1. Introduction
In survival analysis and reliability studies, censoring occurs when it is not feasible to collect comprehensive data on the sample. When analyzing lifetime data in such cases, censored samples are used. Analyzing data from various life-testing experiments is receiving more attention. In order to analyze lifetime data, several censoring schemes have been introduced in the literature. Type-I and type-II censoring schemes are the two most widely used applications in reliability analysis. However, during the experiment, none of these censoring schemes permit the removal of experimental units. Progressive Type-I and Type-II censoring schemes permit the removal of experimental units while the experiment is being performed. In the last ten to twelve years, statistical literature studies have focused on progressive censoring schemes due to their flexibility. Type-I censoring establishes an end time for experiments regardless of the number of failures, while Type-II censoring terminates an experiment following a particular number of failures. Type-II censoring is a method that ‘stops’ an experiment once a pre-established number of failures has occurred, regardless of the time that has passed since the failure occurred. There is no way to remove live units from the experiment at any other time than the point where it ends, which is one of the scheme’s defects. As a solution to this drawback, Cohen [
1] introduced progressive censoring schemes. For reliability experiments, progressive censoring has a significant impact on setting up duration experiments. It is common in industrial experiments to immediately terminate experiments and limit the overall number of failures due to different causes (such as when expensive items have to be destroyed when it takes a long time to complete experiments). Progressive censoring techniques cut down on testing times and costs by permitting the removal of survival elements at various stages of the experiment.
In this study, three parameters for IPEP distribution were proposed by Khalifa et al. [
2]. The random variable,
y, has an IPEP distribution, given that its pdf and cdf are as follows:
where
and
are the shape parameters and
is the scale parameter.
The cdf is defined as follows:
whereas the
and
functions for the IPEP distribution, respectively, are obtained by the following:
and,
Khalifa et al. [
2] explained the IPEP model, a more accurate and flexible extension of the exponentiated Pareto distribution for fitting engineering and medical data, and introduced some statistical characteristics.
Furthermore, this dataset, which explores a novel area of application, has been evaluated for weather phenomena (rainfall, floods, droughts, etc.); flood data provided by Dumonceaux and Antle [
3] have been used for application. The data are components of a sequence of inundation layers designed to establish a connection between the observations and forecasts obtained from the river gauge and a graphical depiction of the areas affected by high water levels. The purpose of this paper is to investigate how to select models that represent river floods. Our focus is on methods that use the maximum annual flood series, as well as some features of the most commonly used parametric models in hydrology. Classical goodness-of-fit procedures have limitations, and we propose a simple method based on the “flood rate” in order to screen alternative models.
As a result, the remainder of this work is arranged as follows: In
Section 2, Prog-II censoring is presented. In
Section 3, the literature review is discussed. In
Section 4, the
of
,
and
, and the Fisher information matrix are formulated. In
Section 5, Bootstrap CIs are introduced. In
Section 6, for various loss functions, including SEL and LINEX functions, Bayes estimates for the previously mentioned parameters and reliability functions are additionally obtained. In
Section 7, the M-H algorithm is introduced. In
Section 8, the dataset is studied. In
Section 9, a simulation study is performed. Lastly, the conclusion is provided in
Section 10.
2. Progressive Type-II Censoring
A brief description of a Prog-II censored experiment is as follows. Select
,
m non-negative integers so that
, for
m. Consider a trial where
n identical items are tested. It is supposed that the n units’ lifetime distributions have the same distribution function
and are
random variables. When the first failure occurs, let us say that
surviving items are randomly selected to be eliminated. In the same way, the surviving items are eliminated at the time of the second failure, say
, and so on. Ultimately, all of the remaining items are removed at the time of the
failure, let us say
; see Balakrishnan and Cramer [
4].
As a result, for a Prog-II censoring scheme,
, we observe the following sample:
. The joint pdf for
is as follows:
where
C is a constant independent of the parameters and it is determined by
;
is the censoring scheme, and
and
are the cdf and probability density functions of
, respectively, see
Figure 1.
3. Literature Review
Many studies, such as Mait and Kaya [
5], Meeker and Escobar [
6], and Cai et al. [
7], have explored Prog-II censoring with differed failure time breakdowns. Additionally, Panah and Asadi [
8] and Mousa and Jaheen [
9] have applied Prog-II censoring to estimate parameters from different lifetime distributions. Balakrishnan [
10] investigated the characteristics under progressively censored samples and reported that a collection of several advances in the inferential procedures depend on types-I and -II censored samples, Almetwally et al. [
11] studied the MLE and BE method to determine the parameters of the EGE distribution under progressive censoring. Buzaridah et al. [
12] and Khalifa et al. [
13] studied estimations of the distribution parameters under Prog-II censored data and Chen and Gui [
14] presented statistical inference of the joint Prog-II censored generalized inverted exponential distribution.
This study seeks to fill this need by pursuing three objectives. Estimating parameters: We estimate the parameters, and , of the IPEP using the standard technique. Further, we examine ACI and two CIs based on bootstrap methods, concerning the model parameters. As far as we know, there is currently no study available on the estimation of model parameters or reliability features of the IPEP using Prog-II censoring schemes. Bayesian estimation (BE): We calculate the BEs for the unknown IPEP parameters, together with the corresponding and functions. The Bayesian methodology is utilized for both LFs, considering two commonly used LFs in Bayesian estimation, which are the SEL and the LINEX. To determine the unknown parameters’ BEs, we utilize MCMC methods. Specifically, we apply the Gibbs process inside the M-H approach. We evaluate the effectiveness of the offered approaches by conducting a comprehensive simulation analysis, specifically focusing on their simulated MSE. Another criterion is employed to compare the confidence intervals derived using the asymptotic and . This comparison is based on a distinct criterion. To make a comparison, and are utilized.
4. Inference Procedures
In this part, we will develop the inference processes for the parameters and reliability function of the IPEP distribution using the scheme .
4.1. Maximum Likelihood Estimator
Let us suppose that
n components are tested with corresponding lifetimes that are equally distributed using the cdf from (2) and the pdf from (1). If
are denoted as Prog-II censored samples of size
m, then the likelihood function is provided by using the Prog-II censored data.
the constant
is independent of the parameters, and
is the pdf of
y in (1), while
is the cdf of
in (2).
Consequently, the joint
is as follows:
Following that, the natural logarithm of the likelihood function, without the normalization constant, is as follows:
Using the log-likelihood (8) to construct the nonlinear equations, the
of the parameters
and
are obtained as follows:
and
The estimates should be obtained using a numerical method like Newton–Raphson since (9)–(11) cannot be solved analytically. Ahmed [
15] provides a clear illustration of the algorithm.
4.2. Fisher’s Information Matrix
The normal approximation of the
can help construct the approximate CI and conduct hypothesis testing for the parameters
,
, and
.
, and the corresponding
observed information matrix is given as follows:
Considering that the
of
illustrates asymptotic normality, we may express it as
. As a result, the
approximate
are defined by the following:
where
and
represent the upper
percentiles of the standard normal, respectively.
So, a major diagonal of
is formed by the elements
,
and
. It is also necessary to know the variance of the parameters
,
, and
, to clarify the
of
and
functions. See, Greene [
16] for more information on using the delta method to approximately estimate the variance of
and
. Following this technique, it can determine the variance of
and
, respectively
and
where
and
for
,
, and
are denoted by
and
.
Following that,
and
can have a
two-sided confidence estimate.
and
5. Bootstrap Confidence Intervals
The bootstrap techniques are more likely to give that are more approximative. As a consequence, we present based on bootstrap techniques.
5.1. Boot-p Method
- (1)
Given the initial data , these are found by minimizing Equations (9)–(11).
- (2)
Utilizing the algorithm explained in Balakrishnan and Sandhu [
17], a Prog-II censoring sample
from the IPEP distribution, with the Prog-II censoring scheme
.
- (3)
The bootstrap sample is used to derive the and (in our case, and
- (4)
Steps (2) and (3) occur frequently during N boot times, and the result is , where .
- (5)
Ascending orders are applied to , where , and the results are .
Let
be the cdf of
. For the value of
z,
is determined. For the value of
, the estimated bootstrap-p,
is denoted by the following:
5.2. Boot-t Method
(1)–(3) The parametric Boot-p is the same.
For the variance–covariance matrix , the estimates of the variances and are obtained using the asymptotic variance–covariance matrix.
We calculate the statistic
as follows:
where
denotes the MLEs of the unknown parameters while
denotes the asymptotic variance.
We repeat steps (2)–(5) times and determine bootstrap estimates as .
Assume that
represents the cdf of
for the specified
z.
is explained for the provided
z. Approximately, the bootstrap-p
of
is as follows:
6. Bayesian Estimation
Now, we derive BE under the assumption that the parameters are random. We describe parameter uncertainty by methods of a joint prior distribution that was constructed before the failure data were gathered. In this situation, the Bayesian method will be helpful since it enables us to use prior information when analyzing failure data. In Bayesian analysis, the parameters are updated using data to fit the unknown numbers as random variables. Compared to
and
and
, as well as some unknown parameters, are all estimated using the BE. We assume
,
, and
to be three independent parameters, following the gamma prior distributions, as follows:
where the parameters are assumed to be unknown and the hyperparameters
and
are selected to represent the prior assumption. Additionally, the posterior distribution of the parameters, indicated by
, approximately the same, can be generated by combining the prior with the likelihood function in (7), and applying Bayes’ theorem, which can be expressed as follows:
The joint posterior density function from (15) is used to generate samples using the
approach. Estimating the value of integrals is the major objective of the
technique. Within M-H samplers, we perform the
method using the Gibbs procedure. The joint posterior distribution is given as follows:
For
, and
, the full conditionals are obtained as follows:
and
It should be observed that the integral calculations in (17)–(19) cannot be resolved analytically. Therefore, samples use the
approach, the joint posterior density function in (16). The plots shown in
Figure 2,
Figure 3 and
Figure 4 indicate that, despite the difficulty in directly sampling them using conventional methods, they are comparable to normal distributions.
6.1. Loss Function
In Bayesian analysis, loss function (LF) plays an essential role in reducing the risk connected to the estimator. We consider both symmetric and asymmetric LFs in this analysis. Compared to an asymmetric LF, which provides distinct Bayes estimators as the posterior distribution, a symmetric LF is straightforward and generally used.
6.1.1. Symmetric Bayes Estimation
To obtain the
for estimates, the parameters
,
, and
are as follows:
and
where
6.1.2. A Symmetric Bayes Estimation
The
can be used to derive the BE of
and
, as the following:
where
where
and
where
In order to obtain posterior distribution samples for computing the BE of and of IPEP(, ,), with distribution under Prog-II censored, we suggest using the approach. Additional Metropolis-in-Gibbs samplers and Gibbs sampling are essentially classes of techniques.
7. Metropolis–Hastings Algorithm
A general-purpose
approach is the M-H algorithm, originally presented by Metropolis et al. [
18] and extended by Hastings [
19]. The M-H algorithm can select random samples from the known target distribution, regardless of how complicated it is. We can produce samples from the posterior distribution for unknown parameters to estimate interval approximations and Bayesian point estimators.
Then, the M–H algorithm is employed as follows:
(1) We begin with a first estimate of
(2) At
(3) We utilize the subsequent
method and produce the values
,
, and
from
Using the standard propositional distributions
(i) We produce a proposal from , from and from
(ii) We estimate the probabilities of approval
and
(iii) From a Uniform distribution, we produce , and .
(iv) We implement the proposition and place ; otherwise, we place .
(v) We implement the proposition and place ; otherwise, we place .
(vi) We implement the proposition and place ; otherwise, we place .
(vii) The
and
calculations are as follows:
(4) At
(5) Steps (3)–(4) N times should be replicated.
(6) The initial
M simulated variants are removed after producing the convergence to remove the initial value selection. The sample that was chosen is
= (
,
), where
,
,ḟor a sufficiently sized
N generates an approximate posterior sample that may be utilized to obtain the BE of
where the Markov chain’s burn-in time of (
) is used to compute the
interval of
= (
,
,
,
), the
sample of
=(
, and the
,
) order (
as
).
Then, we construct the 100()% CI of ).
8. Application to Real Data and Simulation Study
To illustrate the practical applications of the provided techniques on estimation and prediction problems, we provide numerical outcomes for the estimation of IPEP model parameters using Prog-II censoring on actual datasets. The analysis involves comparing the performance of BE with MLE by analyzing both simulated and actual data.
Flood-Level Data
Using real datasets provided by Dumonceaux and Antle [
12], the
flood levels represent a real dataset of Susquehanna River’s maximum flood levels at Harrisburg, Pennsylvania, between 1890 and 1969. The data are as follows:
Prog-II samples were generated from the complete dataset, with
and a censoring scheme of
, as presented in
Table 1. Prior to conducting the analysis, it is crucial to evaluate the adequacy of the presented model to represent the data. The K-S distance measures the difference between both the fitted and empirical distribution functions, yielding a K-S value of
and an associated
p-value of
. These findings indicate that the distribution of the IPEP provides a satisfactory fit to the given dataset.
Figure 5 represents the empirical quantile function of IPEP distribution for the flood-level data.
Point estimates for the parameters
,
, and
, along with
and
at time
, were obtained using real data on Prog-II censoring schemes presented in
Table 1. All these point estimates, including
, Boot-p, Boot-t, and BE under
and
, are presented in
Table 2. The
confidence intervals (CIs) for the BE estimators and MLEs are reported in
Table 3.
It is well established that the
approximates the behavior of the
function due to its symmetrical nature for values of
c near to zero.
Figure 6,
Figure 7,
Figure 8,
Figure 9 and
Figure 10 display the
method’s posterior density function plots as well as the trace plots of the unknown parameters
and
and
functions. Furthermore, the MLE for the parameters
as well as the
and
are unique and represent the actual maximums, as shown in
Figure 11.
Furthermore, a comparison of the CIs for MLEs and BEs in
Table 3 demonstrates that Bayes estimators possess narrower CIs compared to their MLEs for all three parameters (
, and
). For the parameters and reliability functions,
Table 3 shows the
ACIs for MLE and CRIs for MCMC (BE).
Figure 11 visualizes the profile’s likelihood, illustrating the uniqueness and similarity of the maximum values with the MLE results. In
Table 2 and
Table 3, it is seen that BEs outperform MLEs in the Prog-II censoring samples. Compared to the approximation CIs, the Bayes CRIs have the shortest confidence lengths. This study may effectively assist in the failure analysis of the airplane’s air conditioning dataset since the distribution of IPED is appropriate to the applicable data.
9. Simulation Study
To produce the censored Prog-II illustration with initial values
,
and
from the IPEP distribution, a comparison of the various techniques used by the estimators of results
and
, at
, has been discussed in calculating their MSE for
,
and
,where
10,000 represents the number of generated samples. Another criterion is used to compare the
CI obtained using the asymptotic
and
, compared using a different criterion. For comparison,
and
are used. The
of an interval of confidence is the percentage of times that the initial significance value is found in the interval. Under the following data created from the IPEP distribution using the quantile function of
y, Monte Carlo experiments were conducted, where
y follows IPEP distribution and is obtained by using
as follows:
The random variable
is given by Equation
, if
U is a uniform variate on the unit interval
.
The subsequent progressive approaches are generated as follows:
I: for
II: for and
: for
Simulation Results
From the following observations, we note the following:
According to
Table 4,
Table 5,
Table 6,
Table 7 and
Table 8, as sample sizes increase,
become smaller, and BEs have the smallest
for the parameters
and
. Therefore, when all variables are considered, BEs outperform
.
The estimates from Bayes for , and are better in that the are smaller.
For smaller with and , the estimates with are greater.
The performance of Scheme I is greater than Schemes and due to the smaller for the failure time intervals of fixed-value samples n and m.
The results from the
are more perfect than those from the
for identified failures, approaches, and sample sizes, as shown in
Table 9.
10. Conclusions
In the field of distribution theory, there is a continuous effort to generalize current distributions. The aim of this work is to develop more reliable and adaptable models that may be used in a variety of censoring contexts. Many different kinds of techniques are being investigated to attain this goal, as indicated by the enormous amount of literature. The reliability and efficiency of the distribution used in fitting the given data have a considerable impact on the subsequent analysis and empirical results. This work focuses on the problem of estimating unknown parameters in the formulation of an IPEP distribution using a Prog-II censoring strategy. Our strategy combines both classical and Bayesian approaches. We calculated approximation CIs and bootstrap CIs for the IPEP distribution’s unknown parameters. Furthermore, we used MCMC with the MH technique to calculate BEs for both LFs, across their related HPD interval estimations. According to the simulation results, BEs with the LINEX loss function exceed all of the traditional estimates. We also determined the best censoring approach for life-testing experiments using three criteria schemes, which is an important consideration for reliability researchers. As an actual data application, we used the flood dataset for all estimations in our research study. Future studies might investigate statistics applied to the IPEP distribution. In future works, we will use Joint Prog-II censored data to estimate the IPEP distribution parameters and compare them to all other censored algorithms that we will use.
Author Contributions
Conceptualization, D.A.R., B.S.E.-D., E.H.K. and H.N.A.; methodology, D.A.R. and E.H.K.; software, D.A.R.; validation, D.A.R., B.S.E.-D., H.N.A. and E.H.K.; formal analysis, D.A.R. and H.N.A.; investigation, D.A.R.; resources, D.A.R., B.S.E.-D. and H.N.A.; data curation, E.H.K.; writing—original draft preparation, D.A.R., B.S.E.-D., H.N.A. and E.H.K.; writing—review and editing, D.A.R., B.S.E.-D., H.N.A. and E.H.K. All authors have read and agreed to the published version of the manuscript.
Funding
This research was funded by Deanship of Scientific Research, Qassim
University.
Data Availability Statement
Data are available in this paper.
Acknowledgments
The researchers would like to thank the Deanship of Scientific Research, Qassim University.
Conflicts of Interest
The authors declare no conflicts of interest.
Abbreviations
IPEP | inverse power exponentiated Pareto |
WGE | Weibull generalized exponential |
Prog-II | progressive type-II |
Y | continuous random variable |
| independent, identically distributed |
cdf | cumulative distribution function |
pdf | probability distribution function |
| reliability function |
| hazard function |
MLE | maximum likelihood estimation |
BE | Bayes estimation |
LFs | symmetric and asymmetric loss functions |
CIs | confidence intervals |
ACI | asymptotic confidence intervals |
M-H | Metropolis–Hastings |
MCMC | Markov chain Monte Carlo |
MSE | mean square error |
CRI | credible interval |
SEL | squared error loss function |
LINEX | linear exponential loss function |
ACL | average confidence interval length |
CP | coverage probability |
| survival unit at time i |
| gradient of
|
| gradient of
|
References
- Cohen, A.C. Progressively censored samples in life testing. Technometrics 1963, 5, 327–329. [Google Scholar] [CrossRef]
- Khalifa, E.H.; Ramadan, D.A.; El-Desouky, B.S. A new three-Parameters Inverse Power Exponentiated Pareto Distribution: Properties and its Applications. J. Fac. Sci. 2022, 36, 2022. [Google Scholar]
- Dumonceaux, R.; Antle, C.E. Discrimination between the log-normal and the Weibull distributions. Technometrics 1973, 15, 923–926. [Google Scholar] [CrossRef]
- Balakrishnan, N.; Cramer, E. The Art of Progressive Censoring; Statistics for Industry and Technology; Birkhäuser: New York, NY, USA, 2014. [Google Scholar]
- Maiti, K.; Kayal, S. Estimation of parameters and reliability characteristics for a generalized Rayleigh distribution under progressive type-II censored sample. Commun. Stat.-Simul. Comput. 2021, 50, 3669–3698. [Google Scholar] [CrossRef]
- Meeker, W.Q.; Escobar, L.A.; Pascual, F.G. Statistical Methods for Reliability Data; John Wiley and Sons: Hoboken, NJ, USA, 2022. [Google Scholar]
- Cai, Y.; Gui, W. Classical and Bayesian inference for a progressive first-failure censored left-truncated normal distribution. Symmetry 2021, 13, 490. [Google Scholar] [CrossRef]
- Panahi, H.; Asadi, S. On adaptive progressive hybrid censored Burr type III distribution: Application to the nano droplet dispersion data. Qual. Technol. Quant. Manag. 2021, 18, 79–201. [Google Scholar] [CrossRef]
- Mousa, M.A.; Jaheen, Z.F. Bayesian prediction for progressively censored data from the Burr model. Stat. Pap. 2002, 43, 587–593. [Google Scholar] [CrossRef]
- Balakrishnan, N. Progressive censoring methodology: An appraisal. Test 2007, 16, 211–259. [Google Scholar] [CrossRef]
- Almetwally, E.M.; Almongy, H.M.; El sayed Mubarak, A. Bayesian and maximum likelihood estimation for the Weibull generalized exponential distribution parameters using progressive censoring schemes. Pak. J. Stat. Oper. Res. 2018, 14, 853–868. [Google Scholar] [CrossRef]
- Buzaridah, M.M.; Ramadan, D.A.; El-Desouky, B.S. Estimation of some lifetime parameters of flexible reduced logarithmic-inverse Lomax distribution under progressive type-II censored data. J. Math. 2022, 2022, 1690458. [Google Scholar] [CrossRef]
- Khalifa, E.; Ahmed, D.; El Desouky, B. Estimation to the Parameters of Truncated Weibull Rayleigh Distribution under Progressive type-II Censoring Scheme with an application to lifetime data. Alfarama J. Basic Appl. Sci. 2022, 3, 315–334. [Google Scholar] [CrossRef]
- Chen, Q.; Gui, W. Statistical inference of the generalized inverted exponential distribution under joint progressively type-II censoring. Entropy 2022, 24, 576. [Google Scholar] [CrossRef] [PubMed]
- Ahmed, E.A. Estimation of some lifetime parameters of generalized Gompertz distribution under progressively type-II censored data. Appl. Math. Model. 2009, 39, 5567–5578. [Google Scholar] [CrossRef]
- Greene, W. Discrete Choice Modeling; Palgrave Macmillan: London, UK, 2009; pp. 473–556. [Google Scholar]
- Balakrishnan, N.; Sandhu, R.A. Best linear unbiased and maximum likelihood estimation for exponential distributions under general progressive type-II censored samples. Sankhyā Indian J. Stat. Ser. B 1996, 58, 1–9. [Google Scholar]
- Metropolis, N.; Rosenbluth, A.W.; Rosenbluth, M.N.; Teller, A.H.; Teller, E. Equation of state calculations by fast computing machines. J. Chem. Phys. 1953, 21, 1087–1092. [Google Scholar] [CrossRef]
- Hastings, W.K. Monte Carlo sampling methods using Markov chains and their applications. Biometrika 1970, 57, 97–109. [Google Scholar] [CrossRef]
Figure 1.
The Prog-II censoring scheme is represented schematically.
Figure 1.
The Prog-II censoring scheme is represented schematically.
Figure 2.
For , we display the conditional posterior density of MCMC.
Figure 2.
For , we display the conditional posterior density of MCMC.
Figure 3.
For , we display the conditional posterior density of MCMC.
Figure 3.
For , we display the conditional posterior density of MCMC.
Figure 4.
For , we display the conditional posterior density of MCMC.
Figure 4.
For , we display the conditional posterior density of MCMC.
Figure 5.
The IPEPD fitted to the real dataset.
Figure 5.
The IPEPD fitted to the real dataset.
Figure 6.
For , we display the posterior density function and trace plots.
Figure 6.
For , we display the posterior density function and trace plots.
Figure 7.
For , we display the posterior density function and trace plots.
Figure 7.
For , we display the posterior density function and trace plots.
Figure 8.
For , we display the posterior density function and trace plots.
Figure 8.
For , we display the posterior density function and trace plots.
Figure 9.
For , we display the posterior density function and trace plots.
Figure 9.
For , we display the posterior density function and trace plots.
Figure 10.
For , we display the posterior density function and trace plots.
Figure 10.
For , we display the posterior density function and trace plots.
Figure 11.
The profile log-likelihood plots for MLE for the parameters and reliability functions.
Figure 11.
The profile log-likelihood plots for MLE for the parameters and reliability functions.
Table 1.
Progressively censored sample based on data of 20 flood levels.
Table 1.
Progressively censored sample based on data of 20 flood levels.
| | | | | |
| 5 | 5 | 0 | 0 | 0 |
| | | | | |
| 0 | 0 | 0 | 0 | 0 |
| | | | | |
| 0 | 0 | 0 | 0 | 0 |
| | | | | |
| 0 | 0 | 0 | 0 | 0 |
Table 2.
and Bayes estimations for real data under and .
Table 2.
and Bayes estimations for real data under and .
Parameters | | Boot-p | Boot-t | | |
---|
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
| | | | | | | |
Table 3.
The of the parameters and reliability functions for real data.
Table 3.
The of the parameters and reliability functions for real data.
Parameters | | |
---|
| | |
| | |
| | |
| | |
| | |
Table 4.
The biased and (in brackets) of the ML and BE for .
Table 4.
The biased and (in brackets) of the ML and BE for .
| | | | |
---|
| | | | | | |
| I |
|
|
|
|
|
| |
|
|
|
|
|
| |
|
|
|
|
|
| I |
|
|
|
|
|
| |
|
|
|
|
|
| |
|
|
|
|
|
| I |
|
|
|
|
|
| |
|
|
|
|
|
| |
|
|
|
|
|
| I |
|
|
|
|
|
| |
|
|
|
|
|
| |
|
|
|
|
|
| I |
|
|
|
|
|
| |
|
|
|
|
|
| |
|
|
|
|
|
Table 5.
The biased and (in brackets) of the ML and BE for .
Table 5.
The biased and (in brackets) of the ML and BE for .
| | | | |
---|
| | | | | | |
| I |
|
|
|
|
|
| |
|
|
|
|
|
| |
|
|
|
|
|
| I |
|
|
|
|
|
| |
|
|
|
|
|
| |
|
|
|
|
|
| I |
|
|
|
|
|
| |
|
|
|
|
|
| |
|
|
|
|
|
| I |
|
|
|
|
|
| |
|
|
|
|
|
| |
|
|
|
|
|
| I |
|
|
|
|
|
| |
|
|
|
|
|
| |
|
|
|
|
|
Table 6.
The biased and (in brackets) of the ML and BE for .
Table 6.
The biased and (in brackets) of the ML and BE for .
| | | | |
---|
| | | | | | |
| I |
|
|
|
|
|
| |
|
|
|
|
|
| |
|
|
|
|
|
| I |
|
|
|
|
|
| |
|
|
|
|
|
| |
|
|
|
|
|
| I |
|
|
|
|
|
| |
|
|
|
|
|
| |
|
|
|
|
|
| I |
|
|
|
|
|
| |
|
|
|
|
|
| |
|
|
|
|
|
| I |
|
|
|
|
|
| |
|
|
|
|
|
| |
|
|
|
|
|
Table 7.
The biased and (in brackets) of the ML and BE for .
Table 7.
The biased and (in brackets) of the ML and BE for .
| | | | |
---|
| | | | | | |
| I |
|
|
|
|
|
| |
|
|
|
|
|
| |
|
|
|
|
|
| I |
|
|
|
|
|
| |
|
|
|
|
|
| |
|
|
|
|
|
| I |
|
|
|
|
|
| |
|
|
|
|
|
| |
|
|
|
|
|
| I |
|
|
|
|
|
| |
|
|
|
|
|
| |
|
|
|
|
|
| I |
|
|
|
|
|
| |
|
|
|
|
|
| |
|
|
|
|
|
Table 8.
The biased and (in brackets) of the ML and BE for .
Table 8.
The biased and (in brackets) of the ML and BE for .
| | | | |
---|
| | | | | | |
| I |
|
|
|
|
|
| |
|
|
|
|
|
| |
|
|
|
|
|
| I |
|
|
|
|
|
| |
|
|
|
|
|
| |
|
|
|
|
|
| I |
|
|
|
|
|
| |
|
|
|
|
|
| |
|
|
|
|
|
| I |
|
|
|
|
|
| |
|
|
|
|
|
| |
|
|
|
|
|
| I |
|
|
|
|
|
| |
|
|
|
|
|
| |
|
|
|
|
|
Table 9.
The parameters and reliability functions that display the ACLs and CPs of 95% CIs.
Table 9.
The parameters and reliability functions that display the ACLs and CPs of 95% CIs.
| | | | | | |
---|
| | | | | | | | | | | |
| I |
|
|
|
|
|
|
|
|
|
|
| |
|
|
|
|
|
|
|
|
|
|
| |
|
|
|
|
|
|
|
|
|
|
| I |
|
|
|
|
|
|
|
|
|
|
| |
|
|
|
|
|
|
|
|
|
|
| |
|
|
|
|
|
|
|
|
|
|
| I |
|
|
|
|
|
|
|
|
|
|
| |
|
|
|
|
|
|
|
|
|
|
| |
|
|
|
|
|
|
|
|
|
|
| I |
|
|
|
|
|
|
|
|
|
|
| |
|
|
|
|
|
|
|
|
|
|
| |
|
|
|
|
|
|
|
|
|
|
| I |
|
|
|
|
|
|
|
|
|
|
| |
|
|
|
|
|
|
|
|
|
|
| |
|
|
|
|
|
|
|
|
|
|
| Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).