Get my own profile
Public access
View all28 articles
4 articles
available
not available
Based on funding mandates
Co-authors
C J HarrisEm. Professor of Computational Intelligence , Southampton UniversityVerified email at ecs.soton.ac.uk
Sheng ChenProfessor, University of SouthamptonVerified email at ecs.soton.ac.uk
Professor Junbin GaoDiscipline of Business Analytics in Business School, The University of SydneyVerified email at sydney.edu.au
Richard James MitchellProfessor of Cybernetics, University of ReadingVerified email at reading.ac.uk
Paul SharkeyProfessor of Cybernetics (Emeritus), University of ReadingVerified email at reading.ac.uk
Ming GaoUniversity of ReadingVerified email at pgr.reading.ac.uk
Yifan FuUTSVerified email at student.uts.edu.au
Kevin WarwickEmeritus Professor, Coventry University & University of ReadingVerified email at coventry.ac.uk
Kang LiUniversity of LeedsVerified email at leeds.ac.uk
John Q GanEssex University, School of Computer Science and Electronic EngineeringVerified email at essex.ac.uk
L HanzoChair of Telecommunications, University of SouthamptonVerified email at ecs.soton.ac.uk
William HarwinProfessor of interactive systems and robotics, University of ReadingVerified email at reading.ac.uk
George W IrwinEmeritus Professor of Control Engineering, Queens University Belfast, UK
Follow
Xia Hong
Professor of Computational Intelligence, University of Reading
Verified email at reading.ac.uk