Next Article in Journal
An Alternative Promotion Time Cure Model with Overdispersed Number of Competing Causes: An Application to Melanoma Data
Previous Article in Journal
A Class of k-Symmetric Harmonic Functions Involving a Certain q-Derivative Operator
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

On Progressive Censored Competing Risks Data: Real Data Application and Simulation Study

by
Abd El-Raheem M. Abd El-Raheem
1,
Mona Hosny
2 and
Mahmoud H. Abu-Moussa
3,*
1
Department of Mathematics, Faculty of Education, Ain Shams University, Cairo 11566, Egypt
2
Department of Mathematics, College of Science for Girls, King Khalid University, Abha 61413, Saudi Arabia
3
Department of Mathematics, Faculty of Science, Cairo University, Giza 12613, Egypt
*
Author to whom correspondence should be addressed.
Mathematics 2021, 9(15), 1805; https://doi.org/10.3390/math9151805
Submission received: 19 June 2021 / Revised: 25 July 2021 / Accepted: 26 July 2021 / Published: 31 July 2021
(This article belongs to the Section Probability and Statistics)

Abstract

:
Competing risks are frequently overlooked, and the event of interest is analyzed with conventional statistical techniques. In this article, we consider the analysis of bi-causes of failure in the context of competing risk models using the extension of the exponential distribution under progressive Type-II censoring. Maximum likelihood estimates for the unknown parameters via the expectation-maximization algorithm are obtained. Moreover, the Bayes estimates of the unknown parameters are approximated using Tierney-Kadane and MCMC techniques. Interval estimates using Bayesian and classical techniques are also considered. Two real data sets are investigated to illustrate the different estimation methods, and to compare the suggested model with Weibull distribution. Furthermore, the estimation methods are compared through a comprehensive simulation study.

1. Introduction

In survival analysis and reliability experiments, the event of interest often occurs as a result of several factors. Neglecting those factors or reducing them to one factor may lead to wrong decisions and unacceptable results. Analyzing the data taking into account all the factors leading to the event of interest is called in the literature competing risks problem. For example, in a clinical trial of a group of patients with breast cancer, Boag [1] mentioned that there were causes other than breast cancer that were the cause of death for some patients. Hoel [2], in an experiment to analyze the survival of a group of mice, attributed the cause of death of mice to three causes, namely reticulum cell sarcoma, thymic lymphoma or other. In reliability experiment, Doganaksoy et al. [3] attributed the failure of electrodes to one of two modes (causes) which are the degradation of the organic material (mode D) and the insulation flaw as a result of a processing problem (mode E). More reliability experiments that are concerned with competing risks were reported by Nelson [4] in Chapter 7 and Craiu and Lee [5]. Nowadays, the patients who are infected by Covid 19 may be suffering from other diseases and hence the death may occur as a result to one of these diseases. From these examples, we can conclude that the competing risks data includes time of failure event and an indication of the causes of failure. The causes of failure may be independent of each other or may be not independent. Here, competing risks via latent failure times are used through the point of view proposed by Cox [6]. The topic of competing risks is rich in references, we mention, for example, Kalbfleish and Prentice [7], Crowder [8], Kundu et al. [9], and Koley and Kundu [10].
Progressive Type-II censoring is one of the most important and famous types of censoring, in which the lifetime experiment can be terminated after a pre-specified number of failure say m out of n, where n is the sample size. Through this type, one can remove or exclude some units during the test. This type was introduced first by Cohen [11]. Progressive Type-II censoring scheme is denoted by n , m , R 1 , R 2 , , R m , where R i is the number of units removed from the test at failure i, i = 1 , 2 , , m and R 1 + R 2 + + R m = n m . For extensive description of progressive Type-II censoring, see for example Balakrishnan and Aggarwala [12], and Balakrishnan and Cramer [13].
Nadarajah and Haghighi [14] proposed a two-parameter lifetime distribution with an increasing or decreasing failure rate as an alternative to some well-known distributions. This distribution is known as an extension of the exponential distribution. Here, we assume the latent failure times follow the extension of the exponential distribution [14] with a joint shape parameter γ > 0 and distinct scale parameters σ 1 > 0 and σ 2 > 0 , σ 1 σ 2 . Specifically, the latent variable T j , j = 1 , 2 has probability density function (PDF), cumulative distribution function (CDF) and hazard rate function (HRF) as follows:
f j ( t ) = γ σ j 1 + σ j t γ 1 exp 1 1 + σ j t γ , t > 0 , γ , σ j > 0 , j = 1 , 2 ,
F j ( t ) = 1 exp 1 1 + σ j t γ , t > 0 , j = 1 , 2 ,
and
h j ( t ) = γ σ j 1 + σ j t γ 1 , t > 0 , j = 1 , 2 .
The extension of the exponential distribution ( E E D ) is one of the distributions that have been used extensively in recent time as a lifetime model. This distribution was introduced in 2011 by both Nadarajah and Haghighi, and it is often called Nadarajah and Haghighi (NH) distribution. This distribution is distinguished by the relationship between its PDF and its HRF [14]. The E E D has a decreasing PDF and allows increasing, constant or decreasing hazard rate. Many researchers have been interested in studying this distribution. For example, in the past ten years, more than a hundred articles were related to this distribution. Some of them dealt with the distribution itself, and some of them introduced generalizations to it. We can refer to the references [15,16,17,18,19,20,21,22,23] that dealt with the E E D and to the references [24,25,26,27,28] for the extensions and generalizations of E E D .
This paper presents statistical inference of unknown parameters for E E D based on progressive Type-II censored data in the presence of competing risks. Suppose that the latent failure time comes from two independent competing risks, following the E E D with parameters ( γ , σ 1 ) and ( γ , σ 2 ) , respectively. Different estimation methods are used to estimate the parameters like the maximum likelihood method (ML), expectation-maximization (EM) method and Bayesian method. The Bayesian estimates (BEs) are approximated using Monte Carlo Markov chain method (MCMC) and Tierney-Kadane (TK) approximation; 95 % asymptotic confidence intervals (CIs) of the parameters are constructed depending on the maximum likelihood estimates (MLEs), while 95 % credible intervals of the parameters are executed depending on the MCMC generated values of parameters. A comprehensive simulation study is performed for the purpose of comparison various estimation methods. For the purpose of illustration the different estimation methods, two real data sets are analyzed. Moreover, these data sets are used to illustrate that E E D can be a possible alternative to Weibull distribution.
The rest of the paper is organized as follows: the model is formulated in Section 2. In Section 3, the MLEs are provided, while the EM algorithm is provided in Section 4. Bayesian estimations with methods of approximation are presented in Section 5. In Section 6, we present two applications of real-life data. Simulation study is provided in Section 7. Finally, the paper is concluded in Section 8.

2. Model Formulation

This section outlines the competing risks model and its notations. Suppose a lifetime experiment of n units prone to failure for two previously known causes. Let T i = min { T i 1 , T i 2 }   i = 1 , 2 , , n , where T i j is the latent failure time of the ith unit under the jth cause of failure, j = 1 , 2 . i = 1 , 2 , , n , the failure times T i 1 , and T i 2 are assumed to be independent and follow E E D ( γ , σ 1 ) and E E D ( γ , σ 2 ) , respectively. Moreover, we assume that the pairs ( T i 1 , T i 2 ) i = 1 , 2 , , n are iid random variables.
Remark 1.
If X 1 E E D ( γ , σ 1 ) and X 2 E E D ( γ , σ 2 ) are independent random variables, then the reliability function of X = min { X 1 , X 2 } is given by
Q ¯ ( x ; γ , σ 1 , σ 2 ) = P min { X 1 , X 2 } > x = ( 1 F 1 ( x ) ) ( 1 F 2 ( x ) ) = exp 2 1 + σ 1 x γ 1 + σ 2 x γ .
Furthermore, the CDF and PDF of X are given, respectively by
Q ( x ; γ , σ 1 , σ 2 ) = 1 exp 2 1 + σ 1 x γ 1 + σ 2 x γ ,
and
q ( x ; γ , σ 1 , σ 2 ) = γ σ 1 1 + σ 1 x γ 1 + σ 2 1 + σ 2 x γ 1 exp 2 1 + σ 1 x γ 1 + σ 2 x γ .
We can describe the competing risk data subject to progressive Type-II censoring as follows: Assume that n identical units are monitored to collect the failure times of those units according to prefixed censoring scheme (CS) R = ( R 1 , R 2 , , R m ) , where the failure may be caused by one of j causes. According to this scenario m is the total number of failures, n m is the total number of censored units and R i is the number of survival units randomly excluded from the test just when the ith failure occurs. Cause of failure is also recorded, and if the ith recorded failure was caused by the jth risk, then we state δ i = j . Therefore, m j = i = 1 m I ( δ i = j ) is the number of failures caused by the jth risk where m = m 1 + m 2 and
I ( δ i = j ) = 1 , δ i = j 0 , o t h e r w i s e .
According to the previous description of the competing risks data, the joint PDF for data set T = ( T 1 , T 2 , , T m ) is given by [9]
L ( T ) = n i = 1 m 1 ( n k = 1 i ( R k + 1 ) ) i = 1 m j = 1 2 f j ( t i ) F ¯ 3 j ( t i ) I ( δ i = j ) F ¯ 1 ( t i ) F ¯ 2 ( t i ) R i ,
where f j ( t i ) and F j ( t i ) = 1 F ¯ j ( t i ) are the PDF and CDF of T i for the jth cause of failure, i = 1 , 2 , , m , j = 1 , 2 .

3. Maximum Likelihood Estimation

This section concerns with the classical estimation for the parameters of E E D based on two independent competing risks under progressive Type-II censored data. From (1) and (2) in (7), one can obtain the likelihood function of γ , σ 1 and σ 2 after neglecting the constants as follows:
L ( γ , σ 1 , σ 2 ) = γ m σ 1 m 1 σ 2 m 2 i = 1 m ( 1 + σ 1 t i ) I ( δ i = 1 ) ( γ 1 ) ( 1 + σ 2 t i ) I ( δ i = 2 ) ( γ 1 ) exp i = 1 m ( R i + 1 ) { ( 1 + σ 1 t i ) γ + ( 1 + σ 2 t i ) γ } .
From (8), the log-likelihood function can be written as
( γ , σ 1 , σ 2 ) = m log γ + m 1 log σ 1 + m 2 log σ 2 + ( γ 1 ) i = 1 m I ( δ i = 1 ) log ( 1 + σ 1 t i ) + ( γ 1 ) i = 1 m I ( δ i = 2 ) log ( 1 + σ 2 t i ) i = 1 m ( R i + 1 ) { ( 1 + σ 1 t i ) γ + ( 1 + σ 2 t i ) γ } ,
the likelihood equations of γ , σ 1 and σ 2 are, respectively,
γ = m γ + i = 1 m I ( δ i = 1 ) log ( 1 + σ 1 t i ) + i = 1 m I ( δ i = 2 ) log ( 1 + σ 2 t i ) i = 1 m ( R i + 1 ) { ( 1 + σ 1 t i ) γ log ( 1 + σ 1 t i ) + ( 1 + σ 2 t i ) γ log ( 1 + σ 2 t i ) } ,
σ 1 = m 1 σ 1 + ( γ 1 ) i = 1 m I ( δ i = 1 ) t i ( 1 + σ 1 t i ) γ i = 1 m ( R i + 1 ) t i ( 1 + σ 1 t i ) γ 1 ,
σ 2 = m 2 σ 2 + ( γ 1 ) i = 1 m I ( δ i = 2 ) t i ( 1 + σ 2 t i ) γ i = 1 m ( R i + 1 ) t i ( 1 + σ 2 t i ) γ 1 .
In order to obtain the estimates γ ^ , σ ^ 1 and σ ^ 2 , (10)–(12) are set to zero and then solved numerically.

Asymptotic Confidence Intervals

In this subsection, the asymptotic CIs are constructed depending on the observed Fisher information matrix of the parameters γ , σ 1 and σ 2 , which is given by:
I ( γ ^ , σ 1 ^ , σ 2 ^ ) = 2 γ 2 2 γ σ 1 2 γ σ 2 2 σ 1 γ 2 σ 1 2 2 σ 1 σ 2 2 σ 2 γ 2 σ 2 σ 1 2 σ 2 2 | γ = γ ^ , σ 1 = σ ^ 1 , σ 2 = σ ^ 2
      Now, the 100 ( 1 α ) % two-sided asymptotic CIs for the parameters γ , σ 1 and σ 2 are obtained as follows:
γ ^ z α / 2 V ^ γ ^ , γ ^ + z α / 2 V ^ γ ^ ,
σ 1 ^ z α / 2 V ^ σ 1 ^ , σ 1 ^ + z α / 2 V ^ σ 1 ^ ,
and
σ 2 ^ z α / 2 V ^ σ 2 ^ , σ 2 ^ + z α / 2 V ^ σ 2 ^ ,
where V ^ γ ^ , V ^ σ 1 ^ and V ^ σ 2 ^ are the estimated variances of γ ^ , σ 1 ^ and σ 2 ^ , which are the diagonal elements of I 1 ( γ ^ , σ 1 ^ , σ 2 ^ ) , and z α / 2 is the upper α / 2 percentile of standard normal distribution.

4. EM Algorithm

The EM algorithm [29] is a robust method for obtaining the MLEs of the unknown parameters for censored and missing data. Therefore, we can use the EM algorithm to estimate E E D parameters under progressive Type-II censoring competing risks data. Let T = ( T 1 , T 2 , , T m ) and Z = ( Z 1 , Z 2 , , Z m ) are, respectively, the failure and censored data, where Z i = ( Z i 1 , Z i 2 , . . . , Z i R i ) i = 1 , 2 , , m . Now, let W be the vector of the complete data where W = ( T , Z ) . Thus, the log-likelihood function of γ , σ 1 and σ 2 under the complete data, W , after neglect the constants can be formulated as follows:
c ( γ , σ 1 , σ 2 ) = n log γ + n 1 log σ 1 + n 2 log σ 2 + ( γ 1 ) i = 1 m I ( δ i = 1 ) log ( 1 + σ 1 t i ) + k = 1 R i log ( 1 + σ 1 z i k ) + ( γ 1 ) i = 1 m I ( δ i = 2 ) log ( 1 + σ 2 t i ) + k = 1 R i log ( 1 + σ 2 z i k ) i = 1 m ( 1 + σ 1 t i ) γ i = 1 m k = 1 R i ( 1 + σ 1 z i k ) γ i = 1 m ( 1 + σ 2 t i ) γ i = 1 m k = 1 R i ( 1 + σ 2 z i k ) γ .
In E-step, the pseudo-log-likelihood function can be written as follows:
c * ( γ , σ 1 , σ 2 ) = n log γ + n 1 log σ 1 + n 2 log σ 2 + ( γ 1 ) i = 1 m I ( δ i = 1 ) log ( 1 + σ 1 t i ) + k = 1 R i E ( log ( 1 + σ 1 z i k ) | z i k > t i ) + ( γ 1 ) i = 1 m I ( δ i = 2 ) log ( 1 + σ 2 t i ) + k = 1 R i E ( log ( 1 + σ 2 z i k ) | z i k > t i ) i = 1 m ( 1 + σ 1 t i ) γ i = 1 m k = 1 R i E ( ( 1 + σ 1 z i k ) γ | z i k > t i ) i = 1 m ( 1 + σ 2 t i ) γ i = 1 m k = 1 R i E ( ( 1 + σ 2 z i k ) γ | z i k > t i ) .
In M-step, the ( h + 1 ) th iteration, ( γ ( h + 1 ) , σ 1 ( h + 1 ) , σ 2 ( h + 1 ) ) , can be estimated by maximizing
ρ ( γ , σ 1 , σ 2 ) = n log γ + n 1 log σ 1 + n 2 log σ 2 + ( γ 1 ) i = 1 m I ( δ i = 1 ) log ( 1 + σ 1 t i ) + k = 1 R i E ( log ( 1 + σ 1 z i k ) | z i k > t i , γ ( h ) , σ 1 ( h ) , σ 2 ( h ) ) + ( γ 1 ) i = 1 m I ( δ i = 2 ) log ( 1 + σ 2 t i ) + k = 1 R i E ( log ( 1 + σ 2 z i k ) | z i k > t i , γ ( h ) , σ 1 ( h ) , σ 2 ( h ) ) i = 1 m ( 1 + σ 1 t i ) γ i = 1 m k = 1 R i E ( ( 1 + σ 1 z i k ) γ | z i k > t i , γ ( h ) , σ 1 ( h ) , σ 2 ( h ) ) i = 1 m ( 1 + σ 2 t i ) γ i = 1 m k = 1 R i E ( ( 1 + σ 2 z i k ) γ | z i k > t i , γ ( h ) , σ 1 ( h ) , σ 2 ( h ) ) ,
where γ ( h ) , σ 1 ( h ) and σ 2 ( h ) are the hth iteration values of the parameters γ , σ 1 , and σ 2 , respectively. Thus, the updated estimate ( γ ( h + 1 ) , σ 1 ( h + 1 ) , σ 2 ( h + 1 ) ) of ( γ ( h ) , σ 1 ( h ) , σ 2 ( h ) ) can be obtained by solving (20)–(22),
n γ + i = 1 m I ( δ i = 1 ) log ( 1 + σ 1 t i ) + k = 1 R i ν 1 i k + i = 1 m I ( δ i = 2 ) log ( 1 + σ 2 t i ) + k = 1 R i ν 2 i k i = 1 m ( 1 + σ 1 t i ) γ log ( 1 + σ 1 t i ) i = 1 m k = 1 R i ω 1 i k i = 1 m ( 1 + σ 2 t i ) γ log ( 1 + σ 2 t i ) i = 1 m k = 1 R i ω 2 i k = 0 ,
n 1 σ 1 + ( γ 1 ) i = 1 m I ( δ i = 1 ) t i ( 1 + σ 1 t i ) 1 + k = 1 R i ψ 1 i k γ i = 1 m t i ( 1 + σ 1 t i ) γ 1 γ i = 1 m k = 1 R i φ 1 i k = 0 ,
n 2 σ 2 + ( γ 1 ) i = 1 m I ( δ i = 2 ) t i ( 1 + σ 2 t i ) 1 + k = 1 R i ψ 2 i k γ i = 1 m t i ( 1 + σ 2 t i ) γ 1 γ i = 1 m k = 1 R i φ 2 i k = 0 ,
where for j = 1 , 2 ,
ν j i k = E ( log ( 1 + σ j z i k ) | z i k > t i , γ ( h ) , σ 1 ( h ) , σ 2 ( h ) ) = 1 Q ( t i ; γ ( h ) , σ 1 ( h ) , σ 2 ( h ) ) t i log ( 1 + σ j z ) q ( z ; γ ( h ) , σ 1 ( h ) , σ 2 ( h ) ) d z ,
ω j i k = E ( ( 1 + σ j z i k ) γ log ( 1 + σ j z i k ) | z i k > t i , γ ( h ) , σ 1 ( h ) , σ 2 ( h ) ) = 1 Q ( t i ; γ ( h ) , σ 1 ( h ) , σ 2 ( h ) ) t i ( 1 + σ j z ) γ log ( 1 + σ j z ) q ( z ; γ ( h ) , σ 1 ( h ) , σ 2 ( h ) ) d z ,
ψ j i k = E ( z i k ( 1 + σ j z i k ) 1 | z i k > t i , γ ( h ) , σ 1 ( h ) , σ 2 ( h ) ) = 1 Q ( t i ; γ ( h ) , σ 1 ( h ) , σ 2 ( h ) ) t i z ( 1 + σ j z ) 1 q ( z ; γ ( h ) , σ 1 ( h ) , σ 2 ( h ) ) d z ,
φ j i k = E ( z i k ( 1 + σ j z i k ) γ 1 | z i k > t i , γ ( h ) , σ 1 ( h ) , σ 2 ( h ) ) = 1 Q ( t i ; γ ( h ) , σ 1 ( h ) , σ 2 ( h ) ) t i z ( 1 + σ j z ) γ 1 q ( z ; γ ( h ) , σ 1 ( h ) , σ 2 ( h ) ) d z .
Furthermore, Q ( t i ; γ ( h ) , σ 1 ( h ) , σ 2 ( h ) ) and q ( z ; γ ( h ) , σ 1 ( h ) , σ 2 ( h ) ) are defined in (5) and (6), respectively.

5. Bayesian Estimation

Through this section, the BEs for the parameters γ , σ 1 and σ 2 of the competing risks E E D are derived based on progressive Type-II censoring under three different loss functions. The first loss function is the squared error loss (SEL) function which is symmetric function and given by:
L 1 ( θ , θ ^ ) = ( θ ^ θ ) 2 ,
where θ ^ is the estimate of θ . The second loss function is asymmetric function, called linear exponential (LINEX) loss function and defined as
L 2 ( θ , θ ^ ) = e h ( θ ^ θ ) h ( θ ^ θ ) 1 , h 0 .
The third loss function is the generalized entropy (GE) loss function which is asymmetric loss function and given by:
L 3 ( θ , θ ^ ) = θ ^ θ q q log θ ^ θ 1 , q 0 .

5.1. Prior and Posterior Distributions

Consider the parameters γ , σ 1 and σ 2 are independent variables having gamma prior distributions as follows:
π 1 ( σ 1 ) σ 1 a 1 1 e b 1 σ 1 , a 1 , b 1 > 0 , σ 1 > 0 , π 2 ( σ 2 ) σ 2 a 2 1 e b 2 σ 2 , a 2 , b 2 > 0 , σ 2 > 0 , π 3 ( γ ) γ a 3 1 e b 3 γ , a 3 , b 3 > 0 , γ > 0 ,
where a i and b i for i = 1 , 2 , 3 are the hyper-parameters of the priors. For any parameter θ with prior density G a m m a ( a , b ) , the values of the hyper-parameters are obtained by solving the following two equations: (1) The mean of the Gamma prior distribution equals the MLE of θ , i.e., ( a b = θ ^ M L ). (2) The variance of the Gamma prior equals a small value, say 0.05 , i.e., ( a b 2 = 0.05 ). This method for determining hyper-parameters values was used by Nagy et al. [30].
From (8) and (26), then the joint posterior distribution of the parameters is given by:
π * ( γ , σ 1 , σ 2 | T ) γ m + a 3 1 σ 1 m 1 + a 1 1 σ 2 m 2 + a 2 1 exp b 1 σ 1 + b 2 σ 2 + b 3 γ × i = 1 m ( 1 + σ 1 t i ) I ( δ i = 1 ) ( γ 1 ) ( 1 + σ 2 t i ) I ( δ i = 2 ) ( γ 1 ) × exp i = 1 m ( R i + 1 ) { ( 1 + σ 1 t i ) γ + ( 1 + σ 2 t i ) γ } .
Now, the BE for any function g ( γ , σ 1 , σ 2 ) under the SEL function be the posterior mean of g ( γ , σ 1 , σ 2 ) which is given by:
g ^ ( γ , σ 1 , σ 2 ) B S = E ( g ( γ , σ 1 , σ 2 ) | T ) 0 0 0 g ( γ , σ 1 , σ 2 ) π * ( γ , σ 1 , σ 2 | T ) d γ d σ 1 d σ 2 .
The BE under the LINEX loss function is given by:
g ^ ( γ , σ 1 , σ 2 ) B L = 1 h log E ( e h g ( γ , σ 1 , σ 2 ) | T ) 1 h log 0 0 0 e h g ( γ , σ 1 , σ 2 ) π * ( γ , σ 1 , σ 2 | T ) d γ d σ 1 d σ 2 ,
while the BE under GE loss function is given by:
g ^ ( γ , σ 1 , σ 2 ) B E = E ( g q ( γ , σ 1 , σ 2 ) | T ) 1 / q 0 0 0 g q ( γ , σ 1 , σ 2 ) π * ( γ , σ 1 , σ 2 | T ) d γ d σ 1 d σ 2 1 / q .
Unfortunately, based on (28)–(30), the BEs cannot be obtained in a closed-form, so approximation methods are recommended. MCMC approximation method and Tierney-Kadane method are used in the following two subsections to approximate the BEs.

5.2. MCMC Method

Now, depending on the posterior distribution in (27), the conditional posterior distributions π 1 * ( γ | σ 1 , σ 2 ; T ) , π 2 * ( σ 1 | γ , σ 2 ; T ) and π 3 * ( σ 2 | γ , σ 1 ; T ) of the parameters can be computed and written, respectively, as
π 1 * ( γ | σ 1 , σ 2 ; T ) γ m + a 3 1 e b 3 γ i = 1 m ( 1 + σ 1 t i ) I ( δ i = 1 ) γ ( 1 + σ 2 t i ) I ( δ i = 2 ) γ × exp i = 1 m ( R i + 1 ) { ( 1 + σ 1 t i ) γ + ( 1 + σ 2 t i ) γ } ,
π 2 * ( σ 1 | γ , σ 2 ; T ) σ 1 m 1 + a 1 1 e b 1 σ 1 i = 1 m ( 1 + σ 1 t i ) I ( δ i = 1 ) ( γ 1 ) × exp i = 1 m ( R i + 1 ) ( 1 + σ 1 t i ) γ ,
and
π 3 * ( σ 2 | γ , σ 2 ; T ) σ 2 m 2 + a 2 1 e b 2 σ 2 i = 1 m ( 1 + σ 2 t i ) I ( δ i = 2 ) ( γ 1 ) × exp i = 1 m ( R i + 1 ) ( 1 + σ 2 t i ) γ .
Since the conditional distributions in (31), (32) and (33) are not well-known distributions, so the algorithm of Metropolis-Hastings sampler, that developed in Metropolis et al. [31], is used to generate samples of ( γ , σ 1 , σ 2 ) inside the MCMC Algorithm 1.
Algorithm 1 MCMC method
  • Step 1 Start with an initial value for the vector of the parameters, Θ = ( γ , σ 1 , σ 2 ) , say Θ ( 0 ) = ( γ ^ M L , σ 1 ^ M L , σ 2 ^ M L ) .
  • Step 2 Set i = 1 .
  • Step 3 Generate a proposal θ k * , k = 1 , 2 , 3 from N ( θ k ( i 1 ) , V ^ ( θ k ^ ) ) , where θ 1 γ , θ 2 σ 1 and θ 3 σ 2 .
  • Step 4 Calculate the acceptance probability ρ θ k = m i n 1 , π k * ( θ k * | T ) π k * ( θ k ( i 1 ) | T ) , k = 1 , 2 , 3 .
  • Step 5 Generate u from a uniform ( 0 , 1 ) distribution, if u ρ θ k , set θ k ( i ) = θ k * , else set θ k ( i ) = θ k ( i 1 ) .
  • Step 6 Set i = i + 1 .
  • Step 7 Repeat Steps 3-6 N times and obtain γ ( i ) , σ 1 ( i ) , σ 2 ( i ) , i = 1 , 2 , . . . , N .
Let g γ , σ 1 , σ 2 is any function of parameters, then the BEs of g γ , σ 1 , σ 2 depending on the generated MCMC values of parameters γ ( i ) , σ 1 ( i ) , σ 2 ( i ) , where i = B + 1 , B + 2 , . . . , N (B is the burn in period), are obtained under SEL, LINEX and GE loss functions, respectively, as follows:
g ^ ( γ , σ 1 , σ 2 ) B S = 1 N B i = B + 1 N g ( γ ( i ) , σ 1 ( i ) , σ 2 ( i ) ) ,
g ^ ( γ , σ 1 , σ 2 ) B L = 1 h log 1 N B i = B + 1 N exp { h g ( γ ( i ) , σ 1 ( i ) , σ 2 ( i ) ) } ,
g ^ ( γ , σ 1 , σ 2 ) B E = 1 N B i = B + 1 N [ g ( γ ( i ) , σ 1 ( i ) , σ 2 ( i ) ) ] q 1 / q .
The 100 ( 1 α ) % Bayesian credible CI for parameter θ , where θ is γ , σ 1 or σ 2 , is obtained from (37)
L U π * ( θ | T ) d θ = 1 α .
The integral in (37) cannot be solved analytically, so the 100 ( 1 α ) % MCMC approximation for credible intervals of parameters using the ( N B ) generated values after sorting them in an ascending order, γ ( B + 1 ) , γ ( B + 2 ) , . . . , γ ( N ) , σ 1 ( B + 1 ) , σ 1 ( B + 2 ) , , σ 1 ( N ) and σ 2 ( B + 1 ) , σ 2 ( B + 2 ) , . . . , σ 2 ( N ) , are given as follows:
( γ ( w 1 ) , γ ( w 2 ) ) , ( σ 1 ( w 1 ) , σ 1 ( w 2 ) ) , and ( σ 2 ( w 1 ) , σ 2 ( w 2 ) ) ,
where w 1 = ( ( N B ) α / 2 ) and w 2 = ( ( N B ) ( 1 α / 2 ) ) .

5.3. Tierney-Kadane Method

Tierney and Kadane (TK) technique [32] is applied to approximate the BEs of γ , σ 1 and σ 2 . The posterior expectation of g ( γ , σ 1 , σ 2 ) is given by:
g ˜ ( γ , σ 1 , σ 2 ) = E ( g ( γ , σ 1 , σ 2 ) ) = 0 0 0 g ( γ , σ 1 , σ 2 ) e ( γ , σ 1 , σ 2 ) + ϱ ( γ , σ 1 , σ 2 ) d γ d σ 1 d σ 2 0 0 0 e ( γ , σ 1 , σ 2 ) + ϱ ( γ , σ 1 , σ 2 ) d γ d σ 1 d σ 2 ,
where ϱ ( γ , σ 1 , σ 2 ) = log π ( γ , σ 1 , σ 2 ) and π ( γ , σ 1 , σ 2 ) is the joint prior of γ , σ 1 and σ 2 . Let ( γ ^ ξ , σ 1 ^ ξ , σ 2 ^ ξ ) and ( γ ^ ξ * , σ 1 ^ ξ * , σ 2 ^ ξ * ) , respectively, maximize the functions
ξ ( γ , σ 1 , σ 2 ) = 1 n ( ( γ , σ 1 , σ 2 ) + ϱ ( γ , σ 1 , σ 2 ) ) ,
and
ξ g * ( γ , σ 1 , σ 2 ) = ξ ( γ , σ 1 , σ 2 ) + 1 n log ( g ( γ , σ 1 , σ 2 ) ) .
Thus, the TK approximation of g ˜ ( γ , σ 1 , σ 2 ) in (39) is given by:
g ˜ T K = | Σ g * | | Σ | 1 / 2 exp n ξ g * ( γ ^ ξ * , σ 1 ^ ξ * , σ 2 ^ ξ * ) ξ ( γ ^ ξ , σ 1 ^ ξ , σ 2 ^ ξ ) ,
where | Σ g * | and | Σ | are the determinants of inverse of the negatives Hessian of ξ g * ( γ , σ 1 , σ 2 ) and ξ ( γ , σ 1 , σ 2 ) at ( γ ^ ξ * , σ 1 ^ ξ * , σ 2 ^ ξ * ) and ( γ ^ ξ , σ 1 ^ ξ , σ 2 ^ ξ ) , respectively.
One can obtain the BE of γ by considering g ( γ , σ 1 , σ 2 ) = γ as follows:
γ ˜ T K = | Σ γ * | | Σ | 1 / 2 exp n ξ γ * ( γ ^ ξ * , σ 1 ^ ξ * , σ 2 ^ ξ * ) ξ ( γ ^ ξ , σ 1 ^ ξ , σ 2 ^ ξ ) ,
likewise, one can obtain the BEs of σ 1 and σ 2 , respectively, as follows:
σ 1 ˜ T K = | Σ σ 1 * | | Σ | 1 / 2 exp n ξ σ 1 * ( γ ^ ξ * , σ 1 ^ ξ * , σ 2 ^ ξ * ) ξ ( γ ^ ξ , σ 1 ^ ξ , σ 2 ^ ξ ) ,
and
σ 2 ˜ T K = | Σ σ 2 * | | Σ | 1 / 2 exp n ξ σ 2 * ( γ ^ ξ * , σ 1 ^ ξ * , σ 2 ^ ξ * ) ξ ( γ ^ ξ , σ 1 ^ ξ , σ 2 ^ ξ ) .

6. Real Data Applications

Through this section, two real data applications are analyzed under the concept of competing risk model to apply and illustrate the proposed methods of estimation under progressive Type-II censoring. Furthermore, these two real data sets are used to show that E E D can be a possible alternative to one of well-known distribution such as Weibull distribution.

6.1. Application 1

For the purpose of illustrating the estimation techniques and comparing E E D with Weibull distribution, we consider a real data set that was originally monitored by Xia et al. [33] in an experiment of the breaking strength of jute fibres. In this experiment, the breaking strength failure data of jute fiber are caused by two different gauge lengths, 10 mm and 20 mm. From the original data [33], we generate a progressive Type-II censored data with n = 60 and m = 40 ; such progressive censored data as well as their causes of failure are listed in Table 1.
In the remainder of this subsection, we use the data in Table 1 to compare the E E D with Weibull distribution and to illustrate the different estimation methods. Now, the modified Kolmogorov-Smirnov test (MK-S) which was suggested by Pakyari and Balakrishnan [34] for fitting a progressive Type-II censored data is performed to test the fitting of E E D and Weibull distribution to the data set in Table 1. The goodness of fit test requires estimating unknown parameters of the suggested distributions. Therefore, the unknown parameters of the E E D and Weibull distribution are estimated using ML method, and these estimates are presented in the Table 2. Table 2 also contains the value of MK-S test statistic and corresponding p-value for both E E D and Weibull distribution.
From Table 2, we can see that the E E D provides a reasonable fit to considered data set under progressive Type-II censoring, while Weibull distribution does not fit this data set because the corresponding p-value is less than 0.05.
Table 3 and Table 4 show, respectively, the different estimates and CIs for parameters γ , σ 1 and σ 2 depending on the progressive Type-II censored real data in Table 1. For the EM algorithm, we use γ ( 0 ) = 4.1456 , σ 1 ( 0 ) = 0.00028 and σ 2 ( 0 ) = 0.00026 as starting values. The BEs are obtained in case of non-informative and informative priors. The values of the hyper-parameters of the informative priors are ( a 1 , b 1 ) = ( 4.49 × 10 7 , 0.0021 ) , ( a 2 , b 2 ) = ( 8.64 × 10 7 , 0.0029 ) and ( a 3 , b 3 ) = ( 406.80 , 90.20 ) .

6.2. Application 2

In this application, the data under the study were introduced by King [35] and then presented in Nelson [36] and Crowder [8]. These data represent the breaking strengths of 23 wire connections. There are two competing causes of failure: breakage along the wire itself and breakage at the bonded end. The complete data consists of 23 failure times in which 13 failures due to breakage of the bond and 10 failures due to the breakage of the wire itself. In this example, we generate a progressive Type-II censored sample from the complete data with m = 18 . Such progressive Type-II competing risks data are presented in Table 5. The measurements appear to be rounded to the nearest 50 mg, and the two zeros, as Nelson [36] pointed out, must be faulty bonds.
The MLEs and MK-S test are used to check the validity of the E E D to fit the data in Table 5. The value of MK-S test statistic for the data in Table 5 is 0.3263 with p-value = 0.087 . This means that the E E D provides a good fit for this set of real-life data under progressive Type-II censoring. Weibull distribution is not appropriate for data in Table 5. Moreover, Weibull distribution cannot be fitted to data sets of the type in Table 5. This is due to the nature of the Weibull distribution’s log-likelihood function, which takes the form
W ( γ , σ 1 , σ 2 ) = m log ( γ ) + m 1 γ log ( σ 1 ) + m 2 γ log ( σ 2 ) + ( γ 1 ) i = 1 m log ( t i ) ( σ 1 γ + σ 2 γ ) i = 1 m ( R i + 1 ) t i γ .
For the data in Table 5, existence of zeros, W ( γ , σ 1 , σ 2 ) diverges to , if 0 < γ < 1 and to , if γ > 1 . Thus, the MLE of γ in non-unique. Then, Weibull distribution cannot be fitted to this data. See Nadarajah and Haghighi [14] for more information on this topic.
Table 6 and Table 7 display, respectively, the different point and interval estimates for the parameters γ , σ 1 and σ 2 depending on the progressive Type-II censoring real data in Table 5. For the EM algorithm, we use MLEs of γ , σ 1 and σ 2 as starting values. The BEs for informative priors case are obtained using the following values of hyper- parameters: ( a 1 , b 1 ) = ( 2.514 × 10 7 , 0.0022 ) , ( a 2 , b 2 ) = ( 1.608 × 10 7 , 0.0017 ) and ( a 3 , b 3 ) = ( 155.028 , 55.68 ) .

7. Simulation Study

A Monte Carlo simulation study is conducted to assess the performance of different estimation methods discussed in the previous sections. The point estimates are compared through two criteria for the accuracy of estimators, namely: mean square error (MSE) and relative absolute bias (RAB). Moreover, the suggested CIs are compared in terms of their average widths (AWs) and coverage probabilities (CPs). We begin the simulation study with true values of the parameters as γ = 0.2 , σ 1 = 0.4 , and σ 2 = 0.5 . Next, 1000 progressive Type-II censored samples are generated using the algorithm of Balakrishnan and Aggarwala [12] with ( n , m ) = ( 30 , 20 ) , ( 50 , 40 ) , ( 60 , 50 ) , ( 80 , 60 ) and the following three censoring schemes:
  • Scheme I: R 1 = n m , R 2 = R 3 = . . . = R m = 0 ,
  • Scheme II: R 1 = R 2 = R 3 = . . . = R m 1 = 0 , R m = n m .
  • Scheme III: R i = 1 , i = 1 , 2 , . . . , n m , otherwise R i = 0 .
The number of failures due to cause 1 ( m 1 < m ) is a random variable that has binomial distribution with parameters m and p, where p is the relative risk rate, i.e. the probability that the failure of ith unit coming due to cause 1, it is defined as follows:
p = P ( T i 1 T i 2 ) = 0 f 1 ( t ) F ¯ 2 ( t ) d t .
For the EM algorithm, we use γ ( 0 ) = 0.09 , σ 1 ( 0 ) = 0.4 , and σ 2 ( 0 ) = 0.5 as starting values. The hyper-parameters of the informative priors are chosen to be ( a 1 , b 1 ) = ( 3.2 , 8 ) , ( a 2 , b 2 ) = ( 5 , 10 ) and ( a 3 , b 3 ) = ( 0.8 , 4 ) . The hyper-parameter for the LINEX loss function is chosen to be h = 0.5 and 0.5 , while the hyper-parameter of the GE loss is chosen to be q = 1.1 . The MCMC algorithm is repeated 11000 times with 1000 as the burn in period.
Table 8 shows the RAB and MSE for the different estimates of the parameters with different sample sizes and different CSs. Table 9 shows the AWs and CPs for 95 % asymptotic, informative-credible, and non-informative credible CIs.
From the simulation study results, we can see the following:
  • The accuracy of the different point and interval estimates increases with the increment of the sample size.
  • Using the EM algorithm augments the accuracy of the estimates compared to the ML method.
  • BEs under informative priors are more accurate than MLEs according to the two standards of accuracy, RAB and MSE.
  • BEs under non-informative priors are less accurate than these using informative priors.
  • In some cases, the MLEs are more accurate than BEs under non-informative priors, This illustrates the importance of choosing the prior distribution of unknown parameters.
  • We do not notice an absolute preference for one of the suggested Bayesian methods over the other, except the BE of the shape parameter using MCMC method under general entropy loss function has the lowest MSE and RAB.
  • Using the censoring scheme in which the censoring occurs at the beginning of the experiment may increase the accuracy of the estimates.
  • The average width of different CIs decreases as the sample size augments.
  • The credible CIs for informative prior have the smallest average width comparing to asymptotic CIs and credible CIs for non-informative prior.
  • For the different types of CIs, the average width of the shape parameter, γ , is always smaller than the corresponding average width of the scale parameters, σ 1 and σ 2 .

8. Conclusions

Competing risks are often overlooked in survival and reliability analysis, which ultimately leads to incorrect and inaccurate decisions. In this study, we have investigated progressive Type-II censoring in the presence of competing risks. We have supposed that the latent failure times under the competing risks follow independent E E D with the same shape parameter and different scale parameters. In this setting, we have estimated the unknown parameters using ML and EM algorithm methods. The parameters also were estimated using Bayesian estimation approach via TK technique and MCMC algorithm, under non-informative and informative priors. Furthermore, the asymptotic and credible CIs for the unknown parameters were constructed. The suggested estimation methods were compared through a comprehensive simulation study. From the results of simulation study, we have noted that the BEs under informative prior more accurate than corresponding non-informative prior BEs and classical estimates in terms of both RAB and MSE. We have got the same observation regarding confidence intervals. Moreover, two real examples were analyzed to demonstrate the suggested methods and to illustrate that the E E D can be an appropriate alternative to Weibull distribution.

Author Contributions

Conceptualization, A.E.-R.M.A.E.-R., M.H. and M.H.A.-M.; methodology, A.E.-R.M.A.E.-R., M.H. and M.H.A.-M.; software, A.E.-R.M.A.E.-R., M.H. and M.H.A.-M.; validation, A.E.-R.M.A.E.-R., M.H. and M.H.A.-M.; formal analysis, A.E.-R.M.A.E.-R., M.H. and M.H.A.-M.; investigation, A.E.-R.M.A.E.-R., M.H. and M.H.A.-M.; resources, A.E.-R.M.A.E.-R., M.H. and M.H.A.-M.; data curation, A.E.-R.M.A.E.-R., M.H. and M.H.A.-M.; writing—original draft preparation, A.E.-R.M.A.E.-R., M.H. and M.H.A.-M.; writing—review and editing, A.E.-R.M.A.E.-R., M.H. and M.H.A.-M.; visualization, A.E.-R.M.A.E.-R., M.H. and M.H.A.-M.; supervision, A.E.-R.M.A.E.-R., M.H. and M.H.A.-M.; project administration, A.E.-R.M.A.E.-R., M.H. and M.H.A.-M.; funding acquisition, A.E.-R.M.A.E.-R., M.H. and M.H.A.-M. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Acknowledgments

The second author extends her appreciation to the deanship of scientific research at King Khalid University for funding this work through general research project under grant No. G.R.P-10/42.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Boag, J.W. Maximum likelihood estimates of the proportion of patients cured by cancer therapy. J. R. Stat. Soc. Ser. B (Methodol.) 1949, 11, 15–44. [Google Scholar] [CrossRef]
  2. Hoel, D.G. A representation of mortality data by competing risks. Biometrics 1972, 28, 475–488. [Google Scholar] [CrossRef] [PubMed]
  3. Doganaksoy, N.; Hahn, G.J.; Meeker, W.Q. Reliability analysis by failure mode. Qual. Prog. 2002, 35, 47–52. [Google Scholar]
  4. Nelson, W. Accelerated Testing: Statistical Models, Test Plans, and Data Analysis; Wiley: New York, NY, USA, 1990. [Google Scholar]
  5. Craiu, R.V.; Lee, T.C.M. Model selection for the competing-risks model with and without masking. Technometrics 2005, 47, 457–467. [Google Scholar] [CrossRef] [Green Version]
  6. Cox, D.R. The analysis of exponentially distributed lifetimes with two types of failure. J. R. Stat. Soc. Ser. B (Methodol.) 1959, 21, 411–421. [Google Scholar]
  7. Kalbfleisch, J.D.; Prentice, R.L. The Statistical Analysis of Failure Time Data; John Wiley & Sons: New York, NY, USA, 2011. [Google Scholar]
  8. Crowder, M.J. Classical Competing Risks; Chapman and Hall/CRC: New York, NY, USA, 2001. [Google Scholar]
  9. Kundu, D.; Kannan, N.; Balakrishnan, N. Analysis of Progressively Censored Competing Risks Data; Handbook of Statistics, 23; Elsevier Publications: New York, NY, USA, 2003; pp. 331–348. [Google Scholar]
  10. Koley, A.; Kundu, D. On generalized progressive hybrid censoring in presence of competing risks. Metrika 2017, 80, 401–426. [Google Scholar] [CrossRef] [Green Version]
  11. Cohen, A.C. Progressively censored samples in life testing. Technometrics 1963, 5, 327–339. [Google Scholar] [CrossRef]
  12. Balakrishnan, N.; Aggarwala, R. Progressive Censoring: Theory, Methods, and Applications; Springer Science & Business Media: New York, NY, USA, 2000. [Google Scholar]
  13. Balakrishnan, N.; Cramer, E. The Art of Progressive Censoring: Applications to Reliability and Quality; Springer Science & Business Media: New York, NY, USA, 2014. [Google Scholar]
  14. Nadarajah, S.; Haghighi, F. An extension of the exponential distribution. Statistics 2011, 45, 543–558. [Google Scholar] [CrossRef]
  15. Haghighi, F. Optimal design of accelerated life tests for an extension of the exponential distribution. Reliab. Eng. Syst. Saf. 2014, 131, 251–256. [Google Scholar] [CrossRef]
  16. Haghighi, F. Simple step-stress model for an extension of the exponential distribution with type-I censoring. Int. J. Qual. Reliab. Manag. 2015, 32, 906–920. [Google Scholar] [CrossRef]
  17. El-Din, M.M.; Abu-Youssef, S.E.; Ali, N.S.A.; Abd El-Raheem, A.M. Estimation in constant-stress accelerated life tests for extension of the exponential distribution under progressive censoring. Metron 2016, 74, 253–273. [Google Scholar] [CrossRef]
  18. El-Din, M.M.; Abu-Youssef, S.E.; Ali, N.S.A.; Abd El-Raheem, A.M. Parametric inference on step-stress accelerated life testing for the extension of exponential distribution under progressive type-II censoring. Commun. Stat. Appl. Methods 2016, 23, 269–285. [Google Scholar] [CrossRef] [Green Version]
  19. El-Din, M.M.; Abu-Youssef, S.E.; Ali, N.S.A.; Abd El-Raheem, A.M. Classical and Bayesian inference on progressive-stress accelerated life testing for the extension of the exponential distribution under progressive type-II censoring. Qual. Reliab. Eng. Int. 2017, 33, 2483–2496. [Google Scholar]
  20. El-Din, M.M.; Abu-Youssef, S.E.; Ali, N.S.A.; Abd El-Raheem, A.M. Inference on constant-stress accelerated life testing based on geometric process for extension of the exponential distribution under Type-II progressive censoring. Pak. J. Stat. Oper. Res. 2018, 14, 233–251. [Google Scholar]
  21. Abd El-Raheem, A.M. Optimal plans of constant-stress accelerated life tests for extension of the exponential distribution. J. Test. Eval. 2019, 47, 1586–1605. [Google Scholar] [CrossRef]
  22. Abd El-Raheem, A.M. Optimal plans and estimation of constant-stress accelerated life tests for the extension of the exponential distribution under type-I censoring. J. Test. Eval. 2019, 47, 3781–3821. [Google Scholar] [CrossRef]
  23. Abd El-Raheem, A.M. Optimal design of multiple constant-stress accelerated life testing for the extension of the exponential distribution under type-II censoring. J. Comput. Appl. Math. 2021, 382. [Google Scholar] [CrossRef]
  24. Lemonte, A.J. A new exponential-type distribution with constant. decreasing, increasing, upside-down bathtub and bathtub-shaped failure rate function. Comput. Stat. Data Anal. 2013, 62, 149–170. [Google Scholar] [CrossRef]
  25. Lemonte, A.J.; Cordeiro, G.M.; Moreno-Arenas, G. A new useful three-parameter extension of the exponential distribution. Statistics 2015, 50, 1–26. [Google Scholar] [CrossRef]
  26. Alizadeh, M.; Rasekhi, M.; Yousof, H.M.; Ramires, T.G.; Hamedani, G.G. Extended exponentiated Nadarajah-Haghighi model: Mathematical properties. characterizations and applications. Studia Sci. Math. Hung. 2018, 55, 498–522. [Google Scholar] [CrossRef]
  27. Tahir, M.H.; Cordeiro, G.M.; Ali, S.; Dey, S.; Manzoor, A. The inverted Nadarajah-Haghighi distribution: Estimation methods and applications. J. Stat. Comput. Simul. 2018, 88, 2775–2798. [Google Scholar] [CrossRef]
  28. Peña-Ramírez, F.A.; Guerra, R.R.; Canterle, D.R.; Cordeiro, G.M. The logistic Nadarajah-Haghighi distribution and its associated regression model for reliability applications. Reliab. Eng. Syst. Saf. 2020, 204. [Google Scholar] [CrossRef]
  29. Dempster, A.P.; Laird, N.M.; Rubin, D.B. Maximum likelihood from incomplete data via the EM algorithm. J. R. Stat. Soc. Ser. B (Methodol.) 1977, 39, 1–22. [Google Scholar]
  30. Nagy, M.; Sultan, K.S.; Abu-Moussa, M.H. Analysis of the generalized progressive hybrid censoring from Burr Type-XII lifetime model. AIMS Math. 2021, 6, 9675–9704. [Google Scholar] [CrossRef]
  31. Metropolis, N.; Rosenbluth, A.W.; Rosenbluth, M.N.; Teller, A.H.; Teller, E. Equation of state calculations by fast computing machines. J. Chem. Phys. 1953, 21, 1087–1092. [Google Scholar] [CrossRef] [Green Version]
  32. Tierney, L.; Kadane, J.B. Accurate approximations for posterior moments and marginal densities. J. Am. Stat. Assoc. 1986, 81, 82–86. [Google Scholar] [CrossRef]
  33. Xia, Z.P.; Yu, J.Y.; Cheng, L.D.; Liu, L.F.; Wang, W.M. Study on the breaking strength of jute fibers using modified Weibull distribution. Compos. Part A Appl. Sci. Manuf. 2009, 40, 54–59. [Google Scholar] [CrossRef]
  34. Pakyari, R.; Balakrishnan, N. A general purpose approximate goodness-of-fit test for progressively type-II censored data. IEEE Trans. Reliab. 2012, 61, 238–244. [Google Scholar] [CrossRef]
  35. King, J.R. Probability Charts for Decision Making; Industrial Press: New York, NY, USA, 1971. [Google Scholar]
  36. Nelson, W. Applied Life Data Analysis; John Wiley & Sons: New York, NY, USA, 1982. [Google Scholar]
Table 1. Generated progressive Type-II competing risks sample from data of Xia et al. [33].
Table 1. Generated progressive Type-II competing risks sample from data of Xia et al. [33].
i12345678910
t i 36.7543.9345.5848.0150.1671.4683.5599.72101.15113.85
δ i 2122122212
R i 1111111111
i11121314151617181920
t i 116.99119.86141.38145.96163.40166.49183.16187.85200.16212.13
δ i 2212121221
R i 1111111111
i21222324252627282930
t i 284.64291.27353.24375.81376.42419.02422.11456.60506.60530.55
δ i 2112121211
R i 0000000000
i31323334353637383940
t i 547.44578.62581.60585.57594.29662.66671.49688.16700.74704.66
δ i 2222221211
R i 0000000000
Table 2. Results of MK-S test of E E D and Weibull distribution for jute fibre data.
Table 2. Results of MK-S test of E E D and Weibull distribution for jute fibre data.
DistributionMLEsMK-S Test Statisticp-Value
γ ^ σ 1 ^ σ 2 ^
E E D 4.5100 2.129 × 10 4 2.940 × 10 4 0.15030.0650
Weibull1.5247 1.442 × 10 3 1.881 × 10 3 0.15210.0380
Table 3. MLEs and BEs for the parameters of E E D for application 1.
Table 3. MLEs and BEs for the parameters of E E D for application 1.
ParameterMLEEMBE (Informative)BE (Non-Informative)
TKSELINEX ( h = 1.5 ) GE ( q = 0.1 ) TKSELINEX ( h = 1.5 ) GE ( q = 0.1 )
γ 4.51004.33974.51744.54744.51624.54234.69047.11002.99995.4030
σ 1 2.129 × 10 4 2.515 × 10 4 2.104 × 10 4 2.118 × 10 4 2.118 × 10 4 2.065 × 10 4 2.106 × 10 4 2.237 × 10 4 2.236 × 10 4 1.650 × 10 4
σ 2 2.940 × 10 4 2.782 × 10 4 2.917 × 10 4 2.916 × 10 4 2.916 × 10 4 2.872 × 10 4 2.834 × 10 4 3.143 × 10 4 3.142 × 10 4 2.309 × 10 4
Table 4. 95 % CIs with their lengths of the parameters γ , σ 1 and σ 2 for application 1.
Table 4. 95 % CIs with their lengths of the parameters γ , σ 1 and σ 2 for application 1.
ParameterAsymp. CIAsymp. LBE (Informative)BE (Non-Informative)
Cred. CICred. LCred. CICred. L
γ ( 0.1932 ,13.0789)12.8857(4.1659,4.9336)0.7676(1.5938,21.3665)19.7727
σ 1 ( 0.031 × 10 4 , 6.552 × 10 4 ) 6.521 × 10 4 ( 1.312 × 10 4 , 3.125 × 10 4 ) 1.812 × 10 4 ( 4.278 × 10 5 , 6.685 × 10 4 ) 6.257 × 10 4
σ 2 ( 0.059 × 10 4 , 9.135 × 10 4 ) 9.076 × 10 4 ( 2.014 × 10 4 , 3.866 × 10 4 ) 1.851 × 10 4 ( 5.780 × 10 5 , 9.282 × 10 4 ) 8.704 × 10 4
Table 5. Generated progressive Type-II competing risks sample from data of King [35].
Table 5. Generated progressive Type-II competing risks sample from data of King [35].
i123456789
t i 005507509501150115011501150
δ i 111212121
R i 101010101
i101112131415161718
t i 125012501350145014501550155015501850
δ i 112211222
R i 000000000
Table 6. MLEs and BEs for the parameters of application 2.
Table 6. MLEs and BEs for the parameters of application 2.
ParameterMLEEMBE (Informative)BE (Non-Informative)
TKSELINEX ( h = 1.5 ) GE ( q = 0.1 ) TKSELINEX ( h = 1.5 ) GE ( q = 0.1 )
γ 2.96102.41102.79832.82352.77642.81106.02614.49422.60953.8053
σ 1 1.261 × 10 4 1.766 × 10 4 1.322 × 10 4 1.323 × 10 4 1.323 × 10 4 1.263 × 10 4 0.882 × 10 4 1.117 × 10 4 1.117 × 10 4 0.908 × 10 4
σ 2 1.092 × 10 4 1.254 × 10 4 1.137 × 10 4 1.134 × 10 4 1.134 × 10 4 1.070 × 10 4 0.654 × 10 4 0.975 × 10 4 0.975 × 10 4 0.785 × 10 4
Table 7. 95 % CIs with their lengths of the parameters γ , σ 1 and σ 2 for application 2.
Table 7. 95 % CIs with their lengths of the parameters γ , σ 1 and σ 2 for application 2.
ParameterAsymp. CIAsymp. LBE (Informative)BE (Non-Informative)
Cred. CICred. LCred. CICred. L
γ (−1.500,7.422)8.923(2.373,3.267)0.894(1.378,10.014)8.635
σ 1 ( 8.605 × 10 5 , 33.826 × 10 5 ) 42.432 × 10 5 ( 6.44 × 10 5 , 20.874 × 10 5 ) 14.43 × 10 5 ( 2.964 × 10 5 , 30.062 × 10 5 ) 27.097 × 10 5
σ 2 ( 7.083 × 10 5 , 28.920 × 10 5 ) 36.001 × 10 5 ( 5.454 × 10 5 , 18.537 × 10 5 ) 13.08 × 10 5 ( 2.443 × 10 5 , 26.284 × 10 5 ) 23.841 × 10 5
Table 8. Values of RAB and MSE for the classical and Bayesian estimation of distribution parameters.
Table 8. Values of RAB and MSE for the classical and Bayesian estimation of distribution parameters.
( n , m ) CS θ MLEMInformativeNon-Informative
TKMCMCTKMCMC
SELINEX ( h = 0.5 )LINEX ( h = 0.5 )GESELINEX ( h = 0.5 )LINEX( h = 0.5 )GE
( 30 , 20 ) I γ RAB0.37510.22280.15900.15870.15730.16010.14120.31320.23600.23080.24140.1769
MSE1.5 × 10 2 2.2 × 10 3 1.9 × 10 3 1.8 × 10 3 1.8 × 10 3 1.9 × 10 3 1.4 × 10 3 7.2 × 10 3 4.1 × 10 3 3.9 × 10 3 4.3 × 10 3 2.3 × 10 3
σ 1 RAB0.52030.49210.16820.18770.18430.19270.23530.41680.46360.40380.56480.4415
MSE6.3 × 10 2 7.5 × 10 2 6.8 × 10 3 8.5 × 10 3 8.2 × 10 3 9.0 × 10 3 1.3 × 10 2 4.0 × 10 2 5.1 × 10 2 3.7 × 10 2 8.3 × 10 2 4.0 × 10 2
σ 2 RAB0.46840.36340.11410.12830.12600.13270.17040.34070.36210.30770.46490.4008
MSE7.6 × 10 2 5.6 × 10 2 5.1 × 10 3 6.3 × 10 3 6.1 × 10 3 6.7 × 10 3 1.1 × 10 2 4.2 × 10 2 4.9 × 10 2 3.4 × 10 2 8.6 × 10 2 5.2 × 10 2
II γ RAB0.59290.23580.16190.16180.15960.16390.13840.39820.13120.12890.13450.1713
MSE3.7 × 10 2 2.4 × 10 3 1.8 × 10 3 1.8 × 10 3 1.8 × 10 3 1.9 × 10 3 1.3 × 10 3 1.9 × 10 2 1.4 × 10 3 1.2 × 10 3 1.7 × 10 3 1.5 × 10 3
σ 1 RAB0.55090.51920.17220.19520.18890.20320.21430.44770.49660.41300.64110.4071
MSE6.8 × 10 2 7.6 × 10 2 7.3 × 10 3 9.2 × 10 3 8.6 × 10 3 1.0 × 10 2 1.1 × 10 2 4.9 × 10 2 6.1 × 10 2 4.0 × 10 2 1.1 × 10−13.5 × 10 2
σ 2 RAB0.37630.10650.15870.15990.15850.16130.14450.34900.45650.33450.66140.2804
MSE8.8 × 10 2 7.3 × 10 2 4.8 × 10 3 5.9 × 10 3 5.7 × 10 3 6.2 × 10 3 1.1 × 10 2 4.7 × 10 2 7.3 × 10 2 4.0 × 10 2 1.5 × 10−12.8 × 10 2
III γ RAB0.25930.21910.21720.21630.21580.21680.20710.29960.22560.22060.23100.1702
MSE1.5 × 10 2 2.1 × 10 3 1.8 × 10 3 1.8 × 10 3 1.8 × 10 3 1.9 × 10 3 1.4 × 10 3 6.7 × 10 3 3.8 × 10 3 3.7 × 10 3 4.0 × 10 3 2.1 × 10 3
σ 1 RAB0.52590.32730.18540.20600.20000.21350.22250.41670.48100.41300.59870.4154
MSE6.5 × 10 2 2.7 × 10 2 8.2 × 10 3 1.0 × 10 2 9.5 × 10 3 1.1 × 10 2 1.2 × 10 2 4.1 × 10 2 5.7 × 10 2 4.0 × 10 2 9.6 × 10 2 3.7 × 10 2
σ 2 RAB0.47230.30500.12700.13870.13730.14160.18280.33640.37600.31770.48510.3882
MSE7.7 × 10 2 3.7 × 10 2 6.1 × 10 3 7.2 × 10 3 7.1 × 10 3 7.5 × 10 3 1.2 × 10 2 4.2 × 10 2 5.2 × 10 2 3.6 × 10 2 9.1 × 10 2 4.9 × 10 2
( 50 , 40 ) I γ RAB0.16230.13580.10400.10290.10240.10340.09670.17640.14700.14530.14870.1242
MSE2.1 × 10 3 9.0 × 10 4 7.6 × 10 4 7.3 × 10 4 7.2 × 10 4 7.4 × 10 4 6.3 × 10 4 2.2 × 10 3 1.6 × 10 3 1.5 × 10 3 1.6 × 10 3 1.1 × 10 3
σ 1 RAB0.36950.30960.15790.17200.16590.17950.17030.27820.30100.27550.33990.2975
MSE3.5 × 10 2 2.7 × 10 2 6.3 × 10 3 7.7 × 10 3 7.0 × 10 3 8.5 × 10 3 6.5 × 10 3 1.8 × 10 2 2.3 × 10 2 1.8 × 10 2 3.1 × 10 2 1.9 × 10 2
σ 2 RAB0.32530.23870.11570.12280.12230.12410.15760.22620.21800.20730.24030.3078
MSE3.7 × 10 2 2.2 × 10 2 4.8 × 10 3 5.3 × 10 3 5.3 × 10 3 5.4 × 10 3 9.2 × 10 3 1.8 × 10 2 1.6 × 10 2 1.5 × 10 2 2.0 × 10 2 3.1 × 10 2
II γ RAB0.23790.12470.12690.12370.12280.12460.11300.26340.15690.15390.16010.1228
MSE5.3 × 10 3 8.9 × 10 4 1.1 × 10 3 1.1 × 10 3 1.1 × 10 3 1.1 × 10 3 8.7 × 10 4 6.3 × 10 3 1.7 × 10 3 1.6 × 10 3 1.7 × 10 3 9.7 × 10 4
σ 1 RAB0.39970.32900.15970.17850.17220.18600.17310.29600.33610.29960.38750.2875
MSE3.9 × 10 2 3.0 × 10 2 6.3 × 10 3 8.1 × 10 3 7.4 × 10 3 9.0 × 10 3 6.7 × 10 3 2.1 × 10 2 2.8 × 10 2 2.2 × 10 2 3.8 × 10 2 1.8 × 10 2
σ 2 RAB0.35040.26550.11440.12230.12210.12360.16000.21720.21330.19740.24310.3043
MSE4.2 × 10 2 2.6 × 10 2 4.7 × 10 3 5.3 × 10 3 5.3 × 10 3 5.4 × 10 3 9.4 × 10 3 1.7 × 10 2 1.5 × 10 2 1.3 × 10 2 2.1 × 10 2 3.0 × 10 2
III γ RAB0.15220.13720.10450.10330.10280.10370.09750.16510.14360.14220.14510.1253
MSE1.6 × 10 3 9.3 × 10 4 7.3 × 10 4 7.0 × 10 4 7.0 × 10 4 7.1 × 10 4 6.1 × 10 4 2.0 × 10 3 1.5 × 10 3 1.5 × 10 3 1.5 × 10 3 1.1 × 10 3
σ 1 RAB0.36790.28030.16610.18140.17410.19030.16620.31500.33790.30910.37950.3023
MSE3.5 × 10 2 2.1 × 10 2 6.9 × 10 3 8.4 × 10 3 7.6 × 10 3 9.4 × 10 3 6.3 × 10 3 2.3 × 10 2 2.8 × 10 2 2.3 × 10 2 3.7 × 10 2 2.0 × 10 2
σ 2 RAB0.31810.27030.11800.12510.12350.12790.15360.21850.21760.20640.24050.2965
MSE3.5 × 10 2 2.7 × 10 2 5.0 × 10 3 5.5 × 10 3 5.4 × 10 3 5.7 × 10 3 8.8 × 10 3 1.7 × 10 2 1.6 × 10 2 1.5 × 10 2 2.0 × 10 2 2.9 × 10 2
( 60 , 50 ) I γ RAB0.12310.09500.09420.09240.09200.09280.08700.12870.11580.11490.11670.1037
MSE1.1 × 10 3 6.2 × 10 4 6.0 × 10 4 5.8 × 10 4 5.7 × 10 4 5.8 × 10 4 5.0 × 10 4 1.1 × 10 3 9.1 × 10 4 8.9 × 10 4 9.2 × 10 4 7.0 × 10 4
σ 1 RAB0.20590.20010.11290.12280.11570.13110.11160.25800.28320.25700.31970.2360
MSE3.0 × 10 2 9.4 × 10 3 3.1 × 10 3 3.7 × 10 3 3.3 × 10 3 4.3 × 10 3 2.8 × 10 3 1.7 × 10 2 2.0 × 10 2 1.6 × 10 2 2.7 × 10 2 1.2 × 10 2
σ 2 RAB0.22010.17640.08000.07700.08120.07400.15670.20560.19260.18710.20620.2743
MSE1.7 × 10 2 1.1 × 10 2 2.5 × 10 3 2.2 × 10 3 2.5 × 10 3 2.0 × 10 3 7.5 × 10 3 1.5 × 10 2 1.3 × 10 2 1.2 × 10 2 1.5 × 10 2 2.5 × 10 2
II γ RAB0.16180.10950.10850.10480.10410.10540.09680.16990.13090.12890.13300.1083
MSE1.9 × 10 3 8.5 × 10 4 7.9 × 10 4 7.3 × 10 4 7.2 × 10 4 7.4 × 10 4 6.0 × 10 4 2.2 × 10 3 1.3 × 10 3 1.2 × 10 3 1.3 × 10 3 8.3 × 10 4
σ 1 RAB0.22990.20110.11110.12490.11810.13300.11400.25270.27600.25000.31270.2412
MSE1.2 × 10 2 9.6 × 10 3 3.0 × 10 3 3.9 × 10 3 3.4 × 10 3 4.5 × 10 3 2.8 × 10 3 1.6 × 10 2 2.0 × 10 2 1.6 × 10 2 2.6 × 10 2 1.3 × 10 2
σ 2 RAB0.25640.21790.09010.08410.08890.08050.16600.20070.18820.18040.20450.2800
MSE2.2 × 10 2 1.7 × 10 2 3.0 × 10 3 2.6 × 10 3 3.0 × 10 3 2.3 × 10 3 8.4 × 10 3 1.4 × 10 2 1.2 × 10 2 1.1 × 10 2 1.5 × 10 2 2.6 × 10 2
III γ RAB0.11450.09760.08960.08770.08740.08810.08370.13880.12390.12280.12500.1097
MSE9.5 × 10 4 6.1 × 10 4 5.5 × 10 4 5.2 × 10 4 5.1 × 10 4 5.2 × 10 4 4.6 × 10 4 1.4 × 10 3 1.1 × 10 3 1.1 × 10 3 1.1 × 10 3 8.4 × 10 4
σ 1 RAB0.21080.20170.11440.12520.11860.13300.11610.25000.27150.25020.30090.2395
MSE1.0 × 10 2 9.7 × 10 3 3.2 × 10 3 3.9 × 10 3 3.4 × 10 3 4.5 × 10 3 2.9 × 10 3 1.5 × 10 2 1.9 × 10 2 1.6 × 10 2 2.4 × 10 2 1.2 × 10 2
σ 2 RAB0.21000.18180.07860.07590.07940.07380.15230.20410.19700.19070.21090.2679
MSE1.6 × 10 2 1.2 × 10 2 2.4 × 10 3 2.2 × 10 3 2.5 × 10 3 2.0 × 10 3 7.2 × 10 3 1.5 × 10 2 1.3 × 10 2 1.3 × 10 2 1.5 × 10 2 2.5 × 10 2
( 80 , 60 ) I γ RAB0.10490.09630.08440.08270.08230.08310.07810.11010.10050.09980.10110.0920
MSE7.8 × 10 4 7.2 × 10 4 5.1 × 10 4 4.8 × 10 4 4.8 × 10 4 4.9 × 10 4 4.2 × 10 4 8.2 × 10 4 6.8 × 10 4 6.7 × 10 4 6.9 × 10 4 5.5 × 10 4
σ 1 RAB0.16480.14030.08580.08900.08600.09310.11220.23410.25370.23380.28020.2149
MSE6.0 × 10 3 5.6 × 10 3 1.7 × 10 3 1.8 × 10 3 1.7 × 10 3 2.0 × 10 3 2.8 × 10 3 1.4 × 10 2 1.7 × 10 2 1.4 × 10 2 2.1 × 10 2 9.9 × 10 3
σ 2 RAB0.15260.1400.05130.04930.05160.04900.11410.18700.18240.17660.19360.2386
MSE8.2 × 10 3 7.0 × 10 3 9.4 × 10 4 8.3 × 10 4 9.3 × 10 4 8.1 × 10 4 4.0 × 10 3 1.2 × 10 2 1.2 × 10 2 1.1 × 10 2 1.3 × 10 2 2.0 × 10 2
II γ RAB0.13780.12840.10100.09640.09570.09710.08780.17120.12720.12520.12930.1037
MSE1.4 × 10 3 9.5 × 10 4 7.0 × 10 4 6.4 × 10 4 6.3 × 10 4 6.5 × 10 4 5.1 × 10 4 2.2 × 10 3 1.1 × 10 3 1.1 × 10 3 1.2 × 10 3 7.3 × 10 4
σ 1 RAB0.18330.17370.08710.09230.08850.09730.10790.22910.25540.23290.28520.2157
MSE7.4 × 10 3 6.3 × 10 3 1.7 × 10 3 2.0 × 10 3 1.8 × 10 3 2.2 × 10 3 2.7 × 10 3 1.3 × 10 2 1.7 × 10 2 1.4 × 10 2 2.2 × 10 2 9.8 × 10 3
σ 2 RAB0.16910.16340.05190.04740.04880.04790.10980.17960.17010.16380.18350.2472
MSE1.0 × 10 2 7.4 × 10 3 1.0 × 10 3 7.7 × 10 4 8.4 × 10 4 7.7 × 10 4 3.7 × 10 3 1.1 × 10 2 1.0 × 10 2 9.5 × 10 3 1.2 × 10 2 2.1 × 10 2
III γ RAB0.10280.09730.08570.08370.08340.08400.07940.11170.10350.10290.10410.0954
MSE7.3 × 10 4 7.2 × 10 4 4.9 × 10 4 4.6 × 10 4 4.6 × 10 4 4.7 × 10 4 4.1 × 10 4 8.8 × 10 4 7.5 × 10 4 7.4 × 10 4 7.7 × 10 4 6.2 × 10 4
σ 1 RAB0.15750.12920.08890.09210.08880.09640.10540.23870.25620.23780.27980.2155
MSE5.5 × 10 3 3.9 × 10 3 1.8 × 10 3 1.9 × 10 3 1.8 × 10 3 2.2 × 10 3 2.6 × 10 3 1.5 × 10 2 1.8 × 10 2 1.5 × 10 2 2.2 × 10 2 1.0 × 10 2
σ 2 RAB0.14270.14920.05110.04920.05160.04840.11210.19330.18890.18230.19960.2303
MSE7.1 × 10 3 7.0 × 10 3 9.4 × 10 4 8.4 × 10 4 9.5 × 10 4 8.0 × 10 4 3.8 × 10 3 1.3 × 10 2 1.2 × 10 2 1.1 × 10 2 1.4 × 10 2 1.9 × 10 2
Table 9. Values of AWs and CPs for the asymptotic CI, Asym. CI, and credible CIs for informative prior, Cred. CI (IP), and non-informative prior, Cred. CI (NIP).
Table 9. Values of AWs and CPs for the asymptotic CI, Asym. CI, and credible CIs for informative prior, Cred. CI (IP), and non-informative prior, Cred. CI (NIP).
( n , m ) CS θ Asym. CI Cred. CI (IP) Cred. CI (NIP)
AWCP AWCP AWCP
( 30 , 20 ) I γ 0.3620.995 0.1640.969 0.2630.979
σ 1 1.1170.756 0.6720.996 1.3900.952
σ 2 1.3940.784 0.7290.999 1.6890.987
II γ 0.8950.994 0.2020.991 0.2941.000
σ 1 1.3440.794 0.6770.990 1.6320.987
σ 2 1.5660.809 0.7231.000 2.1871.000
III γ 0.3580.995 0.1690.976 0.2670.989
σ 1 1.1550.774 0.6710.991 1.4550.961
σ 2 1.3310.781 0.7150.999 1.6960.987
( 50 , 40 ) I γ 0.1760.994 0.1170.978 0.1670.986
σ 1 0.9710.962 0.6301.000 1.0500.999
σ 2 1.0520.887 0.6551.000 1.1501.000
II γ 0.2710.989 0.1410.978 0.2220.999
σ 1 1.0290.932 0.6281.000 1.1401.000
σ 2 1.1010.880 0.6501.000 1.2251.000
III γ 0.1710.993 0.1170.983 0.1630.985
σ 1 1.0000.970 0.6351.000 1.0511.000
σ 2 1.0630.902 0.6551.000 1.1271.000
( 60 , 50 ) I γ 0.1520.998 0.1070.981 0.1400.989
σ 1 0.8261.000 0.6001.000 1.0011.000
σ 2 0.8440.995 0.6141.000 1.0321.000
II γ 0.2080.998 0.1260.990 0.1860.996
σ 1 0.8531.000 0.5991.000 1.0251.000
σ 2 0.8530.979 0.6101.000 1.0641.000
III γ 0.1491.000 0.1050.982 0.1420.980
σ 1 0.8261.000 0.5971.000 0.9541.000
σ 2 0.8410.992 0.6131.000 0.9951.000
( 80 , 60 ) I γ 0.1360.999 0.0990.980 0.1240.989
σ 1 0.7101.000 0.5531.000 0.8991.000
σ 2 0.8391.000 0.6091.000 0.9441.000
II γ 0.20641.000 0.12720.996 0.1880.998
σ 1 0.7581.000 0.5521.000 0.9391.000
σ 2 0.9011.000 0.6081.000 0.9971.000
III γ 0.1351.000 0.1000.990 0.1270.989
σ 1 0.6981.000 0.5461.000 0.8641.000
σ 2 0.8041.000 0.5921.000 0.9071.000
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Abd El-Raheem, A.E.-R.M.; Hosny, M.; Abu-Moussa, M.H. On Progressive Censored Competing Risks Data: Real Data Application and Simulation Study. Mathematics 2021, 9, 1805. https://doi.org/10.3390/math9151805

AMA Style

Abd El-Raheem AE-RM, Hosny M, Abu-Moussa MH. On Progressive Censored Competing Risks Data: Real Data Application and Simulation Study. Mathematics. 2021; 9(15):1805. https://doi.org/10.3390/math9151805

Chicago/Turabian Style

Abd El-Raheem, Abd El-Raheem M., Mona Hosny, and Mahmoud H. Abu-Moussa. 2021. "On Progressive Censored Competing Risks Data: Real Data Application and Simulation Study" Mathematics 9, no. 15: 1805. https://doi.org/10.3390/math9151805

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop