 8 is a schematic diagram of an average pulse hole plugging determination;
FIG. 9 is a schematic view of a sample analyzer;
wherein, 1, gem hole; 2. diluting the sample; 3. an electrode; 4. and a constant current source.
[ detailed description ] embodiments
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The blood cell analyzer has one electrode inside and outside the microporous tube soaked in electrolyte based on the non-conducting property of blood cell, and after the current is switched on, the two electrodes form current and the power pump produces negative pressure to start sample sucking. Since cells are poor conductors, the resistance increases at a moment of passing through the microwell, producing a corresponding impulse conduction (voltage), called a pass-through impulse. The voltage increase and change degree depends on the volume of the sensing area of the gem hole occupied by the non-conductive cells, namely, the larger the cell volume is, the larger the pulse is caused, the higher the amplitude of the generated pulse is, and the result is obtained through amplification, threshold value adjustment, screening, shaping and counting. Specifically, the amplification operation is that the pulse conduction generated when the cell passes through the diamond hole is weak, and the counting circuit is difficult to directly trigger due to the weak pulse conduction, so that a microvolt signal must be amplified into a volt-level signal through an electronic amplifier. The threshold value adjusting operation is to adjust the size of the reference level within a certain range, so that the counting result is more practical. The discrimination operation is that various particles can generate signals when passing through the diamond hole, the signal level (pulse amplitude) is in direct proportion to the size of the particles, and the discrimination is that false signals lower than the reference level are removed according to the reference level provided by the threshold regulator so as to improve the accuracy. The shaping operation is that the amplified and discriminated waveform is not consistent, the circuit is triggered after the waveform is adjusted to be standard flat-topped by the shaper, and the waveform is sent to a counting system to obtain a counting result, and the counting result is obtained.
Referring to fig. 1, 1 is a gem pore, 2 is a diluted sample, 3 is an electrode, and 4 is a constant current source. Microparticles (cells) were detected according to the impedance method. The gem hole is immersed in the electrolyte solution, a constant current power supply is connected to two ends of the gem hole, and constant negative pressure is added to one side of the gem hole, so that the liquid flows through the gem hole at constant speed. When the tiny particles pass through the gem hole, the voltage at two ends of the gem hole changes, and the larger the volume of the tiny particles is, the larger the change of the voltage is (the larger the voltage pulse is); while the width of the pulse (end of pulse minus start) is related to the time for the fine particle to travel through the gem hole, the faster the flow rate the smaller the pulse width and the slower the flow rate the larger the pulse width.
According to this principle, when the jewel hole is normal, the velocity of the fine particles when passing through the jewel hole is constant within a fixed range due to the constant negative pressure. However, the above-mentioned jewel hole is a device part which is easy to be blocked, such as scraps of puncturing a test tube, and aggregates of some macromolecular proteins in blood, all of which may be attached to the inner wall of the jewel hole, so that the hole diameter is reduced, and a blocked hole is formed, and at this time, the flow rate of the liquid is greatly changed from the normal state, the state of particles passing through the jewel hole is also more complicated, and the pulse width at this time is disordered, and the speed of particles passing through the jewel hole as a whole is generally slowed down.
Please refer to fig. 2, which is a schematic flow chart of a method for identifying a plugged hole in the first embodiment of the present application, to improve the accuracy of the plugged hole identification, the method includes the steps of: 101. obtaining all voltage pulse signals generated in the process that the sample passes through a jewel hole counting detection of a blood cell analyzer in a sampling time period; 102. calculating the average value of the widths of all the voltage pulse signals to obtain a first pulse width average value; 103. setting a first threshold value and a first identification vector, and constructing a first pulse array by using the first threshold value, the first identification vector and a first pulse width average value; 104. and judging whether the gem hole is blocked in the sampling time period by using the first pulse array.
Specifically, all voltage pulse signals P generated in the process of counting and detecting the sample in the sampling time period through a diamond hole of the blood cell analyzer are obtained 1 .Wide、P 2 Wide, …, pn. Wide; 102. for all voltage pulse signals P 1 .Wide、P 2 Calculating the average value of the widths of Wide, … and pn 1 Wide); 103. setting a first threshold value W 1 And a first identification vector n 1 Using a first threshold value W 1 A first identification vector n 1 And the first pulse width mean value mean 1 Wide) constructing a first pulse array; 104. and judging whether the gem hole is blocked in the sampling time period by utilizing the first pulse array.
