Next Article in Journal
Analysis of Key Storage Mechanism of Asymmetric Key-Related Functions in CNG Crypto Library
Next Article in Special Issue
Computational Flow Dynamic Analysis in Left Atrial Appendage Thrombus Formation Risk: A Review
Previous Article in Journal
Mathematical Approaches Transform Cybersecurity from Protoscience to Science
Previous Article in Special Issue
Predicting Astrocytic Nuclear Morphology with Machine Learning: A Tree Ensemble Classifier Study
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Reliability Inference of Multicomponent Stress–Strength System Based on Chen Distribution Using Progressively Censored Data

School of Mathematics and Statistics, Beijing Jiaotong University, Beijing 100044, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2023, 13(11), 6509; https://doi.org/10.3390/app13116509
Submission received: 6 May 2023 / Revised: 22 May 2023 / Accepted: 24 May 2023 / Published: 26 May 2023
(This article belongs to the Special Issue Applied Biostatistics & Statistical Computing)

Abstract

:
In this paper, we study the inference of the multicomponent stress–strength reliability (MSSR) based on the Chen distribution using progressively Type-II censored data. Both the stress and strength variables follow the Chen distribution with a common second shape parameter. The maximum likelihood estimates and the asymptotic confidence intervals of the MSSR are developed. The bootstrap confidence interval of the MSSR is also constructed. The Bayesian estimation of the MSSR is obtained under the generalized entropy loss function using the Markov Chain Monte Carlo method. To check the effectiveness of the proposed approach, simulation studies are performed. Finally, a real data set is analyzed.

1. Introduction

Reliability estimation is a popular research topic that has recently received much attention. Many studies focus on the stress–strength system with two components, which can be regarded as two random variables X and Y, representing strength and stress. Its reliability is R = P ( X > Y ) . For this kind of system, extensive research has been carried out. Many scholars have discussed the estimation of this reliability under certain distributions, such as Weerahandi and Johnson [1], Badr et al. [2], Xu et al. [3], Hassan et al. [4], etc.
In the theory of reliability, the multicomponent stress–strength system is an extension of the classical stress–strength system, which contains one stress component and k independent strength components. The system will remain stable if at least s of the k strength values exceed the stress value. For instance, a bridge with k vertical cables that represent the strength of the structure is just a multicomponent stress–strength system. It will remain stable if the stress brought on by wind, high traffic volume, etc., does not exceed the values of at least s of its k strength components. Another example is an eight-cylinder vehicle engine, which operates as long as at least four of the eight cylinders are firing.
For k strengths that are exposed to one stress, strengths X 1 , X 2 , . . . , X k are independent random variables with the same cumulative distribution function (CDF) F X ( y ) , and stress Y (independent of X 1 , X 2 , . . . , X k ) is a random variable with the CDF F Y ( y ) . Then, the multicomponent stress–strength reliability (MSSR) can be described as
R s , k = P at   least   s   of   X 1 , X 2 , , X k   exceed   Y = m = s k k m + 1 F X ( y ) m F X ( y ) k m d F Y ( y ) .
The estimation of the MSSR has been widely studied under complete sample data, where different distributions have been used. For example, Rao [5] studied the maximum likelihood estimation and asymptotic confidence interval of the MSSR based on generalized exponential distribution. Jia et al. [6] discussed the classical estimation of the MSSR based on generalized inverted exponential distribution. Nadar and Kizilaslan [7] derived the estimation of the MSSR based on the Marshall–Olkin Bivariate Weibull distribution using frequentist and Bayesian methods. The Bayesian estimators were developed using Lindley’s approximation and Markov Chain Monte Carlo techniques. Kizilaslan and Nadar [8] discussed the estimation of the MSSR based on the Bivariate Kumaraswamy distribution in a similar way.
Censoring is an effective tool that is often used in lifetime tests. In practical experiments, censoring plays an important role when there are not enough test units or when data for all test units cannot be collected because of the lack of time and resources. Type-I and Type-II censoring attract a lot of attention due to their mathematical simplicity. In Type-I censoring, if a pre-determined time is reached, the test will be stopped, whereas in Type-II censoring, if a pre-determined number of units fail, the test will be stopped. However, both censoring schemes may be inappropriate if the experimenter needs to intermittently remove units. Thus, progressive Type-II censoring is considered a better option and has been widely used in recent years. In this censoring, the intermittent removal of units is allowed. In addition, it saves time and expenses to a certain extent.
Progressive Type-II censoring in a lifetime test is as follows. Assume that M units are tested in the experiment. When the first failure x 1 happens, R 1 units are randomly removed. When the second failure x 2 happens, R 2 units are randomly removed, and so on. Finally, when the m th failure x m happens, the remaining R m active units are all removed. Note that M = R 1 + R 2 + . . . + R m + m . In this way, the ordered lifetime data for m elements are obtained using the censoring scheme { M , m , R 1 , R 2 , . . . , R m } . This process is shown in Figure 1. In particular, progressive Type-II censoring can be seen as an extension of Type-II censoring, which is derived by assuming R i = 0 , i = 1 , 2 , . . . , m 1 . Otherwise, the complete sample is derived by assuming R i = 0 , i = 1 , 2 , . . . , m .
For samples that have been censored or are incomplete, there are few studies on the inference of the MSSR in the literature. Saini et al. [9] studied the estimation of the MSSR for Burr XII distribution using progressive first-failure censoring data. Tsai et al. [10] discussed the estimation of the MSSR for generalized exponential distribution using Type-I censoring data. Saini et al. [11] obtained the estimation of the MSSR for Topp–Leone distribution using progressive censoring data.
Many probability distributions have been proposed to fit the lifetime data. Here, we select the Chen distribution proposed by Chen [12]. Its probability density function (PDF), CDF, and hazard rate function (HRF) are, respectively, given by
f ( x ; θ , λ ) = θ λ x λ 1 exp { x λ + θ ( 1 e x λ ) } ,
F ( x ; θ , λ ) = 1 exp { θ ( 1 e x λ ) } ,
h ( x ; θ , λ ) = θ λ x λ 1 exp { x λ } ,
where x > 0 and the shape parameters θ , λ > 0 . Hereafter, the Chen distribution can be represented by Chen ( θ , λ ) . Images of the PDFs and HRFs of the Chen distribution for certain cases are presented in Figure 2. It can be seen that the Chen distribution has a flexible PDF and HRF when the shape parameters are taken at different values. When λ > 1 , the PDFs have a significant peak; when λ = 1 , the PDFs have a roughly decreasing trend; and when 0 < λ < 1 , the PDFs are monotonically decreasing. Additionally, when λ 1 , the HRFs are monotonically increasing, and when 0 < λ < 1 , the HRFs present as a bathtub-shaped curve. In the literature, the Chen distribution has received considerable attention and has been studied by several scholars, including Chen and Gui [13], Rastogi et al. [14], Sarhan et al. [15], Mendez-Gonzalez et al. [16], and the references therein.
Let X 1 , X 2 , . . . , X k follow C h e n ( θ 1 , λ ) independently, and let Y (independent of X 1 , X 2 , . . . , X k ) follow C h e n ( θ 2 , λ ) . They have a common second shape parameter and different first shape parameters. Now, based on Equations (1)–(3), R s , k can be derived as
R s , k = θ 2 λ m = s k k m 0 x λ 1 e x p 1 e x λ θ 1 m + θ 2 + x λ 1 e x p θ 1 1 e x λ k m d x = θ 2 m = s k k m n = 0 k m k m n ( 1 ) n 1 e x p θ 1 ( m + n ) + θ 2 ( 1 t ) d t = m = s k n = 0 k m k m k m n ( 1 ) n θ 2 ( m + n ) θ 1 + θ 2 ,
where t = e x λ .
As far as we know, no research has been conducted on the inference of the MSSR for the Chen distribution using progressively censored data. Wang et al. [17] discussed its classical estimation using Type-II censored data. So, our goal is to expand their research by carrying out its estimation from the Chen distribution using progressively censored data. In addition, the Bayesian estimation is also considered.
This article is organized as follows. In Section 2, the maximum likelihood estimate (MLE) is studied. Then, the interval estimation is discussed in Section 3. The asymptotic confidence interval (ACI) is derived based on the MLE. Additionally, the Bootstrap confidence interval (BootCI) is constructed. In Section 4, the Bayes estimates based on gamma priors are derived using the Markov Chain Monte Carlo (MCMC) method. The Bayesian credible interval (BCI) and the highest posterior density credible interval (HPDCI) are also discussed. In Section 5, Monte Carlo simulation studies are performed and a real data set is analyzed. Finally, the conclusions are reported in Section 6.

2. Maximum Likelihood Estimation

In this section, we derive the MLE of R s , k by adapting the approach of Wang et al. [17] and extending its application to progressively Type-II censored data. Assume that N systems with K strength components are subjected to a lifetime test. We observe the lifetime data for n systems with k components using progressive Type-II censoring. The observed d a t a   x and y are described as follows:
                          Observed strength values       Observed stress values
x 11 x 12 x 1 k x n 1 x n 2 x n k and y 1 y n
where each row of values in x is the censored sample from C h e n ( θ 1 , λ ) with the progressive Type-II censoring scheme { K , k , S 1 , S 2 , . . . , S k } , and y is the censored sample from C h e n ( θ 2 , λ ) with the progressive Type-II censoring scheme { N , n , T 1 , T 2 , . . . , T n } . For simplicity, we denote the censoring scheme as S = ( S 1 , S 2 , . . . , S k ) and T = ( T 1 , T 2 , . . . , T n ) . Then, the likelihood function is
L θ 1 , θ 2 , λ = c 1 i = 1 n c 2 j = 1 k f X x i j 1 F X x i j S j f Y y i 1 F Y y i T i ,
where
c 1 = N N T 1 1 N T 1 S n 1 n + 1 ,
c 2 = K K S 1 1 K S 1 S k 1 k + 1 .
Now, using Equations (2), (3), and (5), the likelihood function is
L ( θ 1 , θ 2 , λ ) = λ n ( k + 1 ) c 1 c 2 n θ 1 n k θ 2 n i = 1 n j = 1 k x i j λ 1 exp { x i j λ + θ 1 ( 1 e x i j λ ) ( 1 + S j ) } × i = 1 n y i λ 1 exp { y i λ + θ 2 ( 1 e y i λ ) ( 1 + T i ) } .
From Equation (6), the log-likelihood function is
l = l ( θ 1 , θ 2 , λ ) n ( k + 1 ) ln λ + n k ln θ 1 + n ln θ 2 + i = 1 n j = 1 k [ ( λ 1 ) ln x i j + x i j λ + θ 1 ( 1 e x i j λ ) ( 1 + S j ) ] + i = 1 n [ ( λ 1 ) ln y i + y i λ + θ 2 ( 1 e y i λ ) ( 1 + T i ) ] .
By taking the derivative of l ( θ 1 , θ 2 , λ ) with respect to θ 1 and θ 2 and setting them to 0, we obtain the following equations:
l θ 1 = n k θ 1 + i = 1 n j = 1 k ( 1 e x i j λ ) ( 1 + S j ) = 0 ,
l θ 2 = n θ 2 + i = 1 n ( 1 e y i λ ) ( 1 + T i ) = 0 .
Using Equations (8) and (9), we derive
θ 1 ˜ = n k i = 1 n j = 1 k ( e x i j λ 1 ) ( 1 + S j ) , θ 2 ˜ = n i = 1 n ( e y i λ 1 ) ( 1 + T i ) .
Theorem 1.
For a given λ > 0 , the MLEs of θ 1 and θ 2 exist and are, respectively, given by θ 1 ˜ and θ 2 ˜ in Equation (10).
Proof. 
Let t i = θ i θ i ˜ , i = 1 , 2 . Using inequality ln t i t i 1 , we obtain
ln θ 1 θ 1 n k i = 1 n j = 1 k ( e x i j λ 1 ) ( 1 + S j ) 1 + ln θ 1 ˜ ,
ln θ 2 θ 2 n i = 1 n ( e y i λ 1 ) ( 1 + T i ) 1 + ln θ 2 ˜ .
By substituting Equations (11) and (12) into (7), one obtains
l ( θ 1 , θ 2 , λ ) n ( k + 1 ) ln λ + n k ln θ 1 ˜ + n ln θ 2 ˜ n k n + i = 1 n j = 1 k [ ( λ 1 ) ln x i j + x i j λ ] + i = 1 n [ ( λ 1 ) ln y i + y i λ ] .
From Equation (10), one obtains
n k = θ 1 ˜ i = 1 n j = 1 k ( e x i j λ 1 ) ( 1 + S j ) , n = θ 2 ˜ i = 1 n ( e y i λ 1 ) ( 1 + T i ) .
One further obtains
l ( θ 1 , θ 2 , λ ) n ( k + 1 ) ln λ + n k ln θ 1 ˜ + n ln θ 2 ˜ + i = 1 n j = 1 k [ ( λ 1 ) ln x i j + x i j λ + θ 1 ˜ ( 1 e x i j λ ) ( 1 + S j ) ] + i = 1 n [ ( λ 1 ) ln y i + y i λ + θ 2 ˜ ( 1 e y i λ ) ( 1 + T i ) ] = l ( θ 1 ˜ , θ 2 ˜ , λ ) .
The equality holds if t i = 1 , i = 1 , 2 , where θ 1 = θ 1 ˜ and θ 2 = θ 2 ˜ .    □
From Theorem 1, by substituting θ 1 = θ 1 ˜ and θ 2 = θ 2 ˜ into Equation (7), the log-likelihood function of λ is
l * ( λ ) n ( k + 1 ) ln λ n k ln [ i = 1 n j = 1 k ( e x i j λ 1 ) ( 1 + S j ) ] n ln [ i = 1 n ( e y i λ 1 ) ( 1 + T i ) ] + i = 1 n j = 1 k [ ( λ 1 ) ln x i j + x i j λ ] + i = 1 n [ ln y i + y i λ ln y i ] .
By taking the derivative of l * ( λ ) and setting it to 0, we obtain the following equation and its solution is the MLE λ ^ .
d l * d λ = n ( k + 1 ) λ n k i = 1 n j = 1 k ( 1 + S j ) e x i j λ x i j λ ln x i j i = 1 n j = 1 k ( e x i j λ 1 ) ( 1 + S j ) n i = 1 n ( 1 + T i ) e y i λ y i λ ln y i i = 1 n ( e y i λ 1 ) ( 1 + T i ) + i = 1 n j = 1 k ( ln x i j + x i j λ ln x i j ) + i = 1 n ( ln y i + y i λ ln y i ) = 0 .
From Equation (14), we can derive a nonlinear equation β ( λ ) = λ , where
β ( λ ) = n ( k + 1 ) [ n k i = 1 n j = 1 k ( 1 + S j ) e x i j λ x i j λ ln x i j i = 1 n j = 1 k ( e x i j λ 1 ) ( 1 + S j ) + n i = 1 n ( 1 + T i ) e y i λ y i λ ln y i i = 1 n ( e y i λ 1 ) ( 1 + T i ) i = 1 n j = 1 k ( ln x i j + x i j λ ln x i j ) i = 1 n ( ln y i + y i λ ln y i ) ] 1 .
The above equation has a fixed-point solution for λ . The MLE λ ^ can be derived using the fixed-point iterative approach as λ ( i + 1 ) = β ( λ ( i ) ) , where λ ( i ) is the i t h iterative value of λ . When λ ( i + 1 ) λ ( i ) is very close to 0, the iteration process can be stopped. Then, according to Equation (11), the MLEs θ 1 ^ and θ 2 ^ can be obtained using the MLE λ ^ .
θ 1 ^ = n k i = 1 n j = 1 k ( e x i j λ ^ 1 ) ( 1 + S j ) , θ 2 ^ = n i = 1 n ( e y i λ ^ 1 ) ( 1 + T i ) .
Based on the invariance property of the MLEs, once we obtain the MLEs θ 1 ^ , θ 2 ^ , and λ ^ , the MLE R ^ s , k is
R ^ s , k = m = s k n = 0 k m k m k m n ( 1 ) n θ 2 ^ ( m + n ) θ 1 ^ + θ 2 ^ .

3. Interval Estimation

3.1. Asymptotic Confidence Interval

Similar to the work of Wang et al. [17], we construct an ACI using the asymptotic normality of the MLE. Let η ^ = ( θ 1 ^ , θ 2 ^ , λ ^ ) be the MLEs of η = ( θ 1 , θ 2 , λ ) . The observed Fisher information matrix is given by I ( η ^ ) = [ I i j ] = [ 2 l η i η j ] η = η ^ , i , j = 1 , 2 , 3 , where
I 11 = n k θ 1 2 , I 22 = n θ 2 2 , I 12 = I 12 = 0 , I 13 = I 31 = i = 1 n j = 1 k ( 1 + S j ) e x i j λ x i j λ ln x i j , I 23 = I 32 = i = 1 n ( 1 + T i ) e y i λ y i λ ln y i , I 33 = n ( k + 1 ) λ 2 i = 1 n j = 1 k [ x i j λ ( ln x i j ) 2 θ 1 ( 1 + S j ) e x i j λ x i j λ ( ln x i j ) 2 ( x i j λ + 1 ) ] i = 1 n [ y i λ ( ln y i ) 2 θ 2 ( 1 + T i ) e y i λ y i λ ( ln y i ) 2 ( y i λ + 1 ) ] .
Using the delta method (see Xu and Long [18]), the variance of R ^ s , k is derived as follows:
V a r ( R ^ s , k ) = ( R s , k θ 1 ) 2 [ I 1 ] 11 + ( R s , k θ 2 ) 2 [ I 1 ] 22 + 2 ( R s , k θ 1 ) ( R s , k θ 2 ) [ I 1 ] 12 ,
where
R s , k θ 1 = m = s k n = 0 k m k m k m n ( 1 ) n + 1 ( m + n ) θ 2 [ ( m + n ) θ 1 + θ 2 ] 2 , R s , k θ 2 = m = s k n = 0 k m k m k m n ( 1 ) n ( m + n ) θ 1 [ ( m + n ) θ 1 + θ 2 ] 2 .
Here, the parameters ( θ 1 , θ 2 , λ ) are computed as the MLEs ( θ 1 ^ , θ 2 ^ , λ ^ ) . Therefore, the 100 ( 1 α ) % ACI for R s , k is
R ^ s , k z α / 2 Var R ^ s , k , R ^ s , k + z α / 2 Var R ^ s , k .
where z α is 100 ( 1 α ) t h percentile of N ( 0 , 1 ) .
A negative lower bound might be generated by the ACI proposed above but 0 < R s , k < 1 . To avoid this problem, the logit transformation can be used to provide a more accurate confidence interval, as proposed by Krishnamoorthy and Lin [19]. Let ξ ^ = ln ( R ^ s , k / ( 1 R ^ s , k ) ) be the MLE of ξ = ln ( R s , k / ( 1 R s , k ) ) . Then, the 100 ( 1 α ) % ACI of ξ is ( ξ L , ξ U ) , where
ξ L = ln ( R ^ s , k 1 R ^ s , k ) z α / 2 V a r ( R ^ s , k ) R ^ s , k ( 1 R ^ s , k ) ,
and
ξ U = ln ( R ^ s , k 1 R ^ s , k ) + z α / 2 V a r ( R ^ s , k ) R ^ s , k ( 1 R ^ s , k ) .
Then, the ACI of R s , k based on the logit scale is
( exp ( ξ L ) 1 + exp ( ξ L ) , exp ( ξ U ) 1 + exp ( ξ U ) ) .

3.2. Bootstrap Confidence Interval

The MLEs may not follow the asymptotic normality when the observed sample size is insufficient, which can be a limitation of the ACI. Therefore, the BootCI is considered. Using the method discussed by Stine [20], the percentile BootCI is constructed. The procedures are provided in Algorithm 1.
Algorithm 1 The algorithm of the Bootstrap CI method.
Step 1
Obtain the MLEs θ 1 ^ , θ 2 ^ , and λ ^ with the given data sets x and y using the method mentioned in Section 2.
Step 2
For a fixed progressive censoring scheme ( S 1 , S 2 , . . . , S k ) , generate censored samples x i 1 * , x i 2 * , ..., x i k * from C h e n ( θ 1 ^ , λ ^ ) , i = 1 , 2 , . . . , n . Similarly, for a fixed progressive censoring scheme ( T 1 , T 2 , . . . , T n ) , generate censored samples y 1 * , y 2 * , ..., y n * from C h e n ( θ 2 ^ , λ ^ ) .
Step 3
Compute the MLE R ^ s , k based on the samples in Step 2.
Step 4
Repeat Steps 2–3 B times and obtain the ordered values R ˜ ( 1 ) R ˜ ( 2 ) . . . R ˜ ( B ) .
Step 5
The 100 ( 1 α ) % BootCI is given by
( R ˜ ( [ B α / 2 ] ) , R ˜ ( [ B ( 1 α / 2 ) ] ) ) ,
where [ x ] is the least integer function.

4. Bayesian Estimation

In this section, Bayesian estimation is discussed, together with the generalized entropy loss function (GELF). When overestimation and underestimation are considered different consequences of errors, the GELF is useful. The GELF is a suitable loss function used for reliability estimation since overestimating is typically considerably more harmful than underestimating. As first discussed by Calabria and Pulcini [21], the GELF is given by
L ( α , α ^ ) [ ( α ^ α ) q q ln ( α ^ α ) 1 ] ; q 0 ,
where α ^ is the decision rule to estimate α . The Bayes estimate with the GELF is derived as
α ^ = [ E ( α q | d a t a ) ] 1 / q .
Note that the Bayes estimate in Equation (20) corresponds to the Bayes estimate with a precautionary loss function when q = 2 , a squared error loss function when q = 1 , and an entropy loss function when q = 1 .
In Bayesian estimation, θ 1 , θ 2 , and λ can be considered random variables. Assume that they have independent gamma priors and their PDFs are expressed as follows:
g 1 ( θ 1 ) θ 1 a 1 1 e b 1 θ 1 , θ 1 > 0 ,
g 2 ( θ 2 ) θ 2 a 2 1 e b 2 θ 2 , θ 2 > 0 ,
g 3 ( λ ) λ a 3 1 e b 3 λ , λ > 0 ,
where a i , b i > 0 , i = 1 , 2 , 3 . Then, the joint posterior density function is
π ( θ 1 , θ 2 , λ | d a t a ) = L ( d a t a | θ 1 , θ 2 , λ ) g 1 ( θ 1 ) g 2 ( θ 2 ) g 3 ( λ ) 0 0 0 L ( d a t a | θ 1 , θ 2 , λ ) g 1 ( θ 1 ) g 2 ( θ 2 ) g 3 ( λ ) d θ 1 d θ 2 d λ .
By substituting Equation (6) into Equation (21), the posterior distribution is
π ( θ 1 , θ 2 , λ | d a t a ) θ 1 n k + a 1 1 θ 2 n + a 2 1 λ n ( k + 1 ) + a 3 1 e ( b 1 θ 1 + b 2 θ 2 + b 3 λ ) × i = 1 n j = 1 k x i j λ 1 exp { x i j λ + θ 1 ( 1 e x i j λ ) ( 1 + S j ) } × i = 1 n y i λ 1 exp { y i λ + θ 2 ( 1 e y i λ ) ( 1 + T i ) } .

4.1. MCMC Method

The MCMC method is considered to obtain the Bayesian estimation. According to Equation (22), the conditional posterior density of θ 1 , θ 2 , and λ are derived as
θ 1 | λ , d a t a g a m m a ( n k + a 1 , b 1 + i = 1 n j = 1 k ( e x i j λ 1 ) ( 1 + S j ) ) , θ 2 | λ , d a t a g a m m a ( n + a 2 , b 2 + i = 1 n ( e y i λ 1 ) ( 1 + T i ) ) ,
and
π 1 ( λ | θ 1 , θ 2 , d a t a ) λ n ( k + 1 ) + a 3 1 e b 3 λ i = 1 n j = 1 k x i j λ exp { x i j λ + θ 1 ( 1 e x i j λ ) ( 1 + S j ) } × i = 1 n y i λ exp { y i λ + θ 2 ( 1 e y i λ ) ( 1 + T i ) } .
Now, using the gamma distributions, the values of θ 1 and θ 2 can be directly generated. Nonetheless, the Metropolis–Hastings (M–H) algorithm is utilized to obtain the values of λ . The procedure of the Gibbs sampling is provided in Algorithm 2. Then, according to the sampling results, the Bayes estimate with the GELF is
R ^ s , k M C = [ 1 T T 0 t = T 0 + 1 T ( R s , k ( t ) ) q ] 1 / q ,
where T 0 is the burn-in period.
Algorithm 2 The algorithm of the MCMC method.
Step 1
Set the initial values θ 1 ( 0 ) , θ 2 ( 0 ) , and λ ( 0 ) .
Step 2
Set t = 1 .
Step 3
Using the M–H algorithm, λ ( t ) can be generated from π 1 ( λ | θ 1 ( t 1 ) , θ 2 ( t 1 ) , d a t a ) . Here, the N ( λ ( t 1 ) , 1 ) is used as the proposal distribution.
Step 4
Obtain θ 1 ( t ) from g a m m a ( n k + a 1 , b 1 + i = 1 n j = 1 k ( e x i j λ ( t 1 ) 1 ) ( 1 + S j ) ) .
Step 5
Obtain θ 2 ( t ) from g a m m a ( n + a 2 , b 2 + i = 1 n ( e y i λ ( t 1 ) 1 ) ( 1 + T i ) ) .
Step 6
Compute R s , k ( t ) using θ 1 ( t ) and θ 2 ( t ) .
Step 7
Set t = t + 1 .
Step 8
Repeat Steps 3-7 T times.

4.2. Bayesian Credible Intervals and Highest Posterior Density Credible Intervals

In this subsection, the BCI and HPDCI are constructed in the following way:
To begin with, the generated posterior samples R s , k ( t ) , t = T 0 + 1 , T 0 + 2 , . . . , T are sorted to derive the values R ( 1 ) R ( 2 ) . . . R ( T T o ) . Then, the BCI with a 100 ( 1 α ) % confidence level for R s , k is obtained as
( R ( [ ( T T 0 ) ( α / 2 ) ] ) , R ( [ ( T T 0 ) ( 1 α / 2 ) ] ) ) .
Among all the possible intervals with a 100 ( 1 α ) % confidence level, the HPDCI has the shortest width. Thus, the HPDCI for R s , k is given by
( R ( n ) , R ( n + [ ( T T 0 ) ( 1 α ) ] ) ) ,
where n is the integer that makes
R ( n + [ ( T T 0 ) ( 1 α ) ] ) R ( n ) = min 1 n T T 0 R ( n + [ ( T T 0 ) ( 1 α ) ] ) R ( n ) ,
where [ x ] is the least integer function.

5. Numerical Explorations

5.1. Simulation Studies

To analyze the effects of various estimates, Monte Carlo simulations are performed. First, the samples with the censoring scheme { N , n , S 1 , S 2 , . . . , S n } are generated according to Algorithm 3, as discussed by Balakrishnan and Sandhu [22].
Algorithm 3 The algorithm for generating progressively censored samples.
Step 1
Obtain n independent random variables W 1 , W 2 , . . . , W n from the U n i f o r m ( 0 , 1 ) distribution.
Step 2
Set V i = W i 1 / j = n i + 1 n S j + 1 , i = 1 , 2 , . . . , n .
Step 3
Obtain U i = 1 j = n i + 1 n V j , i = 1 , 2 , . . . , n , and thus ( U 1 , U 2 , . . . , U n ) are the required censored samples from the U n i f o r m ( 0 , 1 ) distribution.
Step 4
Let X i = F 1 ( U i ) for i = 1 , 2 , . . . , n , and then ( X 1 , X 2 , . . . , X n ) are the required progressively censored samples for the required distribution with CDF F ( x ) , where F 1 ( x ) is its inverse function.
For the different point estimates, including MLEs and Bayes estimates, we compute their corresponding mean absolute deviations and mean squared errors. For different interval estimates, including 95% ACIs, BootCIs, BCIs, and HPDCIs, we compute their corresponding average lengths and coverage probabilities.
The various progressive Type-II censoring schemes (C.S) selected for the simulations are shown in Table 1, where S 1 , S 2 , ..., S 6 are the censoring schemes used for the strength variables, and T 1 , T 2 , ..., T 6 are the censoring schemes used for the stress variables. We perform lifetime tests on N systems with K components and observe the data obtained for n systems with k components using a certain censoring scheme. For simplicity, a short notation such as ( 1 × 3 ) represents (1, 1, 1) and ( ( 0 , 1 ) × 3 ) represents (0, 1, 0, 1, 0, 1). Take s = 3 in schemes S 1 , S 2 , and S 3 and s = 2 in schemes S 4 , S 5 , and S 6 . When at least two or three components survive, we derive the estimations of the system reliability. The simulation results are based on 3000 replications and all simulation calculations are performed using R-4.3.0 software.
Here, two different sets of distribution parameters are used:
η 1 = ( θ 1 , θ 2 , λ ) = ( 1 , 1 , 2 ) , η 2 = ( θ 1 , θ 2 , λ ) = ( 1.5 , 2 , 2 ) .
For η 1 , R 3 , 5 is 0.5 and R 2 , 4 is 0.6, whereas for η 2 , R 3 , 5 is 0.5901 and R 2 , 4 is 0.6885.
To compute the Bayesian estimates, three priors are considered. The non-informative prior is denoted as prior 1 and the gamma priors are denoted as prior 2 for η 1 and prior 3 for η 2 . The relevant parameters for the priors are as follows:
Prior 1 : a i = b i = 0 , i = 1 , 2 , 3 . Prior 2 : a 1 = 1 , b 1 = 1 , a 2 = 1 , b 2 = 1 , a 3 = 2 , b 3 = 1 . Prior 3 : a 1 = 3 , b 1 = 2 , a 2 = 2 , b 2 = 1 , a 3 = 2 , b 3 = 1 .
For the GELF, three loss functions are considered:
F 1 : squared error loss function   ( q = 1 ) F 2 : entropy loss function   ( q = 1 ) F 3 : precautionary loss function   ( q = 2 )
For two different sets of parameters and multiple combinations of censoring schemes, we obtain the MLEs and Bayes estimates. Then, we compute their mean absolute deviations (MAD) and mean squared errors (MSE), as shown in Table 2 for η 1 and Table 3 for η 2 . The ACIs, BootCIs, BCIs, and HPDCIs for R s , k at a 95% confidence level are also derived under the same combinations of censoring schemes for two different sets of parameters. When computing the BootCIs, we take B = 1000 re-samples. The average lengths (AL) and the coverage probabilities (CP) for different types of intervals are shown in Table 4 for η 1 , and Table 5 for η 2 .
To ensure the feasibility of the MCMC method, the posterior density plots for λ are provided, as shown in Figure 3 and Figure 4. It can be observed that these posterior density plots are very close to the density plots of the Gaussian distributions. Therefore, when implementing the M–H algorithm to obtain the MCMC samples, it is possible to use the Gaussian distribution as the proposed density. We perform T = 10,000 iterations for the MCMC method. To ensure convergence, trace plots for the three parameters are provided, as illustrated in Figure 5 and Figure 6. As can be seen in these two figures, the MCMC chains rapidly converge to their stationary distributions. Thus, we can consider T 0 = 500 as a burn-in period.
To better compare the effects of the different estimates, in Table 2, Table 3, Table 4 and Table 5, we present the simulation results shown in Figure 7 for the point estimates and Figure 8 for the interval estimates. Note that the x-axis sequentially represents 12 different combinations of censoring schemes.
In Figure 7, it can be seen that the Bayes estimates performed better in the majority of cases because they had lower MADs and MSEs. However, the Bayes estimate with non-informative priors, where F2 was chosen as the loss function, performed slightly worse. In the Bayes estimate, the informative priors had lower MADs and MSEs than the non-informative priors. In all cases, among the three loss functions, F3 performed the best, followed by F1, and F2 performed the worst. In addition, the performances of the different censoring schemes varied. For η 1 , the censoring scheme ( S 2 , T 5 ) exhibited the smallest MADs and MSEs, and the censoring scheme ( S 3 , T 6 ) was the second-best performer. For η 2 , the censoring scheme ( S 5 , T 5 ) exhibited the smallest MADs and MSEs, and the censoring scheme ( S 6 , T 6 ) was the second-best performer.
In Figure 8, it can be seen that BCIs and HPDCIs for the gamma informative priors performed the best, as they had the shortest average lengths and highest coverage probabilities. The logit-scale-based ACIs performed the second best. The ACIs and BootCIs performed the worst, as they had the longest average lengths and the lowest coverage probabilities. In all of these cases, in terms of the BCIs and HPDCIs, the HPDCIs had shorter average lengths, whereas the BCIs had higher coverage probabilities so they each have their own advantages. In addition, the informative priors outperformed the non-informative priors, as they exhibited both shorter average lengths and higher coverage probabilities. Furthermore, different censoring schemes also performed differently. For η 1 , in terms of average lengths, the censoring scheme that performed the best was ( S 2 , T 5 ), whereas in terms of coverage probabilities, the censoring scheme that performed the best was ( S 4 , T 4 ). For η 2 , in terms of average lengths, the censoring scheme that performed the best was ( S 5 , T 5 ), whereas in terms of coverage probabilities, the censoring scheme that performed the best was ( S 2 , T 5 ).

5.2. Real Data Example

To illustrate the suitability of the proposed method, a real data set was used. The data set we selected was obtained from http://cdec.water.ca.gov/cgi-progs/queryMonthly?SHA (accessed on 10 March 2023) and represents the water capacity of the Shasta reservoir in California, USA. We assumed that the water levels do not lead to excessive dryness if the reservoir capacities in August for at least 2 out of the next 5 years are not lower than the capacity observed in December of that year. Our purpose was to infer whether the area was excessively dry. Therefore, we can build a model to estimate the MSSR, where the capacities in August can be regarded as the strength variables and the capacity in December can be regarded as the stress variable. From 1975 to 2016, the water capacities in August and December were as follows:
X = 0.287785 0.126977 0.768563 0.703119 0.729986 0.811159 0.829569 0.726164 0.423813 0.715158 0.363359 0.463726 0.371904 0.291172 0.414087 0.538082 0.744881 0.722613 0.561238 0.813964 0.668612 0.524947 0.605979 0.715850 0.529518 0.742025 0.468782 0.345075 0.425334 0.767070 0.613911 0.461618 0.294834 0.392917 0.688100 , Y = 0.667157 0.767135 0.640395 0.650691 0.709025 0.824860 0.679829
Before proceeding with the estimation, we first performed Kolmogorov–Smirnov (K-S) tests to ensure that X and Y did follow the Chen distribution. In addition, three distributions were used to compare with the Chen distribution in the K–S tests. Their PDFs are as follows:
Weibull : f ( x ) = θ λ x λ θ 1 e ( x λ ) θ , x > 0 , θ , λ > 0 , Burr XII : f ( x ) = θ λ x θ 1 ( 1 + x θ ) λ 1 , x > 0 , θ , λ > 0 , Generalized Rayleigh : f ( x ) = 2 θ λ 2 x e ( λ x ) 2 ( 1 e ( λ x ) 2 ) θ 1 , x > 0 , θ , λ > 0 .
The results of the K–S tests are shown in Table 6. It can be seen that both X and Y followed the Chen distribution at the 0.05 significance level. In particular, the Chen distribution demonstrated better performance in the K–S tests for data set X.
In the previous sections, the estimations of R s , k were discussed under the assumption that the stress and strength variables followed the Chen distribution with the same second shape parameter. Therefore, before estimating using the real data, we needed to check whether their second shape parameters were the same. Let X 1 , X 2 , . . . , X k follow C h e n ( θ 1 , λ 1 ) independently, and let Y (independent of X 1 , X 2 , . . . , X k ) follow C h e n ( θ 2 , λ 2 ) . Then, the following hypothesis testing question is posed as
H 0 : λ 1 = λ 2 versus H 1 : λ 1 λ 2 .
In the complete sample, the corresponding likelihood function is given by
L ( θ 1 , λ 1 , θ 2 , λ 2 ) = i = 1 n j = 1 k f X ( x i j ) f Y ( y i ) = θ 1 n k λ 1 n k θ 2 n λ 2 n i = 1 n j = 1 k x i j λ 1 1 exp { x i j λ 1 + θ 1 ( 1 e x i j λ 1 ) } × i = 1 n y i λ 2 1 exp { y i λ 2 + θ 2 ( 1 e y i λ 2 ) } .
Then, the likelihood ratio statistic is constructed as follows:
r = max θ 1 , θ 2 > 0 , λ 1 = λ 2 > 0 L ( θ 1 , λ 1 , θ 2 , λ 2 ) max θ 1 , θ 2 , λ 1 , λ 2 > 0 L ( θ 1 , λ 1 , θ 2 , λ 2 ) .
For large n, when H 0 holds, one has Λ = 2 ln r χ 2 ( 1 ) asymptotically. Thus, the rejection region is { Λ > χ α 2 ( 1 ) } at a given significance level α , where χ α 2 ( 1 ) is 100 ( 1 α ) t h percentile of χ 2 ( 1 ) . For given data sets X and Y, we calculate that Λ = 0.2580 with a p-value of 0.6115. Therefore, we can accept H 0 at the 0.05 significance level, whereupon the MSSR can be estimated using our proposed method.
Then, we obtain different estimates of R s , k using the complete sample, as well as three different censored samples. The samples can be, respectively, generated by the censoring schemes as follows:
Complete Sample : S = ( 0 * 5 ) , T = ( 0 * 7 ) ( n = 7 , k = 5 , s = 2 ) . C . S 1 : S = ( 0 , 0 , 0 , 1 ) , T = ( 0 , 0 , 0 , 1 , 1 ) ( n = 5 , k = 4 , s = 2 ) . C . S 2 : S = ( 1 , 0 , 0 , 0 ) , T = ( 2 , 0 , 0 , 0 , 0 ) ( n = 5 , k = 4 , s = 2 ) . C . S 3 : S = ( 1 , 1 , 0 ) , T = ( 1 , 1 , 1 , 0 ) ( n = 4 , k = 3 , s = 1 ) .
Based on C.S 1, the censored samples are derived as
X 1 = 0.291172 0.363359 0.371904 0.414087 0.538082 0.561238 0.722613 0.744881 0.126977 0.287785 0.703119 0.729986 0.294834 0.392917 0.461618 0.613911 0.423813 0.715158 0.726164 0.811159 , Y 1 = 0.640395 0.650691 0.667157 0.679829 0.767135
Based on C.S 2, the censored samples are derived as
X 2 = 0.291172 0.371904 0.414087 0.463726 0.294834 0.461618 0.613911 0.688100 0.524947 0.605979 0.668612 0.715850 0.423813 0.726164 0.811159 0.829569 0.345075 0.468782 0.742025 0.767070 , Y 2 = 0.640395 0.679829 0.709025 0.767135 0.824860
Based on C.S 3, the censored samples are derived as
X 3 = 0.291172 0.371904 0.463726 0.126977 0.703119 0.768563 0.524947 0.605979 0.715850 0.345075 0.468782 0.767070 , Y 3 = 0.640395 0.667157 0.709025 0.824860
For the complete, as well as three progressively censored, samples, we derive various point estimates and 95% interval estimates of R s , k , as shown in Table 7 and Table 8, respectively. For the Bayesian estimates, non-informative priors are used. For three parameters in the MCMC method, we provide the CUSUM plots in Figure 9 and the trace plots in Figure 10. As can be seen in these figures, the MCMC chains converged quickly to stationary distributions, indicating that the MCMC method performed well.

6. Conclusions

We study the estimation of the MSSR based on the Chen distribution using progressively censored data. The reliability inference of multicomponent stress–strength systems has attracted significant interest, with numerous scholars contributing to the field. Progressive Type-II censoring has been widely used in lifetime tests for nearly two decades. The Chen distribution is commonly used to model real-life data in the fields of lifetime analysis and reliability theory.
We begin by obtaining the MLE. Then, the ACI based on the MLE is derived, where the delta method is used. The percentile BootCI is also constructed. Additionally, the Bayes estimates, BCIs, and HPDCIs are obtained using the MCMC method. The stochastic simulations are performed using the R software. According to the results, the Bayes estimates under the gamma priors using the precautionary loss function exhibit the smallest MADs and MSEs among all the point estimates. Among all the interval estimates, the BCIs have the shortest lengths and the HPDCIs have the highest coverage probabilities. Finally, the applicability of the method is illustrated using real data.
Our study focuses solely on the estimation of the MSSR based on the Chen distribution using a common second shape parameter. In the future, we will explore the case of unequal shape parameters. Additionally, the multicomponent stress–strength system we study contains only one stress component and we do not consider scenarios involving multiple stress components. In the future, we will explore a more complex system and further extend the model to cases where there is more than one stress component. Furthermore, we assume that the strength random variables are independently and identically distributed, which may not accurately reflect certain real-world situations. Therefore, the study of multicomponent stress–strength systems with non-identical strength variables will be considered in the future.

Author Contributions

Investigation, C.H.; Supervision, W.G. All authors have read and agreed to the published version of the manuscript.

Funding

Wenhao’s work was partially supported by The Development Project of China Railway (No. N2022J017) and the Fund of China Academy of Railway Sciences Corporation Limited (No. 2022YJ161).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are openly available in [9].

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

MSSRMulticomponent stress–strength reliability
MLEMaximum likelihood estimate
ACIAsymptotic confidence interval
BootCIBootstrap confidence interval
BCIBayesian credible interval
HPDCIHighest posterior density credible interval
MCMCMarkov Chain Monte Carlo
GELFGeneralized entropy loss function
C.SCensoring scheme
F1Squared error loss function
F2Entropy loss function
F3Precautionary loss function
MADMean absolute deviation
MSEMean squared error
ALAverage length
CPCoverage probability
PDFProbability density function
CDFCumulative distribution function
HRFHazard rate function
SCensoring scheme for the strength variables
TCensoring scheme for the strength variables
R s , k Multicomponent stress–strength reliability
XStrength variables
YStress variables
IObserved Fisher information matrix
θ First shape parameter of the Chen distribution
λ Second shape parameter of the Chen distribution
θ 1 First shape parameter of the Chen distribution for the strength variables
θ 2 First shape parameter of the Chen distribution for the stress variables
η ( θ 1 , θ 2 , λ )
qParameter of the GELF
aParameter of gamma prior
bParameter of gamma prior
sParameter of MSSR
kThe number of observed components in each system in the lifetime test
NThe number of systems in the lifetime test
nThe number of observed systems in the lifetime test
KThe number of components in each system in the lifetime test

References

  1. Weerahandi, S.; Johnson, R.A. Testing reliability in a stress-strength model when X and Y are normally distributed. Technometrics 1992, 34, 83–91. [Google Scholar] [CrossRef]
  2. Badr, M.M.; Shawky, A.I.; Alharby, A.H. The estimation of reliability from stress-strength for exponentiated Frechet distribution. Iran. J. Sci. Technol. Trans. A Sci. 2019, 43, 863–874. [Google Scholar] [CrossRef]
  3. Xu, H.; Yu, P.L.H.; Alvo, M. Detecting change points in the stress-strength reliability P(X<Y). Appl. Stoch. Model. Bus. Ind. 2019, 35, 837–857. [Google Scholar]
  4. Hassan, A.S.; Almanjahie, I.M.; Al-Omari, A.I.; Alzoubi, L.; Nagy, H.F. Stress-Strength Modeling Using Median-Ranked Set Sampling: Estimation, Simulation, and Application. Mathematics 2023, 11, 318. [Google Scholar] [CrossRef]
  5. Rao, G.S. Estimation of reliability in multicomponent stress-strength based on generalized exponential distribution. Rev. Colomb. Estad. 2012, 35, 67–76. [Google Scholar]
  6. Jia, J.M.; Yan, Z.Z.; Song, H.H.; Chen, Y. Reliability estimation in multicomponent stress-strength model for generalized inverted exponential distribution. Soft Comput. 2023, 27, 903–916. [Google Scholar] [CrossRef]
  7. Nadar, M.; Kizilaslan, F. Estimation of reliability in a multicomponent stress-strength model based on a Marshall-Olkin bivariate Weibull distribution. IEEE Trans. Reliab. 2016, 65, 370–380. [Google Scholar] [CrossRef]
  8. Kizilaslan, F.; Nadar, M. Estimation of reliability in a multicomponent stress-strength model based on a bivariate Kumaraswamy distribution. Stat. Pap. 2018, 59, 307–340. [Google Scholar] [CrossRef]
  9. Saini, S.; Tomer, S.; Garg, R. On the reliability estimation of multicomponent stress-strength model for Burr XII distribution using progressively first-failure censored samples. J. Stat. Comput. Simul. 2022, 92, 667–704. [Google Scholar] [CrossRef]
  10. Tsai, T.R.; Lio, Y.; Chiang, J.Y.; Chang, Y.W. Stress-Strength inference on the multicomponent model based on generalized exponential distributions under Type-I hybrid censoring. Mathematics 2023, 11, 1249. [Google Scholar] [CrossRef]
  11. Saini, S.; Tomer, S.; Garg, R. Inference of multicomponent stress-strength reliability following Topp-Leone distribution using progressively censored data. J. Appl. Stat. 2023, 50, 1538–1567. [Google Scholar] [CrossRef] [PubMed]
  12. Chen, Z.M. A new two-parameter lifetime distribution with bathtub shape or increasing failure rate function. Stat. Probab. Lett. 2000, 49, 155–161. [Google Scholar] [CrossRef]
  13. Chen, S.Y.; Gui, W.H. Statistical analysis of a lifetime distribution with a bathtub-shaped failure rate function under adaptive progressive Type-II censoring. Mathematics 2020, 8, 670. [Google Scholar] [CrossRef]
  14. Rastogi, M.K.; Tripathi, Y.M.; Wu, S.J. Estimating the parameters of a bathtub-shaped distribution under progressive type-II censoring. J. Appl. Stat. 2012, 39, 2389–2411. [Google Scholar] [CrossRef]
  15. Sarhan, A.M.; Hamilton, D.C.; Smith, B. Parameter estimation for a two-parameter bathtub-shaped lifetime distribution. Appl. Math. Model. 2012, 36, 5380–5392. [Google Scholar] [CrossRef]
  16. Mendez-Gonzalez, L.C.; Rodriguez-Picon, L.A.; Perez-Olguin, I.J.C.; Portilla, L.R.V. An Additive Chen Distribution with Applications to Lifetime Data. Axioms 2023, 12, 118. [Google Scholar] [CrossRef]
  17. Wang, L.; Wu, K.; Tripathi, Y.M.; Lodhi, C. Reliability analysis of multicomponent stress-strength reliability from a bathtub-shaped distribution. J. Appl. Stat. 2022, 49, 122–142. [Google Scholar] [CrossRef] [PubMed]
  18. Xu, J.; Long, J.S. Using the delta method to construct confidence intervals for predicted probabilities, rates, and discrete changes. Stata J. 2005, 5, 537–559. [Google Scholar] [CrossRef]
  19. Krishnamoorthy, K.; Lin, Y. Confidence limits for stress–strength reliability involving Weibull models. J. Stat. Plan. Inference 2010, 140, 1754–1764. [Google Scholar] [CrossRef]
  20. Stine, R. An introduction to bootstrap methods: Examples and ideas. Sociol. Methods Res. 1989, 18, 243–291. [Google Scholar] [CrossRef]
  21. Calabria, R.; Pulcini, G. Point estimation under asymmetric loss functions for left-truncated exponential samples. Commun. Stat. Theory Methods 1996, 25, 585–600. [Google Scholar] [CrossRef]
  22. Balakrishnan, N.; Sandhu, R.A. A simple simulational algorithm for generating progressive Type-II censored samples. Am. Stat. 1995, 49, 229–230. [Google Scholar]
Figure 1. A schematic diagram of progressive Type-II censoring.
Figure 1. A schematic diagram of progressive Type-II censoring.
Applsci 13 06509 g001
Figure 2. Images of PDFs and HRFs of Chen distribution under different sets of parameters.
Figure 2. Images of PDFs and HRFs of Chen distribution under different sets of parameters.
Applsci 13 06509 g002
Figure 3. Posterior density plots of λ for η 1 (a) with C.S ( S 3 , T 6 ), (b) with C.S ( S 2 , T 5 ).
Figure 3. Posterior density plots of λ for η 1 (a) with C.S ( S 3 , T 6 ), (b) with C.S ( S 2 , T 5 ).
Applsci 13 06509 g003
Figure 4. Posterior density plots of λ for η 2 (a) with C.S ( S 3 , T 6 ), (b) with C.S ( S 2 , T 5 ).
Figure 4. Posterior density plots of λ for η 2 (a) with C.S ( S 3 , T 6 ), (b) with C.S ( S 2 , T 5 ).
Applsci 13 06509 g004
Figure 5. Trace plots for η 1 (a) with C.S ( S 2 , T 5 ), (b) with C.S ( S 4 , T 1 ).
Figure 5. Trace plots for η 1 (a) with C.S ( S 2 , T 5 ), (b) with C.S ( S 4 , T 1 ).
Applsci 13 06509 g005
Figure 6. Trace plots for η 2 (a) with C.S ( S 3 , T 3 ), (b) with C.S ( S 4 , T 4 ).
Figure 6. Trace plots for η 2 (a) with C.S ( S 3 , T 3 ), (b) with C.S ( S 4 , T 4 ).
Applsci 13 06509 g006
Figure 7. Visualization results of MADs and MSEs (a) for η 1 , (b) for η 2 .
Figure 7. Visualization results of MADs and MSEs (a) for η 1 , (b) for η 2 .
Applsci 13 06509 g007
Figure 8. Visualization results of average lengths and coverage probabilities (a) for η 1 , (b) for η 2 .
Figure 8. Visualization results of average lengths and coverage probabilities (a) for η 1 , (b) for η 2 .
Applsci 13 06509 g008
Figure 9. CUSUM plots for θ 1 , θ 2 , and λ (a) with the complete sample, (b) with censoring scheme 1, (c) with censoring scheme 2, (d) with censoring scheme 3.
Figure 9. CUSUM plots for θ 1 , θ 2 , and λ (a) with the complete sample, (b) with censoring scheme 1, (c) with censoring scheme 2, (d) with censoring scheme 3.
Applsci 13 06509 g009
Figure 10. Trace plots for real data.
Figure 10. Trace plots for real data.
Applsci 13 06509 g010
Table 1. Different censoring schemes.
Table 1. Different censoring schemes.
(k, K) C.S(n, N) C.S
(5, 15) S 1 ( 0 × 4 , 10)(10, 15) T 1 ( 0 × 9 , 5)
S 2 (10, 0 × 4 ) T 2 (5, 0 × 9 )
S 3 ( 2 × 5 ) T 3 ( ( 0 , 1 ) × 5 )
(4, 10) S 4 (0, 0, 0, 6)(15, 30) T 4 ( 0 × 14 , 15)
S 5 (6, 0, 0, 0) T 5 (15, 0 × 14 )
S 6 (2, 2, 1, 1) T 6 ( 1 × 15 )
Table 2. MADs and MSEs of the point estimations for η 1 when R 3 , 5 is 0.5 and R 2 , 4 is 0.6.
Table 2. MADs and MSEs of the point estimations for η 1 when R 3 , 5 is 0.5 and R 2 , 4 is 0.6.
Bayes
MLE Prior 1Prior2
η i C.SMADMSEGELFMADMSEMADMSE
η 1 ( S 1 , T 1 )0.08940.0121F10.08530.01100.07810.0092
F20.09050.01240.08290.0104
F30.08410.01070.07710.0090
( S 2 , T 2 )0.08860.0124F10.08430.01120.07730.0094
F20.08770.01200.08020.0100
F30.08430.01120.07730.0094
( S 3 , T 3 )0.08900.0127F10.08520.01150.07810.0096
F20.09080.01260.08330.0106
F30.08390.01130.07700.0095
( S 4 , T 1 )0.09710.0144F10.09240.01310.08440.0110
F20.09840.01510.08980.0126
F30.09070.01260.08300.0105
( S 5 , T 2 )0.09050.0125F10.08680.01150.07980.0097
F20.09280.01300.08520.0110
F30.08500.01110.07820.0093
( S 6 , T 3 )0.08890.0124F10.08550.01150.07860.0097
F20.09330.01350.08560.0114
F30.08330.01090.07660.0092
( S 1 , T 4 )0.07230.0084F10.07010.00780.06590.0068
F20.07290.00820.06850.0073
F30.06950.00770.06530.0068
( S 2 , T 5 )0.06820.0073F10.06620.00690.06270.0062
F20.06820.00730.06450.0065
F30.06610.00690.06260.0062
( S 3 , T 6 )0.06910.0075F10.06690.00700.06330.0062
F20.06970.00740.06590.0066
F30.06640.00690.06280.0061
( S 4 , T 4 )0.07330.0084F10.07080.00780.06660.0069
F20.07390.00850.06950.0075
F30.07000.00770.06580.0068
( S 5 , T 5 )0.07080.0079F10.06910.00750.06560.0068
F20.07250.00830.06880.0075
F30.06800.00730.06460.0066
( S 6 , T 6 )0.07460.0085F10.07220.00800.06830.0071
F20.07540.00870.07120.0078
F30.07130.00780.06740.0069
Table 3. MADs and MSEs of the point estimations for η 2 when R 3 , 5 is 0.5901 and R 2 , 4 is 0.6885.
Table 3. MADs and MSEs of the point estimations for η 2 when R 3 , 5 is 0.5901 and R 2 , 4 is 0.6885.
Bayes
MLE Prior 1Prior 3
η i C.SMADMSEGELFMADMSEMADMSE
η 2 ( S 1 , T 1 )0.08880.0121F10.08520.01120.07190.0080
F20.09210.01300.07750.0092
F30.08330.01070.07040.0076
( S 2 , T 2 )0.08900.0123F10.08550.01130.07230.0081
F20.09140.01270.07710.0091
F30.08390.01100.07110.0078
( S 3 , T 3 )0.09040.0125F10.08670.01150.07360.0083
F20.09280.01300.07860.0094
F30.08490.01100.07210.0080
( S 4 , T 1 )0.09030.0125F10.08770.01190.07370.0084
F20.09550.01410.07990.0100
F30.08490.01110.07160.0079
( S 5 , T 2 )0.08070.0102F10.07790.00960.06620.0070
F20.08470.01140.07160.0082
F30.07580.00910.06460.0066
( S 6 , T 3 )0.08610.0114F10.08330.01070.07030.0076
F20.09010.01250.07580.0089
F30.08090.01010.06840.0072
( S 1 , T 4 )0.06970.0076F10.06780.00720.05990.0056
F20.07120.00780.06310.0061
F30.06670.00700.05910.0055
( S 2 , T 5 )0.07000.0076F10.06810.00720.06130.0058
F20.07080.00770.06370.0062
F30.06730.00710.06060.0057
( S 3 , T 6 )0.07150.0079F10.06930.00740.06150.0058
F20.07230.00800.06410.0063
F30.06840.00730.06080.0057
( S 4 , T 4 )0.06900.0073F10.06690.00690.05900.0054
F20.07010.00760.06180.0059
F30.06580.00670.05800.0052
( S 5 , T 5 )0.06300.0063F10.06180.00600.05570.0049
F20.06520.00660.05860.0054
F30.06060.00580.05460.0047
( S 6 , T 6 )0.06870.0073F10.06690.00700.05930.0055
F20.07040.00780.06230.0062
F30.06580.00680.05830.0053
Table 4. ALs and CPs of the intervals for η 1 when R 3 , 5 is 0.5 and R 2 , 4 is 0.6.
Table 4. ALs and CPs of the intervals for η 1 when R 3 , 5 is 0.5 and R 2 , 4 is 0.6.
Bayes
Prior 1Prior 2
η i C.SAL/CPACILogitBootCIBCIHPDCIBCIHPDCI
η 1 ( S 1 , T 1 )AL0.41480.39360.41990.40030.39690.38850.3855
CP0.92270.94800.92600.95330.93600.96330.9487
( S 2 , T 2 )AL0.40650.38650.40530.39340.38980.38030.3775
CP0.91270.94130.91730.94000.92270.95600.9353
( S 3 , T 3 )AL0.41130.39060.41300.39740.39410.38530.3822
CP0.91330.94670.92600.94670.92470.95600.9400
( S 4 , T 1 )AL0.42160.40080.42460.40890.40390.39730.3928
CP0.91070.94730.92670.94530.92270.95670.9413
( S 5 , T 2 )AL0.41520.39560.41270.40390.39860.39170.3871
CP0.91000.94800.93530.94200.92070.96270.9353
( S 6 , T 3 )AL0.41710.39720.41870.40580.40020.39370.3888
CP0.90270.94470.94200.94600.92070.95730.9353
( S 1 , T 4 )AL0.33750.32570.34130.32980.32740.32210.3202
CP0.93000.94930.93670.94870.93600.95870.9427
( S 2 , T 5 )AL0.32560.31480.32610.31840.31630.31120.3092
CP0.93000.94930.93730.94870.93600.95130.9453
( S 3 , T 6 )AL0.33730.32540.33920.32940.32730.32160.3198
CP0.92200.94730.93930.94600.92870.95600.9420
( S 4 , T 4 )AL0.34540.33350.34500.33860.33540.33090.3277
CP0.93870.95400.92870.95870.94130.96130.9513
( S 5 , T 5 )AL0.33480.32390.33250.32850.32530.32140.3185
CP0.91670.94130.93000.94070.92330.94800.9373
( S 6 , T 6 )AL0.34460.33290.34260.33780.33450.33020.3273
CP0.92930.94730.92930.94930.92670.95470.9433
Table 5. ALs and CPs of the intervals for η 2 when R 3 , 5 is 0.5901 and R 2 , 4 is 0.6885.
Table 5. ALs and CPs of the intervals for η 2 when R 3 , 5 is 0.5901 and R 2 , 4 is 0.6885.
Bayes
Prior 1Prior 3
η i C.SAL/CPACILogitBootCIBCIHPDCIBCIHPDCI
η 2 ( S 1 , T 1 )AL0.41200.39250.41370.40090.39610.37820.3741
CP0.91070.94400.93600.94330.91600.96730.9500
( S 2 , T 2 )AL0.40870.38980.39840.39820.39310.37340.3691
CP0.91530.94530.91200.94470.92600.96330.9500
( S 3 , T 3 )AL0.41010.39080.40740.39900.39430.37550.3719
CP0.89400.93800.92870.93870.91400.95870.9467
( S 4 , T 1 )AL0.39370.38020.39270.38890.37970.36600.3591
CP0.90070.95130.91870.95070.92400.97130.9607
( S 5 , T 2 )AL0.39310.37980.37960.38810.37920.36400.3573
CP0.90200.94400.91670.94330.92330.96130.9533
( S 6 , T 3 )AL0.39390.38040.38720.38880.38030.36520.3583
CP0.91730.96200.92470.95870.93670.97800.9653
( S 1 , T 4 )AL0.33930.32800.33910.33300.32970.31790.3153
CP0.92400.94870.93000.95000.93270.96730.9513
( S 2 , T 5 )AL0.32930.31890.32540.32340.32050.30890.3065
CP0.93330.95270.94730.95070.94200.96330.9540
( S 3 , T 6 )AL0.33920.32790.33680.33300.32960.31790.3153
CP0.92730.95070.92330.95600.93530.96870.9587
( S 4 , T 4 )AL0.32570.31790.32390.32290.31730.30810.3036
CP0.91330.94470.93470.94270.93070.95730.9507
( S 5 , T 5 )AL0.31630.30900.31180.31340.30860.29970.2955
CP0.91470.94000.93400.93800.92670.95070.9393
( S 6 , T 6 )AL0.32430.31680.32090.32190.31620.30720.3024
CP0.91270.94800.92930.94530.93000.96400.9553
Table 6. Comparison of different distributions in K–S tests.
Table 6. Comparison of different distributions in K–S tests.
Data SetDistribution θ ^ λ ^ K–S Distancep-Value
XChen4.59463.54310.14610.4050
Weibull3.54280.62490.15500.3344
Burr XII3.77026.55190.16120.2908
Generalized Rayleigh2.28692.13500.15520.3329
YChen2.90263.65740.23370.7630
Weibull11.01770.73580.22970.7807
Burr XII11.177031.72190.22720.7913
Generalized Rayleigh1481.50313.97970.19660.9048
Table 7. The point estimates for real data.
Table 7. The point estimates for real data.
Bayes
C.SMLEF1F2F3
Complete Sample0.51330.50070.46320.5165
C.S 10.43390.42520.37240.4466
C.S 20.36300.35890.30750.3808
C.S 30.48580.47600.40440.5028
Table 8. The interval estimates for real data.
Table 8. The interval estimates for real data.
IntervalsComplete SampleC.S 1C.S 2C.S 3
ACI(0.2550, 0.7715)(0.1480, 0.7199)(0.1026, 0.6235)(0.1421, 0.8294)
Logit(0.2727, 0.7478)(0.1931, 0.7106)(0.1560, 0.6374)(0.1927, 0.7890)
BootCI(0.2860, 0.8142)(0.1798, 0.8088)(0.1500, 0.7633)(0.1486, 0.8643)
BCI(0.2555, 0.7463)(0.1712, 0.7035)(0.1394, 0.6273)(0.1708, 0.7949)
HPDCI(0.2531, 0.7411)(0.1531, 0.6821)(0.1267, 0.6108)(0.1658, 0.7884)
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Hu, C.; Gui, W. Reliability Inference of Multicomponent Stress–Strength System Based on Chen Distribution Using Progressively Censored Data. Appl. Sci. 2023, 13, 6509. https://doi.org/10.3390/app13116509

AMA Style

Hu C, Gui W. Reliability Inference of Multicomponent Stress–Strength System Based on Chen Distribution Using Progressively Censored Data. Applied Sciences. 2023; 13(11):6509. https://doi.org/10.3390/app13116509

Chicago/Turabian Style

Hu, Chaoen, and Wenhao Gui. 2023. "Reliability Inference of Multicomponent Stress–Strength System Based on Chen Distribution Using Progressively Censored Data" Applied Sciences 13, no. 11: 6509. https://doi.org/10.3390/app13116509

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop