Classifying Optical Microscope Images of Exfoliated Graphene Flakes By

Total Page:16

File Type:pdf, Size:1020Kb

Classifying Optical Microscope Images of Exfoliated Graphene Flakes By www.nature.com/npj2dmaterials ARTICLE OPEN Classifying optical microscope images of exfoliated graphene flakes by data-driven machine learning Satoru Masubuchi1 and Tomoki Machida1 Machine-learning techniques enable recognition of a wide range of images, complementing human intelligence. Since the advent of exfoliated graphene on SiO2/Si substrates, identification of graphene has relied on imaging by optical microscopy. Here, we develop a data-driven clustering analysis method to automatically identify the position, shape, and thickness of graphene flakes from optical microscope images of exfoliated graphene on an SiO2/Si substrate. Application of the extraction algorithm to optical images yielded optical and morphology feature values for the regions surrounded by the flake edges. The feature values formed discrete clusters in the optical feature space, which were derived from 1-, 2-, 3-, and 4-layer graphene. The cluster centers are detected by the unsupervised machine-learning algorithm, enabling highly accurate classification of monolayer, bilayer, and trilayer graphene. The analysis can be applied to a range of substrates with differing SiO2 thicknesses. npj 2D Materials and Applications (2019) 3:4 ; https://doi.org/10.1038/s41699-018-0084-0 INTRODUCTION classification algorithm for exfoliated graphene flakes using Machine learning enables the extraction of meaningful patterns data-driven analysis and machine-learning algorithms. from examples,1 which is one of the traits that characterize human In general, machine learning algorithms are classified into two 1,19 intelligence. Attempts to automate scientific discovery using categories: supervised learning, in which a human operator machine learning have been rapidly increasing in number,2 and annotates a part of the data to train the models, thereby 20 their advantages have been demonstrated in various research constructing a model that classifies the rest of the data, or fields such as biology,3–5 medicine,6,7 and physics.8–12 Across all unsupervised learning, in which patterns in the data such as the domains, the success of machine-learning methods has been most clusters are detected from the unlabeled data. Since the advent of 13–15 18,21 fi prominent in image analysis. In the context of cell biology, monolayer graphene on SiO2/Si substrates, the identi cation automated optical microscopy has been acquiring high-quality process of the graphene flakes has relied on the recognition of 16 cellular images on an unprecedented scale, thus processing graphene on SiO2/Si substrate by the human operator. The fl large-scale image collections and enabling researchers to auto- parameter tuning process for detecting graphene akes on SiO2/Si matically identify cellular phenotypes.3 In medical image proces- substrates was necessary for the automated searching system of 17 sing, deep-learning technologies are opening up new avenues for graphene flakes. By developing a method based on unsuper- the automated diagnostics of various types of diseases.7 vised learning, it can eliminate the identification process, In research fields concerning two-dimensional (2D) materials, ambiguity in the layer thickness determination, and the parameter the recent development of robotic automation has enabled the tuning process. autonomous search for 2D crystals and subsequent assembly of In this report, we present an unsupervised data-driven analysis the 2D crystals into van der Waals superlattices.17 The robotic method to classify graphene layers using a large set of optical 4 assembly of van der Waals heterostructures has suggested the microscope images. By processing ~7 × 10 images of SiO2/Si possibility for high-throughput production of complicated van der substrates with exfoliated graphene, we extracted ~4 × 105 Waals heterostructures. Besides these functionalities, the system segmented regions enclosed by edges. The optical and morpho- provides an opportunity for collecting optical microscope images logical feature values were extracted from the segmented regions. of the exfoliated 2D crystals on SiO2/Si substrates in a large scale. Plotting the data points in the hue (H), saturation (S), and value (V) When graphene flakes are exfoliated onto SiO2/Si substrates using space resulted in discrete clusters. Analyzing the data points the scotch tape method,18 the graphene flakes of various revealed that the clusters are derived from n-layered graphene, = thicknesses and shapes are randomly distributed over the SiO2/ where n 1, 2, 3, and so on. An unsupervised machine-learning Si substrates. If the images of the entire region of SiO2/Si clustering algorithm based on a non-parametric Bayesian mixture substrates with exfoliated graphene are collected, the image model can detect cluster centers, and they can classify graphene dataset must contain a sufficiently large number of n-layered layers with high accuracy (>95%). These results demonstrate that graphene flakes, where n = 1, 2, 3, and so on. Therefore, a large set identification of graphene layers can be performed by computa- 1,19 of SiO2/Si images can provide an unprecedented level of tional methods, thus introducing new routes for utilizing data- information for developing automated segmentation and a driven methods for the identification of graphene layers and determination of the layer thickness. 1Institute of Industrial Science, University of Tokyo, 4-6-1 Komaba, Meguro-ku, Tokyo 153-8505, Japan Correspondence: Satoru Masubuchi ([email protected]) or Tomoki Machida ([email protected]) Received: 10 September 2018 Accepted: 18 December 2018 Published in partnership with FCT NOVA with the support of E-MRS Satoru Masubuchi and Tomoki Machida 2 a 1. Capture images 2. Extract feature values 3. Clustering analysis Bilateral filter Canny edge detection — ——— Edge closing Feature Y ———— Feature Z Fill up SiO /Si ~50 2 ~ 1×108 features Feature X Regions captured by values Extract feature values optical microscope 1234567890():,; Fig. 1 Data-driven analysis workflow and raw scatter plots of extracted feature values. a Schematic of data analysis workflow. First, the optical microscope images of the SiO2/Si substrate are acquired using the automated optical microscope. The acquired images are fed into the feature extraction pipeline. The segmented region surrounded by the optical edges are applied to the image, generating ~50 feature values from each region (Supplementary Table 1). The extracted feature values are analyzed by the data analysis methods. Since each data point is linked to the optical microscope images, the corresponding images can be investigated in the preceding process. b–d The scatter plots of the feature values: b Sarea vs. IH, c Sarea vs. IS−BG, and d Sarea vs. IV−BG RESULTS color value of the monolayer, bilayer, and trilayer graphene flakes Label-free analysis workflow in advance. By utilizing the extracted regions as the masks to the fi fl fi images, ~50 types of feature values were extracted from each The rst step in the work ow of automated graphene classi ca- 23 tion was to capture optical microscope images of entire exfoliated region (summarized in Supplementary Table 1). The extracted feature values were categorized into three classes: morphology, graphene flakes on the SiO /Si substrate (Fig. 1a). Twenty-four 2 optical intensity, or positions. By applying the data analysis SiO /Si substrates with the size of 1 × 1 cm2 with exfoliated 2 pipeline to the ~7 × 104 images of SiO /Si with exfoliated graphene flakes were tiled onto the silicon chip tray and were 2 graphene layers, ~105 regions were detected and ~107 feature scanned by the automated optical microscope.17 Two types of values were extracted. At least 3–4 SiO2/Si substrates were SiO2/Si substrates with different SiO2 thicknesses of d ~ 290 and 22 required to perform the clustering analysis (Supplementary note 85 nm were used to demonstrate the generality of the image 1). We analyzed the feature values using the data analytics analysis pipeline. The images were acquired using a CMOS camera frameworks Pandas, Matplotlib, Jupyter notebook, and Scikit-learn capable of capturing images in high bit depth (12-bit), which (see Methods). enables accurate detection of the edge patterns. The data were Figure 1b–d show the scatter plots of the area Sarea and the stored in a large-scale storage, comprising a large number of raw optical feature values extracted from the regions in the HSV color optical microscope images of ~1 TB. The images were then space IH, IS−BG, and IV−BG. As the values of optical features, we processed by the feature extraction algorithm (see Methods and utilized the medians of the optical intensities in the HSV color Supplementary Figure 1). The algorithm detects the regions space IH, IS, and IV, respectively. Here, in order to compensate for enclosed by the edges. The third panel of Fig. 1a shows the the unequal illumination of the field, we extracted the medians of representative output of the segmentation algorithm applied to the optical intensities of the bare SiO2/Si substrates without fl the image containing exfoliated graphene akes. The segmented exfoliated graphene IS,BG and IV,BG, and the background values areas were indicated by the colored regions in the third panel of were subtracted for the S and V color spaces as IS−BG = IS − IS,BG Fig. 1a. The process was performed without assuming the specific and IV−BG = IV − IV,BG. The background subtraction was not applied npj 2D Materials and Applications (2019) 4 Published in partnership with FCT NOVA with the support of E-MRS Satoru Masubuchi and Tomoki Machida 3 a A–E in Fig. 2a. These clusters emerged simply on applying the d = 290 nm feature extraction algorithm to the large set of optical microscope images. Therefore, the presented clustering results are expected to be robust against the changes in the experimental parameters. To explore the generality of the image analysis pipeline, we applied the same algorithm to the optical microscope images of SiO2/Si substrates with a thickness d = 85 nm.
Recommended publications
  • Smart Contracts for Machine-To-Machine Communication: Possibilities and Limitations
    Smart Contracts for Machine-to-Machine Communication: Possibilities and Limitations Yuichi Hanada Luke Hsiao Philip Levis Stanford University Stanford University Stanford University [email protected] [email protected] [email protected] Abstract—Blockchain technologies, such as smart contracts, present a unique interface for machine-to-machine communication that provides a secure, append-only record that can be shared without trust and without a central administrator. We study the possibilities and limitations of using smart contracts for machine-to-machine communication by designing, implementing, and evaluating AGasP, an application for automated gasoline purchases. We find that using smart contracts allows us to directly address the challenges of transparency, longevity, and Figure 1. A traditional IoT application that stores a user’s credit card trust in IoT applications. However, real-world applications using information and is installed in a smart vehicle and smart gasoline pump. smart contracts must address their important trade-offs, such Before refueling, the vehicle and pump communicate directly using short-range as performance, privacy, and the challenge of ensuring they are wireless communication, such as Bluetooth, to identify the vehicle and pump written correctly. involved in the transaction. Then, the credit card stored by the cloud service Index Terms—Internet of Things, IoT, Machine-to-Machine is charged after the user refuels. Note that each piece of the application is Communication, Blockchain, Smart Contracts, Ethereum controlled by a single entity. I. INTRODUCTION centralized entity manages application state and communication protocols—they cannot function without the cloud services of The Internet of Things (IoT) refers broadly to interconnected their vendors [11], [12].
    [Show full text]
  • Microscope Systems and Their Application in Machine Vision
    Microscope Systems And Their Application in Machine Vision 1 1 Agenda • What is a microscope system? • Basic setup of a microscope • Differences to standard lenses • Parameters of microscope systems • Illumination options in a microscope setup • Special contrast enhancement techniques • Zoom components • Real-world examples What is a microscope systems? Greek: μικρός mikrós „small“; σκοπεῖν skopeín „observe“ Microscopes help us to look at small things, by enlarging them until we can see them with bare eyes or an image sensor. A microscope system is a system that consists of compatible components which can be combined into different configurations We only look at visible light microscopes We only look at digial microscopes no eyepiece but an image sensor in the object plane The optical magnification is ≥1 Basic setup of a microscope microscopes always show the same basic configuration: Sensor Tube lens: - Images onto the sensor - Defines the maximum sensor size Collimated beam path (infinity conjugated) Objective: - Images to infinity - Holds the system aperture - Defines the resolution of the system Object Differences to standard lenses microscope Finite-finite lens Sensor Sensor Collimated beam path (infinity conjugate) EnthältSystem apertureSystemblende Object Object Differences to standard lenses • Collimated beam path offers several options - Distance between objective and tube lens can be changed . Focusing by moving the objective without changing any optical parameter . Integration of filters, mirrors and beam splitters . Beam
    [Show full text]
  • Second Machine Age Or Fifth Technological Revolution? Different
    Second Machine Age or Fifth Technological Revolution? Different interpretations lead to different recommendations – Reflections on Erik Brynjolfsson and Andrew McAfee’s book The Second Machine Age (2014). Part 1 Introduction: the pitfalls of historical periodization Carlota Perez January 2017 Blog post: http://beyondthetechrevolution.com/blog/second-machine-age-or-fifth-technological- revolution/ This is the first instalment in a series of posts (and a Working Paper in progress) that reflect on aspects of Erik Brynjolfsson and Andrew McAfee’s influential book, The Second Machine Age (2014), in order to examine how different historical understandings of technological revolutions can influence policy recommendations in the present. Over the next few weeks, we will discuss the various criteria used for identifying a technological revolution, the nature of the current moment, and the different implications that stem from taking either the ‘machine ages’ or my ‘great surges’ point of view. We will look at what we see as the virtues and limits of Brynjolfsson and McAfee’s policy proposals, and why implementing policies appropriate to the stage of development of any technological revolution have been crucial to unleashing ‘Golden Ages’ in the past. 1 Introduction: the pitfalls of historical periodization Information technology has been such an obvious disrupter and game changer across our societies and economies that the past few years have seen a great revival of the notion of ‘technological revolutions’. Preparing for the next industrial revolution was the theme of the World Economic Forum at Davos in 2016; the European Union (EU) has strategies in place to cope with the changes that the current ‘revolution’ is bringing.
    [Show full text]
  • The History of Computing in the History of Technology
    The History of Computing in the History of Technology Michael S. Mahoney Program in History of Science Princeton University, Princeton, NJ (Annals of the History of Computing 10(1988), 113-125) After surveying the current state of the literature in the history of computing, this paper discusses some of the major issues addressed by recent work in the history of technology. It suggests aspects of the development of computing which are pertinent to those issues and hence for which that recent work could provide models of historical analysis. As a new scientific technology with unique features, computing in turn can provide new perspectives on the history of technology. Introduction record-keeping by a new industry of data processing. As a primary vehicle of Since World War II 'information' has emerged communication over both space and t ime, it as a fundamental scientific and technological has come to form the core of modern concept applied to phenomena ranging from information technolo gy. What the black holes to DNA, from the organization of English-speaking world refers to as "computer cells to the processes of human thought, and science" is known to the rest of western from the management of corporations to the Europe as informatique (or Informatik or allocation of global resources. In addition to informatica). Much of the concern over reshaping established disciplines, it has information as a commodity and as a natural stimulated the formation of a panoply of new resource derives from the computer and from subjects and areas of inquiry concerned with computer-based communications technolo gy.
    [Show full text]
  • Reverse Engineering Integrated Circuits Using Finite State Machine Analysis
    Proceedings of the 50th Hawaii International Conference on System Sciences | 2017 Reverse Engineering Integrated Circuits Using Finite State Machine Analysis Jessica Smithy, Kiri Oler∗, Carl Miller∗, David Manz∗ ∗Pacific Northwest National Laboratory Email: fi[email protected] yWashington State University Email: [email protected] Abstract are expensive and time consumptive but extremely accurate. Due to the lack of a secure supply chain, it is not possible Alternatively, there are a variety of non-destructive imaging to fully trust the integrity of electronic devices. Current methods for determining if an unknown IC is different from methods of verifying integrated circuits are either destruc- an ’assumed-good’ benchmark IC. However, these methods tive or non-specific. Here we expand upon prior work, in often only work for large or active differences, and are which we proposed a novel method of reverse engineering based on the assumption that the benchmark chip has not the finite state machines that integrated circuits are built been corrupted. What is needed, and what we will detail upon in a non-destructive and highly specific manner. In in the following sections, is an algorithm to enable a fast, this paper, we present a methodology for reverse engineering non-destructive method of reverse engineering ICs to ensure integrated circuits, including a mathematical verification of their veracity. We must assume the worst case scenario in a scalable algorithm used to generate minimal finite state which we have no prior knowledge, no design documents, machine representations of integrated circuits. no labeling, or an out-of-production IC. The mathematical theory behind our approach is pre- 1.
    [Show full text]
  • ERC Machine Shop Operational Policy
    College of Engineering --- Colorado State University Machine Shop Operational Policy Engineering Research Center November 2011 Table of Contents 1.0 Introduction and Context ................................................................................................................... - 1 - 1.1 Purpose ........................................................................................................................................... - 1 - 1.2 Introduction .................................................................................................................................... - 1 - 1.3 Contact Information ....................................................................................................................... - 1 - 2.0 Safety: Rules, Procedures and Guidelines ......................................................................................... - 1 - 2.1 General Shop Safety Rules and Conduct: ...................................................................................... - 1 - 2.2 Personal Protective Equipment (Eyes, Ears, Respiration, Body, Hands) ...................................... - 3 - 2.2.1. Protective Clothing ................................................................................................................. - 3 - 2.2.2 Eye Protection ......................................................................................................................... - 3 - 2.2.3 Protective Gloves ...................................................................................................................
    [Show full text]
  • The Impact of the Technological Revolution on Labour Markets and Income Distribution
    Department of Economic & Social Affairs FRONTIER ISSUES 31 JULY 2017 The impact of the technological revolution on labour markets and income distribution CONTENTS Executive Summary .................................................... 1 1. Introduction ....................................................... 3 2. A new technological revolution? ....................................... 4 A. Technological progress and revolutions ............................. 4 B. Economic potential of the new technological breakthroughs ............. 7 3. Long term and recent trends .......................................... 8 A. Productivity trends .............................................. 8 B. Sectoral employment shifts and work conditions ..................... 11 C. Income inequality .............................................. 14 4. How does technological innovation affect labour markets and inequality? ..... 17 A. Job destruction and job creation ................................. 17 B. Occupational shifts, job polarization and wage inequality .............. 20 C. Technology and globalization .................................... 21 D. Technology and market structures. .22 E. Technology and the organization of work ........................... 23 F. Technology and the informal sector ............................... 23 G. Technology and female labour force participation .................... 24 5. Looking ahead: What will technology mean for labour and inequality? ........ 26 A. The future of technological progress ............................... 26
    [Show full text]
  • The Machine That Changed the World
    Leggi e ascolta. The machine that changed the world Between the late 1700s and the late 1800s, factories, machines and hundreds of new inventions changed the lives of millions of people. Today we call this time the Industrial Revolution – and the energy for that revolution came from one important invention: the Watt Steam Engine. Before the Industrial Revolution, most machines were a few simple parts – and they needed animals, wind or water to move them. At the time, people made everything by hand – from furniture and clothes to houses and ships. Then, in May 1765, a young Scottish engineer called James Watt invented a new type of steam engine. It quickly changed the world. High Five Exam Trainer . Oral presentation 13, CLIL History p. 64 © Oxford University Press PHOTOCOPIABLE A steam engine burns coal to heat water and to change it into steam. Then the hot steam moves the parts of the engine. Watt’s Steam Engine was much more efficient than the first steam engines – it used less coal and it could produce enough energy to move big, heavy machines. It could also work faster, and it could turn a wheel. This was important because people could use it to move the parts of machines in factories. Soon, new factories appeared all over Britain. At the same time, people invented new factory machines to make lots of different products. These factories needed new workers, so millions of people left their villages and went to work in the towns. Some factory towns quickly developed into big cities. Other engineers later changed the design of Watt’s Steam Engine.
    [Show full text]
  • TECHNOLOGY RESOURCES (Resources Are Things We Need to Get a Job Done) Steve Krar Resources Are Things We Need to Get a Job Done
    1 TECHNOLOGY RESOURCES (Resources are Things we Need to get a Job Done) Steve Krar Resources are things we need to get a job done. Every technological system makes use of seven types of resources: people, information, materials, tools and machines, energy, capital, and time. People Technology comes from the needs of people and people's needs drive technology. Humans use what they know, try to learn more, design and create technology using their knowledge and intelligence. NASA scientists had to combine their knowledge with new ideas to come up with a space vehicle and a way to get it to the moon and back safely. People provide the labor on which technology depends, they are needed to provide the products and services we use every day. People are also the consumers of technology and the ones that buy consumer goods produced such as food, cars, homes, etc. Information Technology requires information to solve problems and to create new knowledge. Information comes from raw data, that is processed by collecting, recording, classifying, calculating, storing, and retrieving it. Information can be found in many places: in computer files, books, etc., but it is only valuable when we make use of it. We process information by collecting it, thinking about it, and applying it to meet our needs and wants. Materials Natural resources found in nature are called raw materials. These include air, water, land, timber, minerals, plants, and animals. Synthetic materials are manufactured materials that may have useful characteristics natural materials do not have. Raw Materials There are two types of raw materials available for humans to use: 1.
    [Show full text]
  • Eras of Technological Convergence: Machine Tools and Mechanization in the United States
    Eras of Technological Convergence: Machine Tools and Mechanization in the United States, 1820-1929 Ross Thomson University of Vermont Prepared for the Economic History Association meetings, September 2010 Abstract: Following up on the seminal insights of Nathan Rosenberg, this paper explores how, and how widely, technology converged among U.S. machine-tool using industries from 1815 through 1930. Convergence involved the invention and spread of machine tools, and both occurred in a variety of ways. Through the study of Brown and Sharpe company records, census data, and patenting by metalworking lathe inventors and machine tool firms, I argue that machine tools evolved through three stages of progressively wider convergence and different organizational forms. Through 1865, firms often made their own machine tools and used inventions in their own firms. Convergence was narrow, occurring through diversification by machinery firms, incipient sale of general purpose machine tools, and some worker mobility. From 1865 through the 1890s, machine tool firms became more central to the invention and dissemination of machine tools among industries. Widening mobility and new firm formation by workers trained by machine tool firms, along with some diversification, added to the convergence. After 1900, machine tool firms and their workers remained central to invention and diffusion for established industries and autos and other new sectors. But major innovations also emerged and spread from new sources making complements to machine tools, notably the steel and electrical industries, so that materials science and electrification had come to contribute to metalworking industries. Eras of Technological Convergence: Machine Tools and Mechanization in the United States, 1820-1929 The United States was widely recognized for its breadth of mechanization, a breadth that by the 1920s led the world in autos, electrical equipment, and machines to reap, mine, print, spin, sew, type, and make machines.
    [Show full text]
  • A Brief History of IT
    IT Computer Technical Support Newsletter A Brief History of IT May 23, 2016 Vol.2, No.29 TABLE OF CONTENTS Introduction........................1 Pre-mechanical..................2 Mechanical.........................3 Electro-mechanical............4 Electronic...........................5 Age of Information.............6 Since the dawn of modern computers, the rapid digitization and growth in the amount of data created, shared, and consumed has transformed society greatly. In a world that is interconnected, change happens at a startling pace. Have you ever wondered how this connected world of ours got connected in the first place? The IT Computer Technical Support 1 Newsletter is complements of Pejman Kamkarian nformation technology has been around for a long, long time. Basically as Ilong as people have been around! Humans have always been quick to adapt technologies for better and faster communication. There are 4 main ages that divide up the history of information technology but only the latest age (electronic) and some of the electromechanical age really affects us today. 1. Pre-Mechanical The earliest age of technology. It can be defined as the time between 3000 B.C. and 1450 A.D. When humans first started communicating, they would try to use language to make simple pictures – petroglyphs to tell a story, map their terrain, or keep accounts such as how many animals one owned, etc. Petroglyph in Utah This trend continued with the advent of formal language and better media such as rags, papyrus, and eventually paper. The first ever calculator – the abacus was invented in this period after the development of numbering systems. 2 | IT Computer Technical Support Newsletter 2.
    [Show full text]
  • Advanced Manufacturing Machine Technology CERTIFICATE
    Advanced Manufacturing Machine Technology CERTIFICATE CONSIDER MANUFACTURING The Southwestern Connecticut Advanced Manufacturing Technology Center, established at • Do you enjoy working with tools and computers? Housatonic Community College in 2012, is part of • Do you like working with your hands as well as your mind? a statewide initiative to provide skilled employees • Are you curious about the way things work and how they for the growing manufacturing industry. are made? • Do you possess the ability to focus on precision and quality? From research and development, to • Are you interested in learning advanced technologies manufacturing, to maintenance and repair, skilled with the latest software and equipment? machinists are in great demand. Machinists • Are you curious about manufacturing careers in the aerospace, now use sophisticated manual and computer biomedical, plastics & composites or metals sectors? numerically controlled (CNC) machine tools, precision instruments, and state-of-the-art If the answer to any of these questions is yes, the Advanced software to produce tools and parts for a wide Manufacturing Machine Technology program may be for you. range of industries. Current labor statistics indicate dramatic “Manufacturers in Fairfield and New Haven counties shortages of skilled workers and anticipated have been asking for a program that will provide skilled growth (not including attrition projections) of workers capable of meeting our employment needs. We 3000 Connecticut jobs per year through 2030. stand ready to support and hire HCC graduates who can According to CCSU labor statistics, average make the grade.” starting salaries are above $42,000, with Kris Lorch, President - Alloy Engineering projections including overtime and fringe benefits New Haven Manufacturers Association (health insurance, 401k plans etc.) after five years Manufacturer’s Training and Education Alliance (METAL) approaching $70,000.
    [Show full text]