PROXY INTERPRETER TO UPGRADE AUTOMATED LEGACY SYSTEMS
20220066804 · 2022-03-03
Assignee
Inventors
Cpc classification
G06F9/4555
PHYSICS
International classification
G06F9/455
PHYSICS
Abstract
The present disclosure generally relates to upgrading existing automated legacy systems. More specifically, the present disclosure relates to system and method for a proxy interpreter system to collect and consolidate the setup, configuration, operation and quality inspection data from a plurality of interfacing devices and controllers of legacy systems and subsequently build a Reinforcement learning module using the consolidated data to perform all the functions automatically without the intervention of a human operator. The consolidated data in the proxy interpreter module may be further analysed using Deep learning methods for data analytics and artificial intelligence to reliably and consistently classify the defect criteria of products to further enhance the quality of the inspection. The defect criteria classification enables the Proxy interpreter system to highlight potential problems and aid in preventive maintenance of the legacy automated systems. The Proxy interpreter system enables legacy systems to adapt and scale to manufacture newer products with no human intervention whether it is related to operation of the legacy equipment or in the process of quality control.
Claims
1. A proxy interpreter system controlling a legacy machine using artificial intelligence connected to the PC control system, the proxy interpreter system comprising: a server, communicatively coupled to a PC control system through multiple channels such as inputs and outputs, which operates the machine, receives and sends operating commands through hardware interfaces such as Ethernet, USB . . . etc. teaching sequences and the respective responses with reference to the image displayed on the display terminal.
2. The proxy interpreter system according to claim 1, wherein the external hardware interfaces include, the Input/Output ports, USB ports. Ethernet port, VGA port, Mouse, Keyboard and Display interface, to operate the legacy system through the PC control system, are utilised to learn & create the domain knowledge required to operate the legacy system.
3. The proxy interpreter system according to claim 2, wherein the proxy interpreter may reside as a software module within the PC control system that is controlling the legacy system and utilise its interfaces to learn and create the Domain knowledge required to operate the legacy system.
4. The proxy interpreter system according to claim 2, wherein the proxy interpreter accumulates the domain knowledge from interactions with the legacy system through commands and responses monitored through the various interfaces for all operating states of the legacy system.
5. The proxy interpreter system according to claim 4, wherein the commands and responses stored in a recipe file for a specific device type, are acquired front the keyboard commands and mouse movements made by the human operator with reference to the image on the display, combined with the relevant responses received on the Ethernet and I/O interface from the legacy system to the proxy interpreter to create the Domain knowledge for the legacy system.
6. The proxy interpreter system of claim 4, wherein the Domain knowledge created through the application of deep learning techniques and continuous reinforced learning, is subsequently utilised to operate the legacy system without the intervention of a human operator.
7. A method of training the proxy interpreter system to build an Artificial intelligence module through deep learning modules, used to select actions to be performed by interacting with the legacy system and by receiving observations of the operating sequence and stales of the system, wherein the method comprises: obtaining a set of activities triggered from the legacy system interactive environment, with each activity comprising a process characterizing a set of events and a related command or set of commands in response to the activity; building domain know ledge through reinforcement learning of the multiple operating states of the legacy system, using a Double Deep Q Network implementation to create a set of recipe file with various parameters for a specific device type; processing the observations and their related actions during the legacy system setup and operation and implementing a method of of rewards and penalty for positive and negative behaviour to arrive at an optimum behavioral model to operate the legacy system effectively; creating a confidence vector for every single action, for use as a filter to prevent a response by the action classifier for selected irrelevant operating states of the legacy system; Constantly reviewing and updating the Advantage stream of the Reinforcement Learning module by implementing the concept of “Duelling Double Deep Q network”
8. The method of claim 6, wherein the Duelling Double Deep Q network is implemented through two streams comprising: a VALUE stream for learning the common Q-value (quality) of each operating state of machine and an ADVANTAGE stream for learning the corresponding action for a given state of the machine.
9. The method of claim 6, wherein the ADVANTAGE stream is regularly updated through an experience buffer to aid in quality improvement and fine tuning the quality value for a given machine state.
10. The method of claim 6, wherein the Deep learning model to enhance the quality of defect inspection on object surfaces comprises: a frozen model generated and constantly updated through using an object detection model by assigning a confidence vector to ensure no action is taken by the ACTION CLASSIFIER for any irrelevant state of the machine. a custom built LSTM (Long short term memory) model to distinguish between similar images in different states of the machine. a set of feature maps using a modified YOLO (You only look once) and a modified CTPN (Connectionist Text Proposal Network) for the image and text respectively.
11. The method of claim 9, wherein the reinforcement learning model implemented on the images and text information is derived from the display screen and any action taken or communicated to the legacy system is streamed through the proxy interpreter.
12. The method of claim 10, wherein the Domain knowledge created within the proxy interpreter for all operating states of the legacy system, is subsequently utilised by the proxy interpreter to automatically operate the legacy system without the intervention of a human operator.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0009] The present invention will be described with respect to a particular embodiment thereof, and reference will be made to the drawings in which like numbers designate like parts and in which:
[0010]
[0011]
[0012]
[0013]
[0014]
[0015]
[0016]
DETAILED DESCRIPTION
[0017] The present invention relates to a method of automating the setup, configuration and operation of a microelectronic manufacturing process. While the embodiments provided below relate to a method of automating a microelectronic manufacturing process used to manufacture Semiconductor devices, it is understood that the method of the present invention may be used to automate any micro electronic manufacturing process to manufacture, for example, flat panel devices, disk drive devices, and the like. The intent is to automate a set of processes to enable legacy equipment to be used is a way that minimizes human intervention, improves the quality of the process through the use of Deep learning techniques to improve the quality of the manufacturing process and in the process extend the useful life of the legacy equipment. The present invention relates to the method of automating the manufacturing process rather than the particular type of equipment or manufacturing process being automated.
[0018]
[0019]
[0020]
[0021]
[0022]
[0023] In
[0024] The main network gets input from feature maps 164 within the Frozen Model 160, generated by an object detection model for the display screen 178, such as a modified YOLO (You Only Look Once) and also a confidence vector for the image and text in the screen from Deep learning networks such as a modified YOLO and a modified CTPN (Connectionist Text Proposal Network) respectively. The confidence vector is used as a filter to guarantee no action is taken by the Action classifier 162 which is not relevant to the current state. Also, a custom built LSTM (Long Short Term Memory) model is used to distinguish between similar screens in different states.
[0025]
[0026] Deep learning modules in Step 133 are built with architectures including a modified EfficientNet and a modified Faster-RCNN (Region-based Convolutional Neural Networks), These Deep learning models are trained to identify defects on object surfaces by analysing the input image with modified ResNET-101 (Residual NETworks) layers.
[0027] Results arrived at Step 133 are compared with the results in Step 130 in Step 134. If the compared results are the same the operation proceeds to Step 128 where the machine indexes the wafer to the next Silicon chip to be inspected. If the compared results in Step 134 are not the same, in Step 132 the proxy interpreter sends relevant keyboard and mouse commands to the legacy control system, to update the current silicon chip results in the wafer map file. In effect, the results present in the wafer map file in Step 124, is overwritten with new results in Step 132 for the Silicon Chip under inspection.
[0028] The operation proceeds to Step 128 where the next Silicon chip to be inspected is indexed under the Camera. Subsequently, the operation proceeds to Step 126. The flow continues and repeats until the last Silicon chip to be inspected. This key essential feature of applying new and enhanced inspection methodology to a legacy machine through a proxy interpreter system, is the primary feature of the present invention.
[0029] The methods set forth herein are not necessarily required to be performed in the order described, and the order of the steps of such methods should be understood to be merely exemplary. Likewise, additional steps may be included in such methods, and certain steps may be omitted or combined, in methods consistent with various embodiments of the present invention.
[0030] Although embodiments of the present invention have been described herein, it should be understood that the foregoing embodiments and advantages are merely examples and are not to be construed as limiting the present invention or the scope of the claims. Numerous other modifications and embodiments can be devised by those skilled in the art by applying any neural based computational model that will fall within the spirit and scope of the principles of this disclosure. The present teaching can also be readily applied to other types of legacy systems. More particularly, multiple variations and modifications are possible in the arrangements of the subject combination arrangement within the scope of the disclosure, the drawings and the appended claims. In addition to variations and modifications in the arrangements, alternative uses will also be apparent to those skilled in the art.