M
Mehrdad Tamiz
Researcher at Kuwait University
Publications - 62
Citations - 3169
Mehrdad Tamiz is an academic researcher from Kuwait University. The author has contributed to research in topics: Goal programming & Portfolio. The author has an hindex of 25, co-authored 62 publications receiving 3005 citations. Previous affiliations of Mehrdad Tamiz include University of Portsmouth & College of Business Administration.
Papers
More filters
Journal ArticleDOI
Goal programming for decision making: an overview of the current state-of-the-art
TL;DR: Modelling techniques such as detection and restoration of pareto efficiency, normalisation, redundancy checking, and non-standard utility function modelling are overviewed, and the rationality of ranking Multi-Criteria Decision Making techniques is discussed.
Journal ArticleDOI
Multi-objective meta-heuristics: An overview of the current state-of-the-art
TL;DR: An overview of meta-heuristics methods utilized within the paradigm of multi-objective programming, which has undergone substantial expansion and development in the past decade is given.
Book
Practical Goal Programming
Dylan Jones,Mehrdad Tamiz +1 more
TL;DR: Practical Goal Programming is intended to allow academics and practitioners to be able to build effective goal programming models, to detail the current state of the art, and to lay the foundation for its future development and continued application to new and varied fields.
Journal ArticleDOI
A review of Goal Programming and its applications
TL;DR: This paper presents a review of the current literature on the branch of multi-criteria decision modelling known as Goal Programming (GP), and the result of investigations of the two main GP methods, lexicographic and weighted GP together with their distinct application areas is reported.
Journal ArticleDOI
Goal programming, compromise programming and reference point method formulations : linkages and utility interpretations
TL;DR: This paper looks at connections between the multi-criteria techniques of goal programming, compromise programming, and the reference point method and the utility function structure of each method is examined.