簡易檢索 / 詳目顯示

研究生: 王怡絜
Wang, I-Chiech
論文名稱: 交錯圖形偵測應用於半導體缺陷圖樣辨識之研究
Detection and Identification of Intersecting Defect Patterns in Semiconductor Manufacturing
指導教授: 陳飛龍
口試委員:
學位類別: 碩士
Master
系所名稱: 工學院 - 工業工程與工程管理學系
Department of Industrial Engineering and Engineering Management
論文出版年: 2006
畢業學年度: 94
語文別: 英文
論文頁數: 84
中文關鍵詞: 半導體良率缺陷分析影像處理
外文關鍵詞: Semiconductor, Yield, Defect analysis, Image processing
相關次數: 點閱:2下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 半導體的製造過程極為複雜,因此良率的提升成為一項非常具有挑戰性的議題。提昇良率最直接的方法則是專注在製造過程,即時的發現異常情況。透過空間缺陷辨識可以迅速發現線上運作問題。簡言之,偵測以及辨識空間缺陷圖形可以發現問題並且得知問題起因,使工程師可以迅速修復避免良率的損失。
    過去的研究中,學者發展出許多方法得以將缺陷圖進行分類辨識,但卻只著重在單一種缺陷型態,而忽略了更具複雜性的交錯圖形。因此,本研究著重在發展一套方法解決交錯型的缺陷圖形,以幫助工程師即時找到問題癥結點。本研究的目的包括: (1) 發展一套方法解決交錯缺陷圖形,包含線性交錯以及弧形交錯, (2) 比較不同的方法對於交錯圖形的辨識表現, (3) 建構完整的系統解決交錯圖形。
    本研究之方法透過模擬資料測試以及業界知名半導體公司所提供之缺陷圖測試其績效。透過實證性的測試,證實本研究可以正確辨識出交錯型缺陷圖形,相較於人工辨識時間,本研究方法可以有效的縮短缺陷圖形辨識的時間。


    The processes of semiconductor manufacturing have become more complicated and its yield faces a big challenge. Finding the way of improving the yield is a very critical issue. The direct method to enhance the yield should focus on the manufacturing processes and detecting the unusual situations as soon as possible. Spatial defect recognition can discover the problems of manufacturing processes directly. Defect detection and recognition can trace the problems and find out root cause such that engineers can modify it timely to avoid yield loss.
    A lot of research works about defects classification have been discussed in the past, but the studied defect patterns are usually single patterns. The researchers ignored the intersecting patterns which are usually much more complicated. Therefore, this research propose to develop an algorithm to deal with the intersecting patterns for helping engineers find out the root cause in the manufacturing rapidly. The objectives of this research are (1) to develop the methodologies to deal with the intersecting patterns including line-shaped cross and curve-shaped cross, (2) to evaluate the performance of different methodologies for intersecting types, and (3) to enhance the performance and save the processing time.
    The developed methodology has been verified with real data collected from a famous semiconductor company. The experimental results demonstrate that the proposed methodology can not only has high accuracy but also save much time on dealing with the defect identification comparing to human operations.

    CONTENTS ABSTRACT I ABSTRACT(CHINESE) II ACKNOWLEDGEMENT III CONTENTS IV LIST OF TABLES VI LIST OF FIGURES VII CHAPTER 1 INTRODUCTION 1 1.1 RESEARCH BACKGROUND 1 1.2 RESEARCH MOTIVATION 2 1.3 RESEARCH OBJECTIVES 4 1.4 RESEARCH METHODOLOGY 5 1.5 FRAMEWORK OF THESIS 9 CHAPTER 2 LITERATURE REVIEW 10 2.1 INTRODUCTION OF SEMICONDUCTOR MANUFACTURING 10 2.1.1 The Procedure of Semiconductor Manufacturing 10 2.1.2 The Definition of Particles, Defects, and Faults 15 2.1.3 The Classification of Defects 16 2.2 DIGITAL IMAGE PROCESSING 18 2.2.1 The Concept of Imaging Processing 18 2.2.2 The Pre-Processing in Imaging Processing 19 2.2.3 Image Segmentation 21 2.2.4 Feature Extraction 26 2.2.5 Representation and Description 27 2.3 INTRODUCTION OF CLUSTERING METHODOLOGY 30 2.4 FUZZY CLUSTERING METHODOLOGY 35 2.5 GRAPH REPRESENTATION 39 CHAPTER 3 DEVELOPMENT OF THE DETECTION AND IDENTIFICATION OF INTERSECTING DEFECT PATTERNS 42 3.1 ARCHITECTURE OF THE PROPOSED ALGORITHM 42 3.1.1 The definition of problems 42 3.1.2 Architecture of the proposed algorithm 44 3.2 THE DETECTION AND IDENTIFICATION OF INTERSECTING DEFECT PATTERNS ALGORITHM 47 3.2.1 The filtering of defects 47 3.2.2 The analysis of defects 52 3.2.3 The extraction of features 56 3.3 THE STRUCTURE OF KNOWLEDGE BASE 59 CHAPTER 4 SYSTEM IMPLEMENTATION AND VERIFICATION 61 4.1 STRUCTURE OF THE DEVELOPED SYSTEM 61 4.2 INTRODUCTION OF THE DEVELOPED SYSTEM 63 4.2.1 Defect loader function 64 4.2.2 Defect filter function 65 4.2.3 Defect detector function 66 4.2.4 Defect identification function 67 4.3 VERIFICATION OF SYSTEM 69 4.3.1 Performance of identifying clustered defects 69 4.3.2 Processing time of system 75 CHAPTER 5 CONCLUSION AND FURTHER RESEARCH 78 5.1 SUMMARY 78 5.2 FURTHER INVESTIGATION 80 REFERENCES 81 LIST OF TABLES Table 3.1 The results of test samples after filtering. 51 Table 3.2 The results of test samples after clustering based on distance concept. 52 Table 3.3 The results of test samples after segmenting based on detection defect patterns algorithm. 55 Table 3.4 The skeletons of clusters. 56 Table 3.5 Features versus pattern types. 58 Table 3.6 Contents of member functions. 59 Table 3.7 Contents of if-then rule. 60 Table 4.1 The description of aid functions. 64 Table 4.2 The line samples. 70 Table 4.3 The curve samples. 72 Table 4.4 The experimental results of line samples. 74 Table 4.5 The experimental results curve samples. 74 Table 4.6 The accuracy of results. 75 Table 4.7 The processing time of line samples 76 Table 4.8 The processing time of curve samples 76 Table 4.9 The average processing time of all samples 76 LIST OF FIGURES Figure 1.1 The Framework of Defect Analysis 5 Figure 1.2 The four vertices and analysis of intersecting area. 7 Figure 2.1 The Chip-Making Process. [www.infras.com] 11 Figure 2.2 (a) Random defects, evenly distributed. (b) Systematic, reticle induced defects. (c) Systematic defects, edge effects. (d) Hybrid defects. [Ulrich, 1995] 17 Figure 2.3 Fundamental steps in digital image processing.[Gonzalez, 2002] 18 Figure 2.4 3×3 smoothing filter mask. 20 Figure 2.5 (a) the origin image has noise (b) after median filter, the isolate has be removable. 20 Figure 2.6 The process of image analysis. 21 Figure 2.7 3×3 mask. 22 Figure 2.8 (a) point detection mask, (b) horizontal line mask, (c) +45° line mask, (d) vertical line mask (e) -45° line mask [Rafael & Richard 1993] 23 Figure 2.9 (a) Sobel operator to compute the mask of , (b) Sobel operator to compute the mask of . 23 Figure 2.10 Laplacian mask. 24 Figure 2.11 The split and merge region-based segmentation. 25 Figure 2.12 The direction of object. 27 Figure 2.13 The square of object with direction and not. 27 Figure 2.14 The signature of ring. 28 Figure 2.15 (a) 4-directional chain codes (b) 8-directional chain codes. 28 Figure 2.16 (a) Original (b) 4-directional chain codes (c) 8-directional chain codes. 29 Figure 2.17 Polygonal representation of object 29 Figure 2.18 Intersecting pattern (a) data set, (b) partition obtained by the fuzzy k-means algorithm has not reconstructed the two input data, (c) the FKR correctly identified the two data. 38 Figure 2.19 Concentric pattern (a) data set, (b) partition obtained by fuzzy k-means algorithm did not recover the shape of the input patterns, (c) detection of the shape of the input patterns by FKR. 38 Figure 2.20 Examples of symbols in graph representation. Graph nodes (black) and graph edges (white). The intersection node joins graph edges belonging to the line and graph edges belonging to the symbol. [Boatto, 1992] 40 Figure 2.21 Results of symbol separation. Those parts of the intersection area that are discarded after the cut are shown in black. 41 Figure 3.1 The generally recognition of pattern type. 43 Figure 3.2 The defined types of crossover patterns. 44 Figure 3.3 The Framework of Defect Analysis 45 Figure 3.4 The steps of defect recognition. 46 Figure 3.5 The coefficient of the 5×5mask 48 Figure 3.6 The procedure of defect filtering 49 Figure 3.7 (a) isolated defect, (b) non-isolated defect. 50 Figure 3.8 (a) defect map, (b) centralize defects, (c) random defects. 51 Figure 4.1 The structure of the developed system. 62 Figure 4.2 The main frame of the developed system. 63 Figure 4.3 The function of defect loader:(a) program frame, (b) the report frame. 65 Figure 4.4 The function of defect filter: (a) the program frame, (b) the report frame. 66 Figure 4.5 The function of defect detector: (a) the program frame, (b) the report frame. 67 Figure 4.6 The function of defect identification: (a) the program frame, (b) the report frame. 68 Figure 4.7 (a) The comparison between defects and processing time of line samples, (b) The comparison between defects and processing time of curve samples. 77

    Agrawal, R., Gehrke, J., Gunopulos, D. and Raghavan P., “Automatic subspace clustering of high dimensional data for data mining applications,” Proceedings of the ACM SIGMOD international conference on Management of data, 27(2), 94-105(1998).

    Ankerst, M., Markus, B., Kriegel, P. and Sander, J., “Optics: Ordering points to identity the clustering structure,” Proceedings of the 1999 ACM SIGMOD international conference on Management of data, 28(2), 49-60(1999).

    Boatto, L., Consorti, V., Del Buono, M., Eramo, V., Esposito, A., Melcarne, F., Meucci, M., Morelli, A., Mosciatti, M., Spirito, A. and Tucci, M., “Detection and separation of symbols conncted to graphics in line drawings” IEEE Pattern Recognition Methodology and Systems, 11(2), 545 – 548(1992).

    Chen, F. L., “Automatic semiconductor manufacturing”, [online], Available: http://www.semilink.com.tw/info/fabri.html (2005/11/30)

    Chen, F. L. and Liu, S. F., “A neural-network approach to recognize defect spatial pattern in semiconductor manufacturing,” IEEE Transactions on Semiconductor Manufacturing , 13(3), 366-373(2000).

    Cheng, K. L., Wang, C. W., Lee, J. N., Chou, Y. F., Huang, C. T. and Wu, C. W., “Fault pattern oriented defect diagnosis for memories,” ITC International Test Conference, 29-38(2003).

    Chien, C. F., Lin, T. H. and Liu, Q. W., “Developing a data mining method for wafer binmap clustering and an empirical study in a semiconductor manufacturing fab,” Journal of the Chinese Institute of Industrial Engineers, 19(2), 23-38(2002).

    Dobsa, J. and Basic, J.; “Concept decomposition by fuzzy k-means algorithm,” Web Intelligence, 2003. WI 2003. Proceedings., IEEE/WIC International Conference on 13-17 Oct., 684-688(2003).

    Ester, M., Kriegel, P., Sander, J. and Xu, X., “A density-based algorithm for discovering clusters in large spatial databases,” In Proc. 1996 Int. Conf. Knowledge Discovery and Data Mining, 226-331(1996).

    Fisher, D., “Knowledge acquisition via incremental conceptual clustering,” Machine Learning, 2:139-172(1987).

    Gonzalez, C., Woods, E., Rafael G. and Richard W., Digital image processing, Prentice Hall, 2002.

    Guha, S., Rastogi, R. and Shim, K., “Cure: an efficient clustering algorithm for large databases,” Proceedings of the ACM SIGMOD international conference on Management of data, SIGMOD'98, June 1-4, 73-84(1998).

    Guha, S., Rastogi, R. and Shim, K., “Rock: a robust clustering algorithm for categorical attribute,” Proceedings International Conference on Data Engineering Proceedings of the 15th International Conference on Data Engineering, Mar 23-26 (1999).

    Han, J. and Kamber, M., Data Mining: Concepts and Techniques, Morgan Kaufmann Publishers, 2000.

    Hsing, Y. T., Wang, C. W., Wu, C. W., Huang, C. T. and Wu, C. W., “Failure factor based yield enhancement for SRAM designs,”Proceedings of the 19th IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems, 1-9(2004).

    Huang, C. J., Wu, C. F. and Wang, C. C., “Image processing techniques for wafer defect cluster identification,” IEEE Design & Test of Computers, 19(2), 44- 48(2002).

    Johnson, Carl, “Semiconductor Tour: The chip-making process”, [online], Available: http://www.infras.com/Tutorial/sld001.htm (2005/12/01)

    Karypis, G., Han, H. and Kumar, V., “Chameleon: hierarchical clustering using dynamic modeling,” IEEE Computer, 32(8), 68-75(1999).

    Kaufman, L. and Rousseeuw, J., Finding groups in data: an introduction to cluster analysis, John Wiley & Sons, 1990

    Kopczynski, M. and Sester, M., “Representation of Sketch Data for Localisation in large Data Sets,” International Archives of Photogrammetry, Remote Sensing and Spatial Information Sciences, Vol. 35, ISPRS, Istanbul, 2004.

    Lian, G. Z., Digital Image Processing, 儒林圖書有限公司, 2004.

    MacQueen, B., “Some methods for classification and analysis of multivariate observations,” Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, 1, 281-297(1967).

    Megan, G., Deborah, P., Josh, S. and Andrew, W., “Automated defect pattern recognition an approach to defect classification and lot characterization,” IEEE Systems and Information Design Symposium University of Virginia, 63-67(2002).

    Quirk, M. and Serda, J., Semiconductor Manufacturing Technology, Prentice-Hall, Inc. 2001.

    Robert, M., “New test paradigms for yield and manufacturability,” IEEE Design & Test of Computers, 240-246(2005).

    Russ, C., The image processing handbook, CRC Press, Inc., 1992.

    Sowa, F., “Conceptual Graphs”, [online], Available: http://www.jfsowa.com/cg/ (2006/01/05)

    Ulrich, K., “The binomial test: a simple tool to identify process problems,” IEEE Transactions on Semiconductor, 8(2), 160-166(1995).

    Wang, W., Yang, J. and Muntz, R., “Sting: A Statistical Information grid Approach to Spatial Data Mining,” Proceedings of the 23rd VLDB Conference Athens, Greece, 1997

    Xiao, H., Introduction to Semiconductor Manufacturing Technology, Prentice Hall, Inc. 2001.

    Yael, M. and Isak, G., “Detection and separation of ring-shaped clusters using fuzzy clustering,” IEEE Transactions on Pattern Analysis and Machine Intelligence, 16(8), 855-861(1994).

    Zaidi, H., Diaz-Gomez, M., Boudraa, A., and Slosman, O., “Fuzzy clustering-based segmented attenuation correction in whole-body PET imaging,” IOP, Physics in Medicine and Biology, 47(7), 1143-1160(2002).

    Zhang, T., Ramakrishnan, R. and Livny, M., “Birch: An efficient data clustering method for very large database,” Proceedings of the ACM SIGMOD international conference on Management of data, 25(2), 103-114(1996).

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)
    全文公開日期 本全文未授權公開 (國家圖書館:臺灣博碩士論文系統)
    QR CODE