Next Article in Journal
A Coupled PDE-ODE Model for Nonlinear Transient Heat Transfer with Convection Heating at the Boundary: Numerical Solution by Implicit Time Discretization and Sequential Decoupling
Next Article in Special Issue
Non-Parametric Hypothesis Testing for Unknown Aged Class of Life Distribution Using Real Medical Data
Previous Article in Journal
Fractional–Order Modeling and Control of COVID-19 with Shedding Effect
Previous Article in Special Issue
Estimations of Modified Lindley Parameters Using Progressive Type-II Censoring with Applications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Comparative Study with Applications for Gompertz Models under Competing Risks and Generalized Hybrid Censoring Schemes

by
Laila A. Al-Essa
1,†,
Ahmed A. Soliman
2,*,†,
Gamal A. Abd-Elmougod
3,† and
Huda M. Alshanbari
1,†
1
Department of Mathematical Science, College of Science, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
2
Department of Mathematics, Faculty of Science, Sohag University, Sohag 82524, Egypt
3
Mathematics Department, Faculty of Science, Damanhour University, Damanhour 22511, Egypt
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Axioms 2023, 12(4), 322; https://doi.org/10.3390/axioms12040322
Submission received: 2 March 2023 / Revised: 19 March 2023 / Accepted: 21 March 2023 / Published: 24 March 2023

Abstract

:
In reliability and survival analysis, the time-to-failure data play an important role in the development of the reliability and life characteristics of the products. In some cases, these kinds of data are modeled using a competing risks model. The problem of conducting comparative life testing under a competing risks model when the units come from different lines of production has recently been addressed. In this paper, we address this problem when the life of the unit is distributed using the Gompertz distribution, noting that the units come from two lines of production and two independent causes of failure are activated. The data are collected under a joint generalized type-II hybrid censoring scheme. Maximum likelihood estimators of the unknown parameters are derived, along with the corresponding asymptotic confidence intervals. We also adopt two bootstrap confidence intervals. Using independent gamma priors, the Bayes estimators relative to squared error loss function are obtained with credible intervals. The properties and quality of estimators are measured by performing a Monte Carlo simulation study. Finally, a real-life data set is analyzed to discuss the applicability of the proposed methods to real phenomena. The optimal plan with respect to comments on the numerical results is discussed in the conclusion.

1. Introduction

There are many situations in life-testing and reliability experiments in which units are lost or removed from the test before failure. The data observed from such experiments are called censored data. To save time and costs, censored data are used. Type-I and Type-II censoring schemes are the two most frequently used censoring schemes. In Type-I censoring, failures are observed until the pre-determined time τ (time censoring), while in Type-II censoring (failure censoring), when the time of r failures is reached, the experiment is terminated, where r is specified before experimenting with n items on the test: 0 < r < n . Various modified censoring schemes such as progressive censoring and multiply censoring are also available and are used to analyze the lifetime data. In different situations, it is more common to provide the optimal test period and the corresponding number of failures needed for statistical inference. A mixture of Type-I and Type-II censoring schemes is known as a hybrid censoring scheme (HCS). This type of scheme has received considerable attention among practitioners. Several HCSs have been introduced in the literature. For example, Childs et al. [1] introduced the generalized Type-I and Type-II HCSs, Kundu and Joarder [2] introduced the progressively Type-II HCSs, and Balakrishnan et al. [3] and Lone and Panahi [4] introduced unified HCSs.
In real-life experiments, a product can fail for a variety of reasons, and these reasons are referred to as competing risks since we can only observe the product failing for one reason but not the others. In reliability and survival analysis, this kind of observations are modeled by a competing risks model. When using the competing risks models, our goal is to assess the risk of a particular cause in relation to other potential causes for failure. This model has been used earlier by different authors; for example, Cox [5] discussed the competing risks model using the exponential populations.
Several properties of a competing risks model have been presented by Crowder [6], Balakrishnan and Han [7], Modhesh and Abd-Elmougod [8], Bakoban and Abd-Elmougod [9], Debnath and Mohiuddine [10] and Alghamdi [11]. Recently, the characteristics of the competing risks model under the accelerated life test model were discussed by many authors; for example, Ganguly and Kundu [12] and Hanaa and Neveen [13]. A joint censoring scheme (JCS) may occur while conducting comparative life tests on products from different lines of production under the same conditions. This type of censoring scheme has been discussed by different authors. For example, Rao et al. [14] developed the rank order theory under JCS, while Johnson and Mehrotra, [15] presented the most locally powerful rank tests under JCS. Mehrotra and Bhattacharyya [16] used JCS to explore the problem of measuring the equality of two exponential distributions. The confidence intervals using JCS regarding the exponential distribution were developed by Mehrotra and Bhattacharyya [17]. Balakrishnan and Rasouli [18] and Rasouli and Balakrishnan [19] developed the exact likelihood inferences for the exponential distributions under JSCs and progressive JSCs. The estimation and prediction of two exponential distributions are discussed in the work of Shafay et al. [20]. Recently, this problem has been handled by Algarni et al. [21], Mondal-Kundu [22], Mondal-Kundu [23], Almarashi et al. [24], Tahani el al. [25] and Abdulaziz et al. [26]. To describe human mortality and provide actuarial tables, the Gompertz distribution was developed. This distribution is widely used as a life time distribution in demography, actuarial, biology, and medical research and plays a vital role in modelling survival times. Many product ’s life times are modelled in reliability and survival studies by an increasing hazard rate or a Gompertz distribution. Assuming skewness and kurtosis of this distribution are fixed constants and independent of the distribution parameters, the Gompertz distribution has been used to obtain age-specific fertility rates. Comparative life tests are adopted for products deriving from different lines of production under the same conditions in the presence of the competing risks model. The problem of inference of unknown quantities in the population is formulated using the population characteristics and censoring methodologies. Here, we discuss these problems when the failure time of population units has a Gompertz lifetime distribution with a CDF given by
F ( t ) = 1 exp θ β ( exp ( β t ) 1 ) , t > 0 , θ , β > 0 .
The Gompertz distribution has density function that is in zero mode when 0 < β θ and hence monotonically decreases at ( 0 , ) . However, if β > θ , then take the mode t m o d = ( 1 β ) log ( β θ ) ; hence, it increases in ( 0 , t m o d ) and decreases in ( t m o d , ) . For more details, see Soliman et al. [27,28]. The statistical inference of Gompertz distribution for independent competing risks model was developed by Lodhi et al. [29] and for dependent competing risks model was developed by Wang et al. [30]. Gompertz distribution reduces to exponential distribution when β 0 . As far as we know, no works were observed under joint Type-II GHCS in the case of Gompertz distribution. In this paper, we adopted the joint Type-II GHCS in comparative Gompertz populations in the presence of a competing risks model. We used different methods of estimation: the ML, bootstrap and Bayes methods. The model parameters and reliability of the system were estimated using point and interval estimates. Different tolls such as MSE and coverage percentage were used to assess and compare the results through Monte Carlo simulation studys. Finally, we analysed a real data set to demonstrate our goals.
The rest of the article is organized as follows: A description of a generalized hybrid censoring scheme is presented in Section 2. The model and its assumptions are formulated in Section 3. In Section 4, using joint Type-II GHC competing risks data, we discuss the maximum likelihood estimation MLE of the parameters, as well as the reliability and failure rate functions. Based on the asymptotic normality of the MLEs, the approximate confidence intervals were obtained in the same section. Two bootstrap confidence intervals (based on bootstrap-p and bootstrap-t methods) are discussed in Section 5. The Bayes estimations under squared error loss function and gamma priors are obtained in Section 6. An assessment and comparison of the results, using a Monte Carlo simulation study, are reported in Section 7. Section 8 deals with a real-life data set for illustration purposes. Finally, conclusions and concluding remarks are discussed in Section 9.

2. Generalized Hybrid Censoring Scheme

For HCS, suppose that ( τ , m) are the ideal test time and the corresponding number of failures. Hence, in Type-I HCS the test is terminated at min( τ , T m ), where T m is the failure time of m-th failure. The test is terminated at max( τ , T m ) in Type-II HCS. For an extensive review of HCSs, see Childs et al. [1], Gupta and Kundu [31], Zhang et al. [32], Kundu and Pradhan [33] and Algarn et al. [34]. The problems of the low expected number of failures and long test time are still present in Type-I and Type-II HCSs. To solve these problems, Chanrasekar et al. [35] established the generalized hybrid censoring scheme (GHCS), which can be described as follows:
Type-I GHCS: Consider a life testing experiment with n units, two fixed positive integers ( m 1 , m 2 ) and the ideal test time τ that was previously proposed, such that 1 < m 1 < m 2 n . When the test is running, the failure time T i , i 1 is recorded until the failure T m 1 is observed. Hence, if T m 1 < τ , then the test is terminated at ω , where ω   = min( T m 2 , τ ). If T m 1 > τ , the test is terminated at ω = T m 1 . Therefore, the data under Type-I GHCS are t ̲ = ( t 1 , t 2 , , t k ) , where the number of failed units k and the corresponding test termination time ω are defined by k , ω = m 1 , T m 1 if T m 1 τ , k , ω = m 2 , T m 2 , if T m 1 < T m 2 τ , k , ω = m 1 k m 2 , τ , if T m 1 < τ < T m 2 . For more details, see Chakrabarty et al. [36].
Type-II GHCS: Assume that n units are involved in the experiment. The two times ( τ 1 , τ 2 ) , 0 < τ 1 < τ 2 and the integer number m have been proposed previously. When the test is running the failure time T i , i 1 is recorded until the time τ 1 is observed. If T m < τ 1 , then the test is terminated at ω = τ 1 . However, if τ 1 < T m < τ 2 , the test is terminated at ω = T m and if τ 1 < τ 2 < T m , the test is terminated at ω = τ 2 . Therefore, the data under Type-II GHCS: t ̲ = { t 1 , t 2 , , t k } , where k is the number of failed units. The integer number k and the corresponding test terminated time ω are defined by k , ω = k > m , τ 1 , if T m < τ 1 ,   k , ω = m , T m if τ 1 < T m < τ 2 and k , ω = k < m , τ 2 , if τ 1 < τ 2 < T m . In this paper, we adopted Type-II GHCS, which guarantees to terminate the experiment at a pre-fixed time τ 2 > τ 1 , with τ 1 and τ 2 as the shortest and longest test times, respectively. The time τ 2 is the absolute longest time for which the experiment is allowed to continue, which is suitable for many applications. Hence, experiments using Type-II GHCS are guaranteed to be completed by time τ 2 , which is the suitable time for which the researcher is willing to continue the experiment. The possibility of removing units from the test, other than the last point, is not available in two GHCS schemes (Type-I and Type-II). However, the possibility of removing survival units from the test is available in generalized progressive censoring schemes (GPCSs); see Balakrishnan [37], Balakrishnan and Cramer [38] and Elsherpieny et al. [39].

3. Modeling

Suppose that, from a population consisting of two lines Ω 1 and Ω 2 , the joint random sample of size N = n 1 + n 2 is randomly selected as ( n 1 from Ω 1 and n 2 from Ω 2 ). We considered only two potential causes of failure, and we adopted Type-II GHCS with two times ( τ 1 , τ 2 ) , 0 < τ 1 < τ 2 and the integer number m . During the experiment, the failure time T i , unit type η i = {1, 0} (where 1 means the unit from the line Ω 1 and 0 the unit from the line Ω 2 ) and the cause of failure ρ i = {1, 2} (failure under causes one or two) were recorded. When the first failure was observed, we recorded ( t 1 , η 1 , ρ 1 ); when the second failure was observed, ( t 2 , η 2 , ρ 2 ) was recorded. Under Type-II GHCS, the number of failure units and the corresponding test termination time were denoted by (k, ω ), respectively. The experiment was continued until the time τ 1 . If, T m < τ 1 then the test was terminated at ω = τ 1 . However, if τ 1 < T m < τ 2 , the test was terminated at ω = T m and if τ 1 < τ 2 < T m , the test was terminated at ω = τ 2 . Therefore, the observed joint Type-II GHC competing risks data were defined by: t = { ( t 1 , η 1 , ρ 1 ) , ( t 2 , η 2 ,   ρ 2 ) , , ( t k , η k , ρ k ) } , where k , ω = k > m , τ 1 , if T m < τ 1 , k , ω = m , T m if τ 1 < T m < τ 2 and k , ω =   k < m , τ 2 , if τ 1 < τ 2 < T m . The proposed model under joint Type-II GHC competing risks data t included the following assumptions
  • The number of failures taken from line Ω 1 is given by k 1 = i = 1 k η i and those from line Ω 2 are given by k 2 = i = 1 k ( 1 η i ) .
  • The number of failures taken from line Ω 1 under cause j is given by m 1 j = i = 1 k η i δ ( ρ = j ) and those from line Ω 2 are given by m 2 j = i = 1 k ( 1 η i ) δ ( ρ = j ) .
  • The latent failure time T i is defined by T i = min ( T i s 1 , T i s 2 ), and s is used to define the unit type, i = 1 , 2 , , k .
  • The i-th failure time T i s j of the line Ω s and cause j , i = 1 , 2 , , k has the Gompertz lifetime distribution with CDF given by
    F s j ( t ) = 1 exp θ s j β s ( exp ( β s t ) 1 ) , t > 0 , θ s j , β s > 0 , s , j = 1 , 2 .
  • The latent failure time T i = min ( T i s 1 , T i s 2 ) has a Gompertz lifetime distribution with a CDF given by
    F ( t ) = 1 exp ( θ s 1 + θ s 2 ) β s ( exp ( β s t ) 1 ) , t > 0 , θ s j , β s > 0 .
  • The integer number of failure m s j is obtained from the line Ω s under j; s , j = 1 , 2 have the binomial distribution B k s , θ s j θ s 1 + θ s 2 .
  • The likelihood function of the joint Type-II GHC competing risks data t ̲ = { ( t 1 , η 1 , ρ 1 ) , ( t 2 , η 2 , ρ 2 ) , , ( t k , η k , ρ k ) } , see Abdulaziz et al. [26] is given by
    L ( t ̲ | Θ ) i = 1 k f 11 ( t i ) S 12 ( t i ) δ ( ρ i = 1 ) f 12 ( t i ) S 11 ( t i ) δ ( ρ i = 2 ) η i × f 21 ( t i ) S 22 ( t i ) δ ( ρ i = 1 ) f 22 ( t i ) S 21 ( t i ) δ ( ρ i = 2 ) 1 η i × [ S 11 ( ω ) S 12 ( ω ) ] n 1 k 1 [ S 21 ( ω ) S 22 ( ω ) ] n 2 k 2 ,
    where f s j ( . ) and S s j ( . ) are the density and reliability functions of type s and cause j, where s, j = 1, 2 and δ ( ρ i = j ) are defined by
    δ ( ρ = j ) = 1 , ρ = j 0 , ρ j , j = 1 , 2 ,

4. Maximum Likelihood Estimation

The likelihood function (4), under joint Type-II GHC competing risks data t ̲ = { ( t 1 , η 1 , ρ 1 ) ,   ( t 2 , η 2 , ρ 2 ) , , ( t k , η k , ρ k ) } of Gompertz distribution (2) is reduced to
L ( Θ | t ̲ ) θ 11 m 11 θ 12 m 12 θ 21 m 21 θ 22 m 22 exp β 1 i = 1 k η i t i + β 2 i = 1 k ( 1 η i ) t i θ 11 + θ 12 β 1 i = 1 k η i exp ( β 1 t i ) θ 21 + θ 22 β 2 i = 1 k ( 1 η i ) exp ( β 2 t i ) ( n 1 k 1 ) θ 11 + θ 12 β 1 exp ( β 1 ω ) ( n 2 k 2 ) θ 21 + θ 22 β 2 exp ( β 2 ω ) + n 1 θ 11 + θ 12 β 1 + n 2 θ 21 + θ 22 β 2 ,
where Θ is the model parameter vector, Θ = { θ 11 , θ 12 , θ 21 , θ 22 , β 1 , β 2 } . The natural logarithms of the function (6) are given by
( Θ | t ̲ ) m 11 log θ 11 + m 12 log θ 12 + m 21 log θ 21 + m 22 log θ 22 + β 1 i = 1 k η i t i + β 2 i = 1 k ( 1 η i ) t i θ 11 + θ 12 β 1 i = 1 k η i exp ( β 1 t i ) θ 21 + θ 22 β 2 i = 1 k ( 1 η i ) exp ( β 2 t i ) ( n 1 k 1 ) θ 11 + θ 12 β 1 exp ( β 1 ω ) ( n 2 k 2 ) θ 21 + θ 22 β 2 exp ( β 2 ω ) + n 1 θ 11 + θ 12 β 1 + n 2 θ 21 + θ 22 β 2 .

4.1. Point Estimations

The MLE depends on the form of the likelihood equations, which can be obtained from the log-likelihood function (7) after taking the partial derivatives with respect to the parameters and equating these to zero. The first partial derivatives of (7) with respected to θ s j , s , j = 1 , 2 are given by
( Θ | t ̲ ) θ 1 j = m 1 j θ 1 j 1 β 1 i = 1 k η i exp ( β 1 t i ) n 1 k 1 β 1 exp ( β 1 ω ) + n 1 β 1 = 0 ,
and
( Θ | t ̲ ) θ 2 j = m 2 j θ 2 j 1 β 2 i = 1 k ( 1 η i ) exp ( β 2 t i ) n 2 k 2 β 2 exp ( β 2 ω ) + n 2 β 2 = 0 .
Hence, the MLEs of the parameters θ s j given β s are given by
θ ^ s j β 1 = m s j β s D s , s , j = 1 , 2
where
D 1 = i = 1 k η i exp ( β 1 t i ) + n 1 k 1 exp ( β 1 ω ) n 1 ,
and
D 2 = i = 1 k ( 1 η i ) exp ( β 2 t i ) + n 