Please supplement the embodiment of claim 1
The method comprises the steps of obtaining a pulse width average value by using a voltage pulse signal generated in a process of counting and detecting a jewel hole of a blood cell analyzer through a sample, and constructing a pulse array based on the pulse width average value, a set threshold value and a set identification vector; and judging whether the gem hole is blocked by using the pulse array. The pulse array is constructed by utilizing the pulse width average value, the set threshold value and the set identification vector, whether the sample is blocked in the gem hole or not is identified based on the pulse array, the pulse width average value is only related to the flow rate of the sample and is not influenced by temperature, the problem that the conductivity of the sample is changed due to temperature change, so that the defect of inaccurate hole blocking identification method is caused, and the accuracy of hole blocking identification is improved.
In one embodiment, please refer to fig. 3, which is a diagram illustrating pulse width, pulse size and pulse timing. Generally, one pulse P includes three physical quantities, namely, pulse size, pulse width and pulse time, and the pulse size is called as a pulse value p.value; marking the pulse width as P.Wide; the pulse time marker is P.t, which identifies the point in time of this pulse. Where the pulse P = F (V, t), where V is the measurement voltage, t is the measurement time, and there is V = F (t). Wherein p.wide = t2-t1; value = max (V) -min (V); if F (t 1) = max (V), P.t = t1. In this embodiment, the pulse widths of all pulses are obtained, an average value of all the pulse widths is calculated, that is, a first pulse width average value, a first threshold and a first identification vector are set, and a first pulse array is constructed by using the first threshold, the first identification vector and the first pulse width average value; and judging whether the gem hole is blocked in the sampling time period by utilizing the first pulse array.
In an embodiment, referring to FIG. 4, a first threshold W is set 1 And a first identification vector n 1 Using a first threshold value W 1 A first identification vector n 1 And the first pulseWidth average value construction first pulse array FlagArry 1 The method comprises the following steps: step 201, storing the first pulse width average value into a chain table MWlist to obtain a first chain table MWlist 1 (ii) a Step 202, setting a first threshold value W 1 Is the first linked list MWlist 1 Setting a first identification vector n 1 Compare the first linked list MWlist 1 Value of linked list MWlist 1 [i]And a first threshold value W 1 The size of (d); step 203, according to the chain table value MWlist of the first chain table 1 [i]And a first threshold value W 1 The comparison result of (a) is a first identification vector n 1 Assigning, namely assigning a first identification vector n after assignment 1 Form a first pulse array FlagArry 1 . By comparing the first linked list MWlist 1 Chain table value of (MWlist) 1 [i]And a first threshold value W 1 Judging whether the average value of the pulse width exceeds a preset standard value or not, and further judging whether the gem hole is blocked or not.
In an embodiment, please refer to FIG. 5, compare the chain table value MWlist of the first chain table 1 [i]And a first threshold value W 1 According to the chain table value MWlist of the first chain table 1 [i]And a first threshold value W 1 The result of the comparison is a first identification vector n 1 And performing assignment, including: step 301, when the linked list value MWlist of the first linked list 1 [i]Greater than or equal to a first threshold value W 1 Then, the first identification vector is assigned n 1 Is a first value; step 302, when the chain table value MWlist of the first chain table 1 [i]Is less than a first threshold value W 1 Then, the first identification vector n is divided into 1 Assigning a value to a second value; step 303, assigning a first identification vector n as a first numerical value 1 Or an identification vector n assigned to a second value 1 Form a first pulse array FlagArry 1 . First threshold value W 1 The size of the flow rate sensor can be obtained according to sample statistics in standard situation counting, the aperture becomes smaller and the flow rate becomes slower in hole blocking, the pulse width can become larger, and the first threshold value can be set according to the degree of judging hole blocking. Specifically, a first value is given as 1, a second value is given as 2, and when the chain table value MWlist of the first chain table is 1 [i]Greater than or equal to a first threshold value W 1 Then, the first identification vector is addedAssignment n 1 Is 1; when the linked list value MWlist of the first linked list 1 [i]Is less than a first threshold value W 1 Then, the first identification vector n is added 1 The value is assigned to 2; since the first pulse width mean value is only a certain number, the assigned first identification vector n 1 A first identification vector n of one, i.e. assigned a value of 1 1 Or an identification vector n assigned 2 1 Form a first pulse array FlagArry 1
In specific implementation, the step of judging whether the gem hole is blocked in the sampling time period by using the first pulse array comprises the following steps: when the first identification vector n in the first pulse array 1 When the value is assigned as a first numerical value, the gem hole is blocked in the sampling time period; when the first identification vector n in the first pulse array 1 And when the value is assigned as the second value, the hole plugging of the gem hole does not occur in the sampling time period. Specifically, when the first identification vector n in the first pulse array 1 When the value is 1, the gem hole is blocked in the sampling time period; when the first identification vector n in the first pulse array 1 And when the value is 2, the hole plugging of the gem hole does not occur in the sampling time period. The pulse array is constructed by utilizing the pulse width average value, the set threshold value and the set identification vector, whether the sample is blocked in the gem hole or not is identified based on the pulse array, the pulse width average value is only related to the flow rate of the sample and is not influenced by temperature, the problem that the conductivity of the sample is changed due to temperature change, so that the defect of inaccurate hole blocking identification method is caused, and the accuracy of hole blocking identification is improved.
Whether the gem hole is blocked in the sampling time period or not can be judged through the embodiment. On the basis of the embodiment, the method can further judge which time in the sampling time period the hole blockage occurs. In an embodiment, referring to fig. 6, the method for identifying a plugged hole further includes: step 401, carrying out segmentation processing on the sampling time period according to preset time to obtain all segmented voltage pulse signals generated in the process that the sample passes through the gem hole counting detection in each time period; step 402, carrying out average value calculation on the widths of all the segmented voltage pulse signals to obtain a segmented pulse width average value subset; step 403, setting a first threshold and a second identification vector, and constructing a second pulse array by using the first threshold, the second identification vector and the segmented pulse width average subset; and step 404, judging whether the gem hole is blocked in each period of time by using the second pulse array.
Specifically, the sampling time of one sample is recorded as T, the sampling time period is segmented according to the preset time, each time period is Δ T (Δ T > 0), and if n = T/(Δ T), the whole acquisition time can be divided into n time periods. Averaging the pulse width values of one pulse P with 0 ≦ P.t < 1 × (Δ t) can obtain M _ W1= mean (p.wide) (with 0 ≦ P.t < 1 × (Δ t)), and similarly obtain the pulse width averages M _ W1, M _ W2, …, M _ Wn over all n time periods. M _ W1, M _ W2, …, M _ Wn constitute a segmented pulse width average subset. Setting a first threshold value and a second identification vector, and constructing a second pulse array by using the threshold value, the second identification vector and the segmented pulse width average value subset; and judging whether the gem hole is blocked in each period of time by using the second pulse array.
In an embodiment, referring to FIG. 7, a first threshold W is set 1 And a second identification vector n 2 Using a first threshold value W 1 A second identification vector n 2 Constructing a second pulse array FlagArry with a subset of the segmented pulse width averages 2 The method comprises the following steps: step 501, storing the subset of the average values of the segmented pulse widths into a chain table MWlist to obtain a second chain table MWlist 2 (ii) a Step 502, setting a first threshold W 1 Is the second linked list MWlist 2 In each unit chain table, a second identification vector n is set 2 Respectively comparing the chain table values MWlist of each unit chain table 2 [i]And a first threshold value W 1 The size of (d); step 503, according to the chain table value MWlist of the unit chain table 2 [i]And a first threshold value W 1 The comparison result of (2) is a second identification vector n 2 Assigning, the second identification vector n after assigning 2 Form a second pulse array FlagArry 2 . Storing the subset of the average values of the segmented pulse widths into a linked list, setting an identification vector for each unit linked list in the linked list, and setting the identification vector according to the linked list value and the first unit linked list of each unit linked listAnd comparing the threshold values to assign values to each identification vector, so as to realize the comparison of the average value of the pulse width of each segment with the first threshold value.
In a specific implementation, the width of each unit linked list is respectively compared with a first threshold value W 1 According to the width of the unit chain table and the first threshold value W 1 The comparison result of (2) is a second identification vector n 2 The assigning comprises the following steps: when the linked list value of the unit linked list is greater than or equal to a first threshold value W 1 Then, the second identification vector n is added 2 Assigning a value to a third value; when the linked list value of the unit linked list is less than a first threshold value W 1 Then, the second identification vector n is added 2 Assigning a value of a fourth value; a second identification vector n assigned to a third value 2 And a second identification vector n assigned a fourth value 2 A second pulse array is constructed. Specifically, the third value is given as 1, the fourth value is given as 2, and when the linked list value of the unit linked list is greater than or equal to the first threshold value W 1 Then, the second identification vector is assigned n 2 Is 1; when the linked list value of the unit linked list is less than a first threshold value W 1 Then, the second identification vector n is added 2 The value is assigned to 2; since the subset of segmented pulse width averages comprises a plurality of pulse width averages, the assigned second identification vector n 2 For a plurality of second identification vectors n, i.e. assigned a value of 1 2 And a second identification vector n assigned 2 2 Form a second pulse array FlagArry 2
In specific implementation, the step of judging whether the diamond hole is blocked in each period of time by using the second pulse array comprises the following steps: when the second identification vector n in the second pulse array 2 When the value is assigned as a third numerical value, the gem hole is blocked in the segmentation time; when the second identification vector n in the second pulse array 2 And when the value is assigned as the fourth value, the hole plugging of the gem hole does not occur in the segmented time.
Specifically, the third value is given to be 1, the fourth value is 0, and whether the diamond hole is blocked in each period of time or not is judged by using the second pulse array, wherein the method comprises the following steps: when the second identification vector n in the second pulse array 2 The value is 1, then the gemstone is in the segment timeThe hole is blocked; when the second identification vector n in the second pulse array 2 And when the value is 0, the hole plugging of the gem hole does not occur in the segmentation time. If there is an integer t and 1 < t < n, if FlagArry 2 [i]I is not less than 1 and not more than 1 and less than t, i is an integer, flagArry 2 [j]J is not less than 0 and T is not more than j and is not more than n, j is an integer, the hole is blocked in the time from 0 to delta T in the current measurement, the time from delta T to T is normal, and the situation is called as front-section hole blocking;
if there is an integer t and 1 < t < n, if FlagArry 2 [i]I is not less than 1 and not more than t, i is an integer, flagArry 2 [j]J is not less than n and j is an integer, namely 1,t is not less than j, j represents that the time from 0 to delta T is normal, and the time from delta T to T blocks the hole, and the situation is called as rear-section hole blocking; if integers t1, t2, and 1 are present<t1<t2<n,FlagArry 2 [i]I is not less than 1 and not more than 1 and is less than t1, i is an integer, flagArray [ j]J is not less than 1 and t1 and less than t2, j is an integer, flagArray [ k ]]And k is an integer, which indicates that the measurement is normal in the time from 0 to delta T1, the pore is blocked in the time from delta T1 to delta T2, and the pore is restored in the time from delta T2 to T, which is called midway pore blocking. The pulse width average value of the segmented time, the set threshold value and the set identification vector are utilized to construct a pulse array, whether the sample is blocked in the gem hole or not is identified based on the pulse array, the pulse width average value is only related to the flow velocity of the sample and is not influenced by temperature, the problem that the conductivity of the sample is changed due to temperature change, the defect that a hole blocking identification method is inaccurate can be effectively avoided, and the accuracy of hole blocking identification is improved.
The method comprises the following steps of judging whether hole blockage occurs in the current time period according to actual conditions by combining at least one of the two judging methods; for example, any one of the two determination methods may be selected as a basis for determining whether the hole is blocked in the current time period; or, two judging methods of the two judging methods may be combined to judge whether the hole plugging occurs in the current time period, and when both judging methods judge that the hole plugging does not occur in the current time period, a conclusion that the hole plugging does not occur in the current time period is given; otherwise, a conclusion that the hole is blocked in the current time period is given; or, the two judging methods may be combined to judge whether the hole plugging occurs in the current time period, and when both judging methods judge that the hole plugging does not occur in the current time period, a conclusion that the hole plugging does not occur in the current time period is given; otherwise, a conclusion that the hole blockage occurs in the current time period is given.
In a specific embodiment, as shown in fig. 8, fig. 8 is a schematic diagram of average pulse hole plugging determination, and when a hole plugging occurs in a gem hole, the blood cell analyzer gives an alarm. The abscissa of the average pulse hole blocking judgment schematic diagram is the pulse width, and the ordinate is the number.
In response to the blood cell analyzer having an impedance detection channel and an optical detection channel, in an embodiment of the present application, the method for identifying a plugged hole further includes: and when the hole blockage is judged to occur, correcting the number of the particles in the counting and detecting process and calculating the number of different types of cells in the particle flow. Specifically, in response to the relationship between the particle number information obtained under the impedance detection channel and the optical detection channel when no hole blockage occurs, the particle number information of the impedance detection channel when the hole blockage occurs is corrected by using the particle number information obtained under the optical detection channel, the number of different types of cells is calculated by using the corrected particle number information, and the corrected particle number information and the number of the different types of cells are displayed. By correcting the particle number, the accuracy of the sample counting result can be improved, and the probability of invalid results is reduced. Wherein the different kinds of cells include white blood cells, red blood cells, etc.
Referring to fig. 9, a sample analyzer according to a second embodiment of the present application, the sample analyzer being capable of identifying a plugged hole based on an average pulse width, and improving accuracy of the identification of the plugged hole, includes: the sample counting module 101 is used for counting samples passing through the jewel holes of the blood cell analyzer to generate voltage pulse signals; a storage module 102 for storing program data; a control module 103, connected to the sample counting module and the storage module, for executing the program data to implement the method for identifying a plugged hole according to any one of the first aspect of the present application. Specifically, the method comprises the following steps: calculating the average value of the widths of all the voltage pulse signals to obtain a first pulse width average value; setting a first threshold value and a first identification vector, and constructing a first pulse array by using the first threshold value, the first identification vector and a first pulse width average value; and judging whether the gem hole is blocked in the sampling time period by using the first pulse array. Obtaining a pulse width average value by using a voltage pulse signal generated in the process of counting and detecting the gem hole of the blood cell analyzer through a sample, and constructing a pulse array based on the pulse width average value, a set threshold value and a set identification vector; and judging whether the gem hole is blocked by using the pulse array. The pulse array is constructed by utilizing the pulse width average value, the set threshold value and the set identification vector, whether the sample is blocked in the gem hole or not is identified based on the pulse array, the pulse width average value is only related to the flow velocity of the sample and is not influenced by temperature, the situation that the conductivity of the sample is changed due to temperature change can be effectively avoided, the defect that the hole blocking identification method is inaccurate is caused, and the accuracy of hole blocking identification is improved.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described device embodiments are merely illustrative, and for example, the division of the modules or units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit. The integrated unit may be implemented in the form of hardware, or may also be implemented in the form of a software functional unit.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above examples only express several embodiments of the present application, and the description thereof is more specific and detailed, but not to be construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A method of identifying a plugged hole, comprising:
obtaining all voltage pulse signals generated in the process that the sample passes through the gem hole counting detection of the blood cell analyzer in the sampling time period;
calculating the average value of the widths of all the voltage pulse signals to obtain a first pulse width average value;
setting a first threshold value and a first identification vector, and constructing a first pulse array by using the first threshold value, the first identification vector and a first pulse width average value;
and judging whether the gem hole is blocked in the sampling time period by using the first pulse array.
2. The method of identifying a plugged hole according to claim 1, wherein setting a first threshold value and a first identification vector, and constructing a first pulse array using the first threshold value, the first identification vector and a first pulse width average comprises:
storing the first pulse width average value into a linked list to obtain a first linked list;
setting a first threshold value, setting a first identification vector for the first linked list, comparing the link table value of the first linked list with the first threshold value, assigning the first identification vector according to the comparison result of the link table value of the first linked list and the first threshold value, and forming a first pulse array by the assigned first identification vector.
3. The method of claim 2, wherein comparing the values of the linked list of the first linked list to the first threshold value and assigning the first identification vector based on the comparison of the values of the linked list of the first linked list to the first threshold value comprises:
when the linked list value of the first linked list is greater than or equal to a first threshold value, assigning the first identification vector as a first numerical value;
when the linked list value of the first linked list is smaller than a first threshold value, assigning the first identification vector as a second numerical value;
the first identification vector assigned to the first value or the identification vector assigned to the second value forms a first pulse array.
4. The method of identifying a plugged hole according to claim 3, wherein determining whether the plugged hole occurs in the gemstone hole within the sampling time period using the first pulse array comprises:
when the first identification vector in the first pulse array is assigned as a first numerical value, the gem hole is blocked in the sampling time period;
and when the first identification vector in the first pulse array is assigned as the second numerical value, the gem hole is not blocked in the sampling time period.
5. The method of identifying a plugged hole according to claim 1, further comprising:
carrying out sectional processing on the sampling time periods according to preset time to obtain all sectional voltage pulse signals generated in the process that the sample passes through the gem hole counting detection in each period of time;
carrying out average value calculation on the widths of all the segmented voltage pulse signals to obtain a segmented pulse width average value subset;
setting a first threshold value and a second identification vector, and constructing a second pulse array by using the first threshold value, the second identification vector and the segmented pulse width average value subset;
and judging whether the gem hole is blocked in each period of time by using the second pulse array.
6. The method of identifying a plugged hole according to claim 5, wherein setting a first threshold and a second identification vector, and constructing a second pulse array using the first threshold, the second identification vector, and the subset of segmented pulse width averages comprises:
storing the subset of the segmented pulse width average values into a linked list to obtain a second linked list;
setting a first threshold value, setting a second identification vector for each unit linked list in the second linked list, respectively comparing the link table value of each unit linked list with the first threshold value, assigning values for the second identification vector according to the comparison result of the link table value of the unit linked list and the first threshold value, and forming a second pulse array by the assigned second identification vector.
7. The method of identifying a plugged hole according to claim 6, wherein comparing the width of each unit chain table with the first threshold value respectively, and assigning a value to the second identification vector according to the comparison result of the width of the unit chain table with the first threshold value comprises:
when the linked list value of the unit linked list is greater than or equal to the first threshold value, assigning the second identification vector as a third numerical value;
when the linked list value of the unit linked list is smaller than the first threshold value, assigning the second identification vector as a fourth numerical value;
the second identification vector assigned to the third value and the second identification vector assigned to the fourth value form a second pulse array.
8. The method of identifying a plugged hole according to claim 7, wherein determining whether the plugged hole occurs in the gem hole during each time period using the second pulse array comprises:
when the second identification vector in the second pulse array is assigned as a third numerical value, the gem hole is blocked in the segmentation time;
and when the second identification vector in the second pulse array is assigned as a fourth numerical value, the gem hole is not blocked in the segmentation time.
9. The method of identifying a plugged hole according to claim 1 or 5, wherein the blood cell analyzer issues an alarm when a plugged hole occurs in the gemstone hole.
10. A sample analyzer, comprising:
the sample counting module is used for counting samples passing through the jewel holes of the blood cell analyzer to generate voltage pulse signals;
the storage module is used for storing program data;
a control module, connected with the sample counting module and the storage module, for executing the program data to implement the method of identifying plugged holes according to any one of claims 1-4.
CN202211662963.9A 2022-12-23 2022-12-23 Method for identifying blocked hole and sample analyzer Pending CN115931038A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211662963.9A CN115931038A (en) 2022-12-23 2022-12-23 Method for identifying blocked hole and sample analyzer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211662963.9A CN115931038A (en) 2022-12-23 2022-12-23 Method for identifying blocked hole and sample analyzer

Publications (1)

Publication Number Publication Date
CN115931038A true CN115931038A (en) 2023-04-07

Family

ID=86650833

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211662963.9A Pending CN115931038A (en) 2022-12-23 2022-12-23 Method for identifying blocked hole and sample analyzer

Country Status (1)

Country Link
CN (1) CN115931038A (en)

Similar Documents

Publication Publication Date Title
CN104296953B (en) A kind of micropore plug-hole detection method and system, blood cell analyzer
US9188579B2 (en) Sniffing smartphone
JP6807529B2 (en) Identification method, classification analysis method, identification device, classification analyzer and storage medium
JP5557842B2 (en) Simultaneous detection and processing in particle analysis
CN111257204B (en) Detection method for micropore blockage of sample analyzer and sample analyzer
WO2022105141A1 (en) Plt particle detection method and device for blood cell analyzer
CN110857910A (en) Micropore blockage detection device and method and blood cell analyzer
CN110475246B (en) Malicious anchor node detection method based on isolated forest and sequential probability ratio detection
CN106769698B (en) A kind of haemocyte abnormal pulsers signal identification processing method based on theory of electrical impedance
CN115876671A (en) Method for identifying blocked hole and sample analyzer
JP2002195932A (en) Flow cytometer
CN112730202A (en) Impedance method detection system of blood cell analyzer and method for identifying impedance channel blocked hole
CN108931463B (en) Blood cell pulse recognition method and device based on sheath flow impedance principle
CN101246113B (en) Monitoring method for hemoglobin test result
CN115931038A (en) Method for identifying blocked hole and sample analyzer
CN114062932A (en) Method for detecting lithium separation of battery
US20170315084A1 (en) Biosensor Device and Related Method
CN114441414B (en) Hole blockage judging method and sample analyzer
CN114441415B (en) Micro-plugging hole identification method and sample analyzer
CN114564469A (en) Method and system for processing collected data
CN106813703B (en) A kind of method and apparatus of test product function
CN113114392B (en) Method and device for automatically testing sensitivity of broadband radio frequency system
CN113834782A (en) Equipment operation method and system based on water quality detection
CN111122841A (en) Method for improving sample result accuracy and sample analyzer
CN116046642A (en) Method and system for identifying blocking hole of blood cell analyzer

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination