[1] Ates, H. (2007). Prediction of gas metal arc welding parameters based on artificial neural networks. Materials & design, 28(7), 2015-2023.
[2] Achebo, J. I. (2011, July). Optimization of GMAW protocols and parameters for improving weld strength quality applying the Taguchi method. In Proceedings of the world congress on engineering (Vol. 1, pp. 6-8).
[3] Kumar, A., Jadoun, R. S., & Bist, A. S. INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Optimization of MIG welding parameters using Artificial Neural Network (ANN) and Genetic Algorithm (GA).
[4] Ambekar, S. D., & Wadhokar, S. R. (2015). Parametric optimization of gas metal arc welding process by using Taguchi method on stainless steel AISI 410. International Journal of Research in Modern Engineering and Emerging Technology, 3(1), 1-9.
[5] Patel, T., Sheth, S., Modi, B. S., & Patel, P. (2015, January). Experimental investigation and comparison of regression model and artificial neural network to predict weld height in MIG welding for dual plate check valve. In International conference on ADVANCES IN MATERIALS AND PRODUCT DESIGN AMPD.
[6] Modelling of lead adsorption from industrial sludge leachate on red mud by using RSM and ANN.
[7] Youssefi, S., Emam-Djomeh, Z., & Mousavi, S. M. (2009). Comparison of artificial neural network (ANN) and response surface methodology (RSM) in the prediction of quality parameters of spray-dried pomegranate juice. Drying Technology, 27(7-8), 910-917.
[8] Geyikçi, F., Kılıç, E., Çoruh, S., & Elevli, S. (2012). Modelling of lead adsorption from industrial sludge leachate on red mud by using RSM and ANN. Chemical Engineering Journal, 183, 53-59.
[9] Van der Aalst, W. M., Rubin, V., Verbeek, H. M. W., van Dongen, B. F., Kindler, E., & Günther, C. W. (2010). Process mining: a two-step approach to balance between underfitting and overfitting. Software & Systems Modeling, 9(1), 87. (overfitting and underfitting)
[10] Jabbar, H., & Khan, R. Z. (2015). Methods to avoid over-fitting and under-fitting in supervised machine learning (comparative study). Computer Science, Communication and Instrumentation Devices, 163-172. (overfitting and underfitting)
[11] James, G., Witten, D., Hastie, T., & Tibshirani, R. (2013). An introduction to statistical learning (Vol. 112, p. 18). New York: springer.
[12] Esmaeelzadeh, S. R., Adib, A., & Alahdin, S. (2015). Long-term streamflow forecasts by Adaptive Neuro-Fuzzy Inference System using satellite images and K-fold cross-validation (Case study: Dez, Iran). KSCE Journal of Civil Engineering, 19(7), 2298-2306.
[13] Kolus, A., Imbeau, D., Dubé, P. A., & Dubeau, D. (2015). Adaptive neuro-fuzzy inference systems with k-fold cross-validation for energy expenditure predictions based on heart rate. Applied ergonomics, 50, 68-78.
[14] Zhang, Y. D., Hou, X. X., Chen, Y., Chen, H., Yang, M., Yang, J., & Wang, S. H. (2018). Voxelwise detection of cerebral microbleed in CADASIL patients by leaky rectified linear unit and early stopping. Multimedia Tools and Applications, 77(17), 21825-21845.
[15] Famouri, M., Taheri, M., & Azimifar, Z. (2015). Fast linear svm validation based on early stopping in iterative learning. International Journal Of Pattern Recognition And Artificial Intelligence, 29(08), 1551013.
[16] ISO, E. 9692-1 (2003) Welding and allied processes-Recommendations for joint preparation-Part1: Manual metal-arc welding, gas shielded metal-arc welding, gas welding, TIG welding and beam welding of steels.
[17] ISO 13588:2019. Non-destructive testing of welds — Ultrasonic testing — Use of automated phased array technology.
[18] Furr, P. A. (2014, October). AWS D1. 1 and D1. 5 Phased Array Examination. In ASNT Annual Conference 2014 (pp. 52-58).
[19] ISO 16811:2012. Non-destructive testing — Ultrasonic testing — Sensitivity and range setting
[20] EN ISO 17635:2016, Non-destructive testing of welds - General rules for metallic materials
[21] ISO, B. 17640: 2010,“. Non-destructive testing of welds—Ultrasonic testing—Techniques, testing levels, and assessment.
[22] Maheshwary, S., Ganguly, S., & Pudi, V. (2017). Deep secure: A fast and simple neural network based approach for user authentication and identification via keystroke dynamics. In IWAISe: First International Workshop on Artificial Intelligence in Security (p. 59).
[23] Jordan, M. I., & Mitchell, T. M. (2015). Machine learning: Trends, perspectives, and prospects. Science, 349(6245), 255-260.