This paper presents the line-edge-roughness (LER) characterization of the photomask patterns and the lithography-printed patterns by enhanced knife edge interferometry (EKEI) that measures the interferometric fringe patterns occurring when the light is incident on the patterned edge. The LER is defined as a geometric deviation of a feature edge from an ideal sharp edge. The Fresnel number-based computational model was developed to simulate the fringe patterns according to the LER conditions. Based on the computational model, the photomask patterns containing LER features were designed and fabricated. Also, the patterns were printed on the glass wafer by photolithography. The interferometric fringe patterns of those two groups of patterns were measured and compared with the simulation results. By using the cross-correlation method, the LER effects on the fringe patterns were characterized. The simulation and experimental results showed good agreement. It showed that the amplitude of the fringe pattern decreases as the LER increases in both cases: photomask patterns and printed wafer patterns. As a result, the EKEI and its analysis methods showed the potential to be used in photomask design and pattern metrology, and inspection for advancing semiconductor manufacturing processes.
more »
« less
A dry lift-off method for patterning perovskites
In this paper, we demonstrate a new method to pattern perovskites using a dry lift-off process. By utilizing parylene-C as a sacrificial layer, patterns with <12 um features and multi-color patterns can be achieved.
more »
« less
- Award ID(s):
- 1807397
- PAR ID:
- 10165616
- Date Published:
- Journal Name:
- Conference on Lasers and Electrooptics
- ISSN:
- 2160-9020
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Privacy engineering encompasses various methodologies and tools, including privacy strategies and privacy patterns, aimed at achieving systems that inherently respect privacy. Despite the collection of numerous privacy patterns, their practical application remains under-explored. This paper investigates the applicability of privacy patterns in the context of robotaxis, a use case in the broader Mobility-as-a-Service (MaaS) ecosystem. Using the LINDDUN framework for privacy threat elicitation, we analyze existing privacy patterns to address identified privacy threats. Our findings reveal challenges in applying these patterns due to inconsistencies and a lack of guidance, as well as a lack of suitable privacy patterns for addressing several privacy threats. To fill the gaps, we propose ideas for new privacy patterns.more » « less
-
Pattern-based methods have been successful in information extraction and NLP research. Previous approaches learn the quality of a textual pattern as relatedness to a certain task based on statistics of its individual content (e.g., length, frequency) and hundreds of carefully-annotated labels. However, patterns of good contentquality may generate heavily conflicting information due to the big gap between relatedness and correctness. Evaluating the correctness of information is critical in (entity, attribute, value)-tuple extraction. In thiswork,we propose a novel method, called TruePIE, that finds reliable patterns which can extract not only related but also correct information. TruePIE adopts the self-training framework and repeats the training-predicting-extracting process to gradually discover more and more reliable patterns. To better represent the textual patterns, pattern embeddings are formulated so that patterns with similar semantic meanings are embedded closely to each other. The embeddings jointly consider the local pattern information and the distributional information of the extractions. To conquer the challenge of lacking supervision on patterns’ reliability, TruePIE can automatically generate high quality training patterns based on a couple of seed patterns by applying the arity-constraints to distinguish highly reliable patterns (i.e., positive patterns) and highly unreliable patterns (i.e., negative patterns). Experiments on a huge news dataset (over 25GB) demonstrate that the proposed TruePIE significantly outperforms baseline methods on each of the three tasks: reliable tuple extraction, reliable pattern extraction, and negative pattern extraction.more » « less
-
Recent studies have shown that students follow stable behavioral patterns while learning in online educational systems. These behavioral patterns can further be used to group the students into different clusters. However, as these clusters include both high- and low-performance students, the relation between the behavioral patterns and student performance is yet to be clarified. In this work, we study the relationship between students’ learning behaviors and their performance, in a self-organized online learning system that allows them to freely practice with various problems and worked examples. We represent each student’s behavior as a vector of highsupport sequential micro-patterns. Then, we discover both the prevalent behavioral patterns in each group and the shared patterns across groups using discriminative non-negative matrix factorization. Our experiments show that we can successfully detect such common and specific patterns in students’ behavior that can be further interpreted into student learning behavior trait patterns and performance patterns.more » « less
-
Abstract We show that new types of rogue wave patterns exist in integrable systems, and these rogue patterns are described by root structures of Okamoto polynomial hierarchies. These rogue patterns arise when the τ functions of rogue wave solutions are determinants of Schur polynomials with index jumps of three, and an internal free parameter in these rogue waves gets large. We demonstrate these new rogue patterns in the Manakov system and the three‐wave resonant interaction system. For each system, we derive asymptotic predictions of its rogue patterns under a large internal parameter through Okamoto polynomial hierarchies. Unlike the previously reported rogue patterns associated with the Yablonskii–Vorob'ev hierarchy, a new feature in the present rogue patterns is that the mapping from the root structure of Okamoto‐hierarchy polynomials to the shape of the rogue pattern is linear only to the leading order, but becomes nonlinear to the next order. As a consequence, the current rogue patterns are often deformed, sometimes strongly deformed, from Okamoto‐hierarchy root structures, unless the underlying internal parameter is very large. Our analytical predictions of rogue patterns are compared to true solutions, and excellent agreement is observed, even when rogue patterns are strongly deformed from Okamoto‐hierarchy root structures.more » « less
An official website of the United States government

