Next Article in Journal
Survey of Hermite Interpolating Polynomials for the Solution of Differential Equations
Next Article in Special Issue
Decision-Making Model of Performance Evaluation Matrix Based on Upper Confidence Limits
Previous Article in Journal
The Limit Properties of Maxima of Stationary Gaussian Sequences Subject to Random Replacing
Previous Article in Special Issue
Negentropy as a Measure to Evaluate the Resilience in Industrial Plants
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Note on Weibull Parameter Estimation with Interval Censoring Using the EM Algorithm

Applied Statistics Laboratory, Department of Industrial Engineering, Pusan National University, Busan 46241, Republic of Korea
Mathematics 2023, 11(14), 3156; https://doi.org/10.3390/math11143156
Submission received: 9 June 2023 / Revised: 10 July 2023 / Accepted: 16 July 2023 / Published: 18 July 2023

Abstract

:
In many engineering applications, it is often the case that the observations are only available in interval form. In this note, by using the expectation-maximization (EM) algorithm, the parameter estimation of the Weibull distribution with interval-censored data is considered. The estimates obtained using the EM algorithm are compared with those obtained using the conventional Newton-type methods, including the Davidon–Fletcher–Powell (DFP) and Berndt–Hall–Hall–Hausman (BHHH) methods. The results indicate that the estimates obtained using the proposed EM method demonstrate superior convergence properties compared to the conventional DFP and BHHH methods. Finally, a numerical study that illustrates the advantages of the proposed method is provided.
MSC:
62F10; 62N02

1. Introduction

In various data-driven studies, it is often the case that observations are only available in interval form. For example, in a go or no-go inspection scheme, it may be the case that the incoming observations are recorded as pass or no pass according to whether they meet an interval requirement [ a , b ] . For a go or no-go inspection, plug gauges are widely used and are usually made in pairs. One side is for the go gauge (lower hole gauge) and the other side is for the no-go gauge (upper hole gauge). For example, if the go gauge can enter the hole, then it is an indication that the hole diameter is above the lower limit. If the no-go gauge cannot enter the hole, then it is an indication that the hole diameter is below the upper limit. The part is then accepted because its hole diameter is inside the tolerance band.
Notice that in the go or no-go inspection system, if an observation passes the interval inspection scheme, then it is said to be interval-censored at [ a , b ] . This indicates that the value of the observation lies somewhere between the values of a and b. As an illustration of interval-censored observations, a sorting machine example is provided in Figure 1. In addition, if an observation is discarded because it exceeds the allowable limit, then the allowable limit (denoted as d) is lower than the actual but unknown measurement (denoted as X). This type of observation is referred to as right-censored at d (that is, d X or [ d , ] ). Similarly, if an observation is discarded because it falls below the allowable limit, it indicates that the allowable limit (denoted as c) is greater than the actual measurement. This type of observation is called left-censored at c (that is, c X or [ 0 , c ] ).
It should be noted that right-censoring is quite common in reliability studies. For example, one may be conducting lifetime tests on light bulbs where most of the lifetimes end up being less than 5000 h, but some of them are still operating after 5000 h. Rather than waiting for the lifetimes of the still-operating light bulbs to end, it will often be the case that these observations are measured as being right-censored with the value of 5000. Therefore, the final sample will consist of both fully observed and right-censored observations.
In the standard case where some observations are fully observed and others are left-, right- or interval-censored, the resulting data set is said to be incomplete. One obvious methodology for dealing with an incomplete data set is to include the fully-observed observations in the subsequent analysis and discard all observations that are in any way censored so that a conventional method that deals only with full observations can be utilized. The obvious disadvantage of the discarding approach is that, if the number of censored observations is large relative to the total number of observations in the sample, then a large amount of information is being discarded. In order to avoid this problem, one can instead use all of the observations and build the likelihood function that needs to be maximized. Clearly, in order to obtain the maximum of the resulting likelihood function, a numerical optimization scheme is required. However, an ordinary numerical method such as Newton-type iterative methods, including the Davidon–Fletcher–Powell (DFP) method [1] and the Berndt–Hall–Hall–Hausman (BHHH) method [2], will often be ineffective when applied to complicated likelihood functions. Furthermore, such a numerical method will often be quite sensitive to the choice of starting values. Recently, the IcenReg R package [3] was developed. This package allows for the analysis of interval censored data using parametric, nonparametric, and semiparametric models, including the Weibull distribution. However, we have observed that the numerical results based on this package often become unstable when the shape parameter of the Weibull distribution is very small or very large.
It is important to emphasize that, when estimating parameters using all of the observations, including those that are censored, the resulting likelihood can be complicated. Therefore, rather than obtaining the maximum-likelihood estimate (MLE) by direct maximization of the likelihood, approximations of the MLE and the best linear unbiased estimate (BLUE) have been provided in the literature. For example, Gupta [4] has provided the BLUE for Type-I and Type-II right-censored samples from a normal distribution. For more details on Type-I and Type-II censoring, one is referred to [5] and Section 7.5 of [6]. Govindarajulu [7] has derived the BLUE for a symmetrically Type-II censored sample from a Laplace distribution, but it can be used only for sample size up to n = 20 . Balakrishnan [8] and Hassanein et al. [9] also considered the estimation of the scale parameter of the Rayleigh distribution with censored observations. However, the BLUE derived by [9] is limited to the case where the sample sizes are n = 5 , 6 , , 24 , 25 , 30 , 35 , , 45 , and the number of censored observations is limited to r = 0 , 1 , , n 2 . For more details, see Appendix F of [10]. Sultan [11] has given an approximation of the MLE for a Type-II right-censored sample from a normal distribution. Balakrishnan [12] has derived the BLUE for a Type-II right-censored sample for the Laplace distribution. Note that the BLUE requires the coefficients which are tabulated in [12] but the table is provided only for sample sizes up to n = 20 . In addition, the approximate MLE and the BLUE are not guaranteed to converge to the actual MLE. Another more serious problem is that the methods cited above cannot handle general cases where there are interval-censored observations. The methods cited are restricted to Type-I/Type-II right-censoring or symmetric censoring for sample sizes up to n = 20 or n = 45 .
In order to overcome the issues that come with the analysis of interval-censored data, the use of the EM algorithm [13] for parameter estimation is proposed. However, it is often the case that the implementation of the EM algorithm is quite difficult because the expectation of the log-likelihood in the E-step is generally complex or unavailable in closed form. This problem has been studied by several authors, including Panahi and Asadi [14], Guure et al. [15], Pradhan and Kundu [16], Ferreira and Silva [17], Park [18], Saeed and Elfaki [19], Kurniawan et al. [20], Ameen and Akkash [21], and Almetwally et al. [22].
Panahi and Asadi [14] consider the estimation for Type-II censored samples. This method is limited to the case of right censoring and its estimation is based on the Newton–Raphson iterative procedure. Guure et al. [15] considered the MLE with interval-censored data but obtained it using a simple numerical approximation. Pradhan and Kundu [16] suggested the use of a pseudo-likelihood function in the E-step, Park [18] used the quantile implementation of the E-step, and  Saeed and Elfaki [19] used imputation techniques. Kurniawan et al. [20] considered the EM algorithm approach, but they estimated only the shape parameter with Type-II censored observations. Ameen and Akkash [21] obtained the MLE of the three-parameter Weibull with interval-censored data, but they estimated the parameters based on the Newton–Raphson method. Almetwally et al. [22] analyzed progressive Type-II censoring data but the MLE was obtained by utilizing the Newton–Raphson method. Unfortunately, these approaches are not guaranteed to find the maximum of the likelihood function with interval-censored observations. Recently, Ferreira and Silva [17] obtained the MLE of the Weibull using the EM algorithm, but they considered only right-censored data. In this paper, the expectation of the log-likelihood in the E-step is explicitly obtained so that the standard EM algorithm can be used. The use of the standard EM algorithm guarantees that the maximum of the likelihood function with interval-censored observations will be attained.
In this paper, it is assumed that a random sample is generated from the Weibull distribution [23] with the probability density and cumulative distribution functions given below:
f ( x ) = κ x κ 1 θ κ exp x θ κ and F ( x ) = 1 exp x θ κ ,
where x > 0 , κ > 0 and θ > 0 .
This paper is organized as follows. In Section 2, the general likelihood function with full and censored observations is provided. In Section 3, the EM algorithm is briefly reviewed. The implementation of the EM algorithm and the parameter estimation method are provided in Section 4. A real-data example illustrating the complexity associated with parameter estimation is provided in Section 5. The paper ends with concluding remarks in Section 6.

2. Likelihood Function for Parameter Estimation in the Interval-Censored Case

As explained in the introduction, a measurement, y i , is of the interval-censored form if the measurement is only known to fall in an interval:
a i y i b i .
The advantage of the interval-censoring formulation in Equation (2) is that it generalizes according to specific censoring conditions. By letting a i and b i take on the values ± in Equation (2), the interval-censoring formulation includes the left-censored and right-censored measurement conditions as special cases. For example, by letting b i = and a i equal the censored value, one obtains the right-censored condition. Similarly, by letting a i = and b i equal to the censored value, one obtains the left-censored condition. Finally, by setting y i = a i = b i one obtains the fully-observed condition. It should be noted that, if the support of the distribution is a positive number and the observation is left-censored, then one can set a i = 0 instead of a i = . This generality of the interval-censoring formulation is extremely useful in a reliability setting because it is often the case that one sample can contain measurements that arrive under varying censoring conditions. In what follows, the likelihood function in the interval-censored case is provided, but it should be emphasized that the formulation is completely general in that any censoring condition can be handled transparently.
Suppose that the interval-censored data [ a j , b j ] for j = 1 , , m is obtained. Then, by ignoring the normalizing constant, the likelihood function is obtained as
L ( Θ ) j = 1 m [ F ( b j ) F ( a j ) ] ,
where F ( · ) is a cumulative distribution function. For more details regarding the above likelihood function in Equation (3), one is referred to [24].
Similarly, in the more common case when fully-observed and censored data are both present in the same sample, the likelihood function becomes:
L ( Θ ) i = 1 n f ( y i ) · j = 1 m [ F ( b j ) F ( a j ) ] .
Note that the likelihood in Equation (4) can often be quite complex and difficult to maximize numerically.

3. The EM Algorithm

In this section, we describe the EM algorithm briefly and show that one can use the EM algorithm to estimate the unknown parameters when the likelihood has an interval-censored component. The EM methodology is often a convenient alternative to the more standard estimation approach in which the likelihood of the sample is constructed and then maximized through the use of a numerical optimization such as the Newton–Raphson method. The EM algorithm was proposed by [13] in order to overcome the frequent difficulties associated with more conventional numerical optimization techniques. Good references for the EM algorithm are  [25,26,27,28,29].
Suppose that w = ( w 1 , , w n ) are independent and identically distributed (iid) and have a continuous distribution with pdf f ( w ) . Note that it is assumed that the sample w = ( w 1 , , w n ) contains at least one data point that is of interval-censored form. For example, if  w 1 is interval-censored at a 1 and b 1 , then this implies that all we know is that a 1 w 1 b 1 . Under the assumption that at least one measurement is of interval-censored form, then the sample is usually referred to as incomplete data in the EM literature.
In what follows, we reformulate the difficult likelihood problem as a missing-data problem, which then allows us to employ the EM algorithm in order to construct the EM sequences. In this manner, we avoid constructing the often complicated likelihood along with the pitfalls associated with the use of conventional numerical optimization.
Let us denote the fully observed (uncensored) part of w 1 , , w n by y = ( y 1 , , y m ) and the missing (censored) part by z = ( z m + 1 , , z n ) with a i z i b i . Also, let us denote the vector of unknown parameters as Θ = ( κ , θ ) . Then, ignoring the normalizing constant, the complete-data likelihood is shown below:
L c ( Θ | y , z ) i = 1 n f ( w i ) .
Now, it will often be the case that the complete-data likelihood above is quite difficult to maximize directly because of its inherent complexity. The key idea underlying the EM algorithm is that it solves a difficult incomplete-data problem by constructing two simpler steps, referred to as the E-step and M-step, respectively. These two steps are repeated over and over until the optimal parameter estimates are obtained. The E-step constructs the conditional expectation of the complete-data log-likelihood function, ln L c ( Θ | y , z ) , where the expectation is taken with respect to the missing part z of the complete data.
Then, in the M-step, one maximizes the expected log-likelihood function that was constructed during the E-step. It is often the case that the EM algorithm will result in an EM sequence that is straightforward to compute. To summarize, the EM algorithm consists of two distinct steps:
  • E-step: compute Q ( Θ | Θ ( s ) ) = ln L c ( Θ | y , z ) f ( z | y , Θ ( s ) ) d z ,
    where f ( · | · ) is the conditional pdf given the fully-observed y with the estimated parameter Θ ( s ) at the sth step.
  • M-step: find the Θ ( s + 1 ) that maximizes Q ( Θ | Θ ( s ) ) in Θ .
The E-step and M-step are repeated successively until the change in the estimates, namely, Θ ( s + 1 ) Θ ( s ) , is relatively small. For example, one can stop the EM algorithm if | Θ ( s + 1 ) Θ ( s ) | < ϵ | Θ ( s + 1 ) | , where ϵ is a pre-determined precision of the estimates. The example provided in the following section should elucidate the steps behind the EM algorithm.

4. The Implementation of the EM Algorithm and Parameter Estimation Method

In this section, the explicit Q ( Θ | Θ ( s ) ) function is provided along with the one-dimensional objective function, both of which allow for the estimation of the Weibull parameters using the EM algorithm. First, the explicit form of Q function is derived in the E-step. Deriving this expression requires the use of some complicated calculus and algebra. Next, using the explicit form obtained in the E-step, we obtain the one-dimensional objective function, which allows for a straightforward estimation of the Weibull parameters.

4.1. E-Step

It is immediate upon using Equations (1) and (5) that the complete-data log-likelihood function is given by
ln L c ( Θ | y , z ) = i = 1 n ln f ( w i ) = n ln κ n κ ln θ + κ i = 1 m ln y i 1 θ κ i = 1 m y i κ + κ i = m + 1 n ln z i 1 θ κ i = m + 1 n z i κ + C ,
where C is a term that does not include the parameters κ and θ .
Because of the iid structure, the conditional pdf of the missing data z , given the fully-observed data y with the parameter, does not depend on the observed data. Considering a i z i b i , we have
f ( z | y , Θ s ) = f ( z | Θ s ) = i = m + 1 n f ( z i | Θ s )
where Θ s = ( κ s , θ s ) and   
f ( z i | Θ s ) = κ s z i κ s 1 θ s κ s exp z i θ s κ s exp a i θ s κ s exp b i θ s κ s ,
for a i < b i and a i z i b i . Then, using Equations (6) and (7), we can compute
Q ( Θ | Θ ( s ) ) = ln L c ( Θ | y , z ) f ( z | y , Θ ( s ) ) d z .
In order to obtain the explicit integral result, the following lemmas, theorems, and corollary are needed.
Lemma 1.
For a > 0 , we have
a ln z · z p 1 exp z p r d z = r ln a p exp a p r + r p 2 Γ 0 , a p r .
where Γ is the upper incomplete gamma function defined as
Γ ( κ , β ) = β t κ 1 exp ( t ) d t .
Proof. 
We let t = z p / r . Then, we have
z = ( r t ) 1 / p and d z = 1 p r 1 / p t 1 / p 1 d t .
The following is obtained using the relation above:
a ln z · z p 1 exp z p r d z = a p / r r p 2 ( ln r + ln t ) exp ( t ) d t = r ln r p 2 a p / r exp ( t ) d t + r p 2 a p / r ln t · exp ( t ) d t = r ln r p 2 exp a p r + r p 2 a p / r ln t · exp ( t ) d t .
Using integration by parts, the last term in Equation (9) becomes
a p / r ln t · exp ( t ) d t = ln t · exp ( t ) a p / r + a p / r t 1 exp ( t ) d t = ( p ln a ln r ) exp a p r + Γ 0 , a p r .
Substituting Equation (10) into the last term in Equation (9), we obtain
a ln z · z p 1 exp z p r d z = r ln a p exp a p r + r p 2 Γ 0 , a p r ,
which completes the proof.    □
Lemma 2.
We have
lim a 0 a ln z · z p 1 exp z p r d z = r p 2 ( ln r γ ) ,
where γ is the Euler–Mascheroni constant given by
γ = lim n ln n + k = 1 n 1 k 0.57721566490153 .
Proof. 
The exponential integral is defined as
Ei ( x ) = x t 1 exp ( t ) d t ,
for x 0 . Then, it is easily seen that the upper incomplete gamma function in Equation (8) satisfies the relation
Γ ( 0 , β ) = Ei ( β ) .
Now, it is well known that the Taylor series expansion of the exponential integral [30] is given by
Ei ( x ) = γ + ln | x | + k = 1 x k k · k ! .
Thus, the Taylor series expansion of Γ ( 0 , x ) is given by
Γ ( 0 , x ) = Ei ( x ) = γ ln | x | k = 1 ( x ) k k · k ! .
Using this, we have
Γ 0 , a p r = γ p ln a + ln r k = 1 ( a p / r ) k k · k ! .
Substituting Equation (11) into the result of Lemma 1, we have
a ln z · z p 1 exp z p r d z = r ln a p exp a p r 1 + r p 2 ( ln r γ ) r p 2 k = 1 ( a p / r ) k k · k ! .
Next, using the standard Taylor series expansion below
exp ( x ) = 1 x + 1 2 ! x 2 1 3 ! x 3 + ,
we have
exp a p r 1 = 1 r a p + 1 2 ! r 2 a 2 p 1 3 ! r 3 a 3 p + .
and
ln a · exp a p r 1 = 1 r a p ln a + 1 2 ! r 2 a 2 p ln a 1 3 ! r 3 a 3 p ln a + .
Using L’Hôpital’s rule, we have
lim a 0 a k p ln a = lim a 0 ln a a k p = lim a 0 a k p k p = 0 ,
for p > 0 and k = 1 , 2 ,
Using Equations (13) and (14), it is straightforward to show that
lim a 0 ln a · exp a p r 1 = 0 .
Since ( a p / r ) k 0 as a 0 for p > 0 and k = 1 , 2 , , we have   
lim a 0 k = 1 ( a p / r ) k k · k ! = 0 .
Applying Equations (15) and (16) to (12), we have
lim a 0 a ln z · z p 1 exp z p r d z = r p 2 ( ln r γ ) ,
which completes the proof.    □
It is noteworthy that the Euler–Mascheroni constant is easily calculated in the R language [31] using the built-in digamma function, that is, γ = digamma ( 1 ) .
Theorem 1.
For 0 < a i < b i < , we have
a i b i ln z i · f ( z i | Θ s ) d z i = 1 D i , s ln a i · exp a i θ s κ s + 1 κ s Γ 0 , a i θ s κ s 1 D i , s ln b i · exp b i θ s κ s + 1 κ s Γ 0 , b i θ s κ s ,
where D i , s = exp ( a i / θ s ) κ s exp ( b i / θ s ) κ s .
Proof. 
It is immediate upon using Equation (7) that we have
a i b i ln z i · f ( z i | Θ s ) d z i = a i b i ln z i · κ s z i κ s 1 θ s κ s exp z i θ s κ s d z i exp a i θ s κ s exp b i θ s κ s = κ s θ s κ s D i , s a i b i ln z i · z i κ s 1 exp z i κ s θ s κ s d z i .
Using Lemma 1, we obtain
a i ln z i · z i κ s 1 exp z i κ s θ s κ s d z i = θ s κ s ln a i κ s · exp a i θ s κ s + θ s κ s κ s 2 Γ 0 , a i θ s κ s
and
b i ln z i · z i κ s 1 exp z i κ s θ s κ s d z i = θ s κ s ln b i κ s · exp b i θ s κ s + θ s κ s κ s 2 Γ 0 , b i θ s κ s .
Substituting Equations (18) and (19) into (17), we have
a i b i ln z i · f ( z i | Θ s ) d z i = 1 D i , s ln a i · exp a i θ s κ s + 1 κ s Γ 0 , a i θ s κ s 1 D i , s ln b i · exp b i θ s κ s + 1 κ s Γ 0 , b i θ s κ s ,
which completes the proof.    □
Corollary 1.
For a i > 0 and b i , we have   
a i ln z i · f ( z i | Θ s ) d z i = lim b i a i b i ln z i · f ( z i | Θ s ) d z i = 1 D s ( a i ) ln a i · exp a i θ s κ s + 1 κ s Γ 0 , a i θ s κ s ,
where D s ( a i ) = exp ( a i / θ s ) κ s . In addition, for  a i 0 and b i > 0 , we have
0 b i ln z i · f ( z i | Θ s ) d z i = lim a i 0 a i b i ln z i · f ( z i | Θ s ) d z i = 1 D i , s * ( b i ) ln θ s γ κ s ln b i · exp b i θ s κ s 1 κ s Γ 0 , b i θ s κ s ,
where D s * ( b i ) = 1 exp ( b i / θ s ) κ s .
Proof. 
The first result will be derived as follows. It is easily seen from L’Hôpital’s rule that
lim b i ln b i · exp b i θ s κ s = lim b i ln b i exp b i θ s κ s = 0 .
Also, for  κ s > 0 and θ s > 0 , we have lim b i Γ 0 , ( b i / θ s ) κ s = 0 from Equation (8). Thus, using the result of Theorem 1, we have
a i ln z i · f ( z i | Θ s ) d z i = lim b i a i b i ln z i · f ( z i | Θ s ) d z i = 1 D s ( a i ) ln a i · exp a i θ s κ s + 1 κ s Γ 0 , a i θ s κ s .
Next, the second result is derived as follows.
0 b i ln z i · f ( z i | Θ s ) d z i = lim a i 0 a i b i ln z i · f ( z i | Θ s ) d z i = 1 D s * ( b i ) lim a i 0 a i b i ln z i · κ s z i κ s 1 θ s κ s exp z i θ s κ s d z i = 1 D s * ( b i ) lim a i 0 a i ln z i · κ s z i κ s 1 θ s κ s exp z i θ s κ s d z i 1 D s * ( b i ) b i ln z i · κ s z i κ s 1 θ s κ s exp z i θ s κ s d z i
It is immediate upon using Equation (7) that we have
lim a i 0 a i ln z i · κ s z i κ s 1 θ s κ s exp z i θ s κ s d z i = κ s θ s κ s lim a i 0 a i ln z i · z i κ s 1 exp z i κ s θ s κ s d z i .
Using Lemma 2, we have
lim a i 0 a i ln z i · z i κ s 1 exp z i κ s θ s κ s d z i = θ s κ s κ s 2 ( ln θ s κ s γ ) = θ s κ s κ s ln θ s γ κ s .
Substituting Equation (23) into (22), we have   
lim a i 0 a i ln z i · κ s z i κ s 1 θ s κ s exp z i θ s κ s d z i = ln θ s γ κ s .
Using Lemma 1, we have
b i ln z i · κ s z i κ s 1 θ s κ s exp z i θ s κ s d z i = κ s θ s κ s b i ln z i · z i κ s 1 exp z i θ s κ s d z i = ln b i · exp b i θ s κ s + 1 κ s Γ 0 , b i θ s κ s
Thus, substituting Equations (24) and (25) into (21), we have the second result stated in this Theorem. This completes the proof.    □
Lemma 3.
We have
a z p 1 exp z q r d z = r p / q q · Γ p q , a q r .
Proof. 
Let t = z q / r . Then, we have z = ( r t ) 1 / q and d z = 1 q r 1 / q t 1 / q 1 d t . Using this substitution, we derive the relation below:
a z p 1 exp z q r d z = a q / r ( r t ) ( p 1 ) / q exp ( t ) · 1 q r 1 / q t 1 / q 1 d t = r p / q q a q / r t p / q 1 exp ( t ) d t = r p / q q · Γ p q , a q r ,
where Γ is the upper incomplete gamma function again. This completes the proof.    □
Theorem 2.
We have
a i b i z i κ f ( z i | Θ s ) d z i = θ s κ D i , s Γ κ + κ s κ s , a i θ s κ s Γ κ + κ s κ s , b i θ s κ s ,
where D i , s = exp ( a i / θ s ) κ s exp ( b i / θ s ) κ s .
Proof. 
It is immediate upon using Equation (7) that we have
a i b i z i κ f ( z i | Θ s ) d z i = a i b i z i κ · κ s z i κ s 1 θ s κ s exp z i θ s κ s d z i exp a i θ s κ s exp b i θ s κ s = κ s θ s κ s D i , s a i b i z i κ + κ s 1 exp z i κ s θ s κ s d z i ,
where D i , s = exp ( a i / θ s ) κ s exp ( b i / θ s ) κ s again.
Using Lemma 3, we have
a i z i κ + κ s 1 exp z i κ s θ s κ s d z i = θ s κ + κ s κ s Γ κ + κ s κ s , a i κ s θ s κ s
and
1 1 b i z i κ + κ s 1 exp z i κ s θ s κ s d z i = θ s κ + κ s κ s Γ κ + κ s κ s , b i κ s θ s κ s .
It is immediate upon substituting Equations (27) and (28) into (26) that we have
a i b i z i κ f ( z i | Θ s ) d z i = a i z i κ f ( z i | Θ s ) d z i b i z i κ f ( z i | Θ s ) d z i = θ s κ D i , s Γ κ + κ s κ s , a i θ s κ s Γ κ + κ s κ s , b i θ s κ s ,
which completes the proof.    □
For notational convenience going forward, we let
U i , s = a i b i ln z i · f ( z i | Θ s ) d z i if b i > a i ln a i if b i = a i
and
V i , s ( κ ) = a i b i z i κ f ( z i | Θ s ) d z i if b i > a i a i κ if b i = a i .
Note that the value of V i , s ( κ ) depends only on the parameter κ . Thus, we need to solve for κ in the M-step, the details of which will be described later. However, as shown in Theorem 1, U i , s does not include either κ or θ Thus, using Theorem 1 and Corollary 1, we can easily calculate the value of U i , s at each E-step. The value of V i , s ( κ ) can be calculated by using Theorem 2. This allows for the evaluation of the expected log likelihood at the sth step of the EM sequence. Thus we obtain the expected log-likelihood at the sth step in the EM sequence:
Q ( Θ | Θ s ) = ln L c ( Θ | y , z ) f ( z | Θ s ) d z = n ln κ n κ ln θ + κ i = 1 m ln y i + κ i = m + 1 n U i , s 1 θ κ i = 1 m y i κ 1 θ κ i = m + 1 n V i , s ( κ ) + C = n ln κ n κ ln θ + κ i = 1 n U i , s 1 θ κ i = 1 n V i , s ( κ ) + C .

4.2. M-Step

Differentiating the expected log-likelihood function in Equation (29) with respect to θ and setting it equal to zero, we obtain
Q ( Θ | Θ ( s ) ) θ = n κ θ + κ 1 θ κ + 1 i = 1 n V i , s ( κ ) = 0 .
Solving the above for θ , we have
θ = 1 n i = 1 n V i , s ( κ ) 1 / κ .
Clearly, given Equation (30), θ is only a function of κ . Substituting Equation (30) into (29), we obtain the expected log-likelihood as a function of κ only at each step. This expression reduces to   
Q ( Θ | Θ s ) = n ln κ + κ i = 1 n U i , s n ln i = 1 n V i , s ( κ ) + n ln n n + C .
Notice that the problem of maximizing the expected log-likelihood has been transformed into a one-dimensional optimization problem with respect to κ . Thus, it suffices to maximize the following:
n ln κ + κ i = 1 n U i , s n ln i = 1 n V i , s ( κ ) .

5. A Real-Data Example

In this section, we investigate the performance of the proposed EM-based method using a real-data set from the literature. The data was taken from a study of patients with breast cancer [32,33]. This data set can also be found in Table 3.10 of [34]. The observed value of interest was the time it took until there was a cosmetic deterioration of the breast. For convenience, the interval-censored observations are also provided in Table 1.
Assuming that time to cosmetic deterioration has a Weibull distribution, one can estimate the Weibull parameters of the breast cancer data set. This in turn allows for the comparison of the proposed EM-based estimation method with the estimation method based on direct maximization of the likelihood using the DFP and BHHH methods. Some specific details behind the two methods are provided below.
In order to optimize the log-likelihood function in Equation (4) using the DFP and BHHH methods, we use the R packages pracma [35] and maxLik [36,37] respectively. As a precursor to maximizing the likelihood, we sketch the likelihood function using the perspective and contour plots in Figure 2. Both of the plots suggest that the reasonable parameter estimates ( κ ^ , θ ^ ) are in the general vicinity of κ ^ = 2 and θ ^ = 30 . In fact, it turns out that the exact MLE, which is a component of the object returned by the call to the contour plot function in R is κ ^ = 2.026 and θ ^ = 28.34 . In the case of the EM-based method, it will be shown that the optimization during the M-step is quite straightforward because the derived EM sequence is a one-dimensional function of κ .
Finally, when comparing the algorithms, the sole criterion investigated in this note is the sensitivity of the respective algorithms to the respective starting values used. In order to investigate the sensitivity efficiently, we generated a symmetric and circular set of starting value ( κ 0 , θ 0 ) pairs whose center is equal to ( 2 , 30 ) . An illustration of the circular set of starting values is provided in Figure 3a. Notice that the circular set of two-dimensional starting values is generated by letting
κ 0 = 2 + 1.5 · cos ( k × 10 ) and θ 0 = 30 + 25 · sin ( k × 10 )
where k = 1 , 2 , , 36 . Essentially, the equations above generate ( κ 0 , θ 0 ) pairs that span the circumference of a circle with spaces of 10 degrees with the center at ( 2 , 30 ) . Obviously, any center point that is relatively close to the true MLE could have been chosen as the center, but we felt that using whole integer values of 2 and 30 was convenient for illustration.
Next, for each of the two-dimensional starting values along the circumference of the circle, we obtained the parameter estimates using (i) the DFP method, (ii) the BHHH method, and  (iii) the EM method. Additionally, the values of the likelihood function associated with the respective estimates were calculated using Equation (4). These results are summarized in Table 2.
Refer back to Figure 3. Notice that, by connecting the starting value to its resulting estimate, we have constructed what is referred to as the diagram of paths, as shown in Figure 3b–d. Unfortunately, in the cases of the DFP and BHHH methods, the diagram paths indicate a number of starting values where convergence was not obtained. For the DFP method, most of these occurred when the angle of the starting value was between 50 and 150 and between 250 and 340 . For the BHHH method, they occurred when the angle of the starting value was between 260 and 320 . Conversely, in the case of the EM algorithm method, all of the starting values converged to the unique estimate which is essentially the true MLE. It is noteworthy that if the likelihood function is unimodal, then all EM sequences converge to the unique MLE [38]. Given the EM convergence results and the two-dimensional nature of the objective function, the frequency of nonconvergence when using the DFP and BHHH methods is concerning.
The R code for the Weibull parameter estimation based on the EM algorithm and the other Newton-type method using the nlm R function are available at https://github.com/AppliedStat/R-code/tree/master/2023b, accessed on 15 July 2023. In this URL, additional illustrative examples are also provided.

6. Concluding Remarks

An EM-based parameter estimation method was developed using the EM algorithm in the case of the Weibull distribution with interval-censored data. The sensitivity of the results to various starting values was also investigated. The findings indicate that the suggested technique is not affected by the choice of starting values, unlike the conventional DFP and BHHH methods, which occasionally struggle to reach the maximum-likelihood estimation. By employing the EM-based approach instead of conventional numerical optimization, analysts have a much larger choice of starting values for estimation problems of a similar nature. The R code for the EM algorithm is provided with practical examples, allowing field engineers and practitioners to utilize them according to their needs.

Funding

This research was supported by a National Research Foundation of Korea (NRF) grant funded by the Korean government (MSIT) (Nos. 2022R1A2C1091319, RS-2023-00242528).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data are provided in this paper.

Acknowledgments

This research is dedicated to the memory and honor of Byung Ho Lee of Nuclear Engineering at Seoul National University and KAIST. The author’s interests in mathematics and engineering were formed under his strong influence. Lee passed away peacefully in July 2001. The author also wishes to thank anonymous referees and Mark Leeds for their valuable comments that led to the improvement of the original manuscript.

Conflicts of Interest

The author declares no conflict of interest.

Nomenclature

a i Lower end of an interval-censored observation
b i Upper end of an interval-censored observation
f ( · ) Probability density function of Weibull distribution
F ( · ) Cumulative distribution function of Weibull distribution
Ei(·)Exponential integral function
L ( · ) Likelihood function
L c ( · ) Complete-data likelihood function
Q ( · | · ) Q function in the E-step
γ Euler–Mascheroni constant
Γ ( · , · ) Upper incomplete gamma function
κ Shape parameter of Weibull distribution
θ Scale parameter of Weibull distribution

References

  1. Bonnans, J.F.; Gilbert, J.C.; Lemarechal, C.; Sagastizabal, C.A. Numerical Optimization: Theoretical and Practical Aspects, 2nd ed.; Springer: Berlin/Heidelberg, Germany, 2006. [Google Scholar]
  2. Berndt, E.; Hall, B.; Hall, R.; Hausman, J. Estimation and Inference in Nonlinear Structural Models. Ann. Econ. Soc. Meas. 1974, 3, 653–665. [Google Scholar]
  3. Anderson-Bergman, C. icenReg: Regression Models for Interval Censored Data in R. J. Stat. Softw. 2017, 81, 1–23. [Google Scholar] [CrossRef] [Green Version]
  4. Gupta, A.K. Estimation of the mean and standard deviation of a normal population from a censored sample. Biometrika 1952, 39, 260–273. [Google Scholar] [CrossRef]
  5. Balakrishnan, N.; Aggarwala, R. Progressive Censoring: Theory, Methods, and Applications; Birkhäuser: Boston, MA, USA, 2000. [Google Scholar]
  6. Leemis, L.M. Reliability: Probabilistic Models and Statistical Methods, 2nd ed.; Lawrence M. Leemis: Williamsburg, VA, USA, 2009. [Google Scholar]
  7. Govindarajulu, Z. Best linear estimates under symmetric censoring of the parameters of a double exponential population. J. Am. Stat. Assoc. 1966, 61, 248–258. [Google Scholar]
  8. Balakrishnan, N. Approximate MLE of the scale parameter of the Rayleigh distribution with censoring. IEEE Trans. Reliab. 1989, 38, 355–357. [Google Scholar] [CrossRef]
  9. Hassanein, K.M.; Saleh, A.K.; Brown, E. Best Linear Unbiased Estimate and Confidence Interval for Rayleigh’s Scale Parameter When the Threshold Parameter Is Known for Data with Censored Observations from the Right; Report; University of Kansas Medical School: Kansas City, KS, USA, 1995. [Google Scholar]
  10. Elsayed, E.A. Reliability Engineering, 2nd ed.; Wiley: Hoboken, NJ, USA, 2012. [Google Scholar]
  11. Sultan, A.M. New Approximation for parameters of normal distribution using Type-II censored sampling. Microelectron. Reliab. 1997, 37, 1169–1171. [Google Scholar] [CrossRef]
  12. Balakrishnan, N. BLUEs of location and scale parameters of Laplace distribution based on Type-II censored samples and associated inference. Microelectron. Reliab. 1996, 36, 371–374. [Google Scholar] [CrossRef]
  13. Dempster, A.P.; Laird, N.M.; Rubin, D.B. Maximum likelihood from incomplete data via the EM algorithm. J. R. Stat. Soc. B 1977, 39, 1–22. [Google Scholar]
  14. Panahi, H.; Asadi, S. Estimation of the Weibull Distribution Based on Type-II Censored Samples. Appl. Math. Sci. 2011, 5, 2549–2558. [Google Scholar]
  15. Guure, C.B.; Ibrahim, N.A.; Adam, M.B. Bayesian Inference of the Weibull Model Based on Interval-Censored Survival Data. Comput. Math. Methods Med. 2013, 2013, 849520. [Google Scholar] [CrossRef] [Green Version]
  16. Pradhan, B.; Kundu, D. Analysis of Interval-Censored Data with Weibull Lifetime Distribution. Sankhya B 2014, 76, 120–139. [Google Scholar] [CrossRef]
  17. Ferreira, L.A.; Silva, J.L. Parameter estimation for Weibull distribution with right censored data using EM algorithm. Eksploat. I Niezawodn.-Mainteance Reliab. 2017, 19, 310–315. [Google Scholar] [CrossRef]
  18. Park, C. A Quantile Variant of the Expectation-Maximization Algorithm and its Application to Parameter Estimation with Interval Data. J. Algorithms Comput. Technol. 2018, 12, 253–272. [Google Scholar] [CrossRef]
  19. Saeed, N.M.; Elfaki, F.A.M. Parametric Weibull Model Based on Imputations Techniques for Partly Interval Censored Data. Austrian J. Stat. 2020, 49, 30–37. [Google Scholar] [CrossRef] [Green Version]
  20. Kurniawan, A.; Avicena, N.; Ana, E. Estimation of the shape parameter of Weibull distribution based on type-II censored data using EM algorithm. AIP Conf. Proc. 2020, 2264, 030011. [Google Scholar] [CrossRef]
  21. Ameen, A.A.; Akkash, U.A. Maximum Likelihood Estimation and Bayesian Estimation of three-parameter Weibull Distribution Based on Interval-Censored Data. J. Phys. Conf. Ser. 2021, 1818, 012199. [Google Scholar] [CrossRef]
  22. Almetwally, E.M.; Jawa, T.M.; Sayed-Ahmed, N.; Park, C.; Zakarya, M.; Dey, S. Analysis of unit-Weibull based on progressive type-II censored with optimal scheme. Alex. Eng. J. 2023, 63, 321–338. [Google Scholar] [CrossRef]
  23. Weibull, W. A Statistical Distribution Function of Wide Applicability. ASME J. Appl. Mech. 1951, 18, 293–297. [Google Scholar] [CrossRef]
  24. Lee, S.B.; Park, C. Development of Robust Design Optimization using Incomplete Data. Comput. Ind. Eng. 2006, 50, 345–356. [Google Scholar] [CrossRef]
  25. Tanner, M.A. Tools for Statistical Inference: Methods for the Exploration of Posterior Distributions and Likelihood Functions; Springer: New York, NY, USA, 1996. [Google Scholar]
  26. McLachlan, G.J.; Krishnan, T. The EM Algorithm and Extensions; John Wiley & Sons: New York, NY, USA, 1997. [Google Scholar]
  27. Schafer, J.L. Analysis of Incomplete Multivariate Data; Chapman & Hall: Boca Raton, FL, USA, 1997. [Google Scholar]
  28. Little, R.J.A.; Rubin, D.B. Statistical Analysis with Missing Data, 2nd ed.; John Wiley & Sons: New York, NY, USA, 2002. [Google Scholar]
  29. Do, C.B.; Batzoglou, S. What is the expectation maximization algorithm? Nat. Biotechnol. 2008, 26, 897–899. [Google Scholar] [CrossRef]
  30. Harris, F.E. Tables of the Exponential Integral Ei(x). Math. Tables Other Aids Comput. 1957, 11, 9–16. [Google Scholar] [CrossRef]
  31. R Core Team. R: A Language and Environment for Statistical Computing; R Foundation for Statistical Computing: Vienna, Austria, 2023; Available online: http://www.r-project.org (accessed on 3 January 2023).
  32. Finkelstein, D.M. A proportional hazards model for interval-censored failure time data. Biometrics 1986, 42, 845–854. [Google Scholar] [CrossRef]
  33. Lindsey, J.C.; Ryan, L.M. Methods for interval-censored data. Stat. Med. 1998, 17, 219–238. [Google Scholar] [CrossRef]
  34. Lawless, J.F. Statistical Models and Methods for Lifetime Data, 2nd ed.; John Wiley & Sons: New York, NY, USA, 2003. [Google Scholar]
  35. Borchers, H.W. Pracma: Practical Numerical Math Functions. R Package Version 2.4.2. (Published on 22 September 2022). 2022. Available online: https://CRAN.R-project.org/package=pracma (accessed on 15 July 2023).
  36. Henningsen, A.; Toomet, O. maxLik: A package for maximum likelihood estimation in R. Comput. Stat. 2011, 26, 443–458. [Google Scholar] [CrossRef]
  37. Toomet, O.; Henningsen, A.; Graves, S.; Croissant, Y.; Hugh-Jones, D.; Scrucca, L. maxLik: Maximum Likelihood Estimation and Related Tools. R Package Version 1.5.2 (Published on 26 July 2021). 2021. Available online: https://CRAN.R-project.org/package=maxLik (accessed on 15 July 2023).
  38. Wu, C.F.J. On the convergence properties of the EM algorithm. Ann. Stat. 1983, 11, 95–103. [Google Scholar] [CrossRef]
Figure 1. Schematic illustration of a sorting machine.
Figure 1. Schematic illustration of a sorting machine.
Mathematics 11 03156 g001
Figure 2. Perspective and contour plots of the likelihood function.
Figure 2. Perspective and contour plots of the likelihood function.
Mathematics 11 03156 g002
Figure 3. Diagram of paths connecting the starting values to their resulting estimates. (a) Starting values given by ( κ 0 , θ 0 ) = ( 2 + 1.5 · cos ( k × 10 ) , 30 + 25 · sin ( k × 10 ) ) for k = 1 , 2 , , 36 . (b) Diagram path using the DFP method. (c) Diagram path using the BHHH method. (d) Diagram path using the EM method.
Figure 3. Diagram of paths connecting the starting values to their resulting estimates. (a) Starting values given by ( κ 0 , θ 0 ) = ( 2 + 1.5 · cos ( k × 10 ) , 30 + 25 · sin ( k × 10 ) ) for k = 1 , 2 , , 36 . (b) Diagram path using the DFP method. (c) Diagram path using the BHHH method. (d) Diagram path using the EM method.
Mathematics 11 03156 g003
Table 1. Interval-censored observations.
Table 1. Interval-censored observations.
[ 8 , 12 ] [ 0 , 22 ] [ 24 , 31 ] [ 17 , 27 ] [ 17 , 23 ] [ 24 , 30 ] [ 16 , 24 ] [ 13 , ] [ 11 , 13 ] [ 16 , 20 ]
[ 18 , 25 ] [ 17 , 26 ] [ 32 , ] [ 23 , ] [ 44 , 48 ] [ 10 , 35 ] [ 0 , 5 ] [ 5 , 8 ] [ 12 , 20 ] [ 11 , ]
[ 33 , 40 ] [ 31 , ] [ 13 , 39 ] [ 19 , 32 ] [ 34 , ] [ 13 , ] [ 16 , 24 ] [ 35 , ] [ 15 , 22 ] [ 11 , 17 ]
[ 22 , 32 ] [ 48 , ] [ 30 , 34 ] [ 13 , ] [ 10 , 17 ] [ 8 , 21 ] [ 4 , 9 ] [ 11 , ] [ 14 , 19 ] [ 4 , 8 ]
[ 34 , ] [ 30 , 36 ] [ 18 , 24 ] [ 16 , 60 ] [ 35 , 39 ] [ 21 , ] [ 11 , 20 ]
Table 2. The parameter estimates with their corresponding likelihood values using the DFP and BHHH methods and the proposed EM algorithm.
Table 2. The parameter estimates with their corresponding likelihood values using the DFP and BHHH methods and the proposed EM algorithm.
AngleStarting ValuesDFPBHHHEM
Degree (  ) κ 0 θ 0 κ ^ θ ^ L × 10 32 κ ^ θ ^ L × 10 32 κ ^ θ ^ L × 10 32
103.47734.342.02628.341.5152.02628.331.5152.02628.341.515
203.41038.552.02628.341.5152.02628.331.5152.02628.341.515
303.29942.502.02628.341.5152.02728.331.5152.02628.341.515
403.14946.072.02628.341.5152.02628.331.5152.02628.341.515
502.96449.151.29846.78 1.140 × 10 4 2.02628.341.5152.02628.341.515
602.75051.652.11439.26 2.858 × 10 3 2.02728.331.5152.02628.341.515
702.51353.492.02628.341.5152.02728.341.5152.02628.341.515
802.26054.621.14244.07 1.178 × 10 4 2.02628.331.5152.02628.341.515
902.00055.002.06941.71 4.192 × 10 4 2.02628.341.5152.02628.341.515
1001.74054.622.31234.39 6.794 × 10 2 2.02628.341.5152.02628.341.515
1101.48753.491.29852.47 8.944 × 10 6 2.02628.331.5152.02628.341.515
1201.25051.651.33450.64 2.082 × 10 5 2.02628.341.5152.02628.341.515
1301.03649.151.38248.14 7.009 × 10 5 2.02628.341.5152.02628.341.515
1400.85146.072.02628.341.5152.02628.341.5152.02628.341.515
1500.70142.501.57241.50 2.651 × 10 3 2.02628.341.5152.02628.341.515
1600.59138.552.02628.341.5152.02628.331.5152.02628.341.515
1700.52334.342.02628.341.5152.02728.341.5152.02628.341.515
1800.50030.002.02628.341.5152.02628.331.5152.02628.341.515
1900.52325.662.02628.341.5152.02728.341.5152.02628.341.515
2000.59121.452.02628.341.5152.02628.331.5152.02628.341.515
2100.70117.502.02628.341.5152.02728.341.5152.02628.341.515
2200.85113.932.02628.341.5152.02628.331.5152.02628.341.515
2301.03610.852.02628.341.5152.02628.341.5152.02628.341.515
2401.2508.352.02628.341.5152.02728.341.5152.02628.341.515
2501.4876.510.8859.43 6.281 × 10 17 2.02628.331.5152.02628.341.515
2601.7405.38NANANANANANA2.02628.341.515
2702.0005.00NANANANANANA2.02628.341.515
2802.2605.38NANANANANANA2.02628.341.515
2902.5136.51NANANANANANA2.02628.341.515
3002.7508.35NANANANANANA2.02628.341.515
3102.96410.85NANANANANANA2.02628.341.515
3203.14913.93NANANANANANA2.02628.341.515
3303.29917.502.02628.341.5152.02728.341.5152.02628.341.515
3403.41021.45NANANA2.02628.341.5152.02628.341.515
3503.47725.662.02628.341.5152.02628.341.5152.02628.341.515
3603.50030.002.02628.341.5152.02628.331.5152.02628.341.515
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Park, C. A Note on Weibull Parameter Estimation with Interval Censoring Using the EM Algorithm. Mathematics 2023, 11, 3156. https://doi.org/10.3390/math11143156

AMA Style

Park C. A Note on Weibull Parameter Estimation with Interval Censoring Using the EM Algorithm. Mathematics. 2023; 11(14):3156. https://doi.org/10.3390/math11143156

Chicago/Turabian Style

Park, Chanseok. 2023. "A Note on Weibull Parameter Estimation with Interval Censoring Using the EM Algorithm" Mathematics 11, no. 14: 3156. https://doi.org/10.3390/math11143156

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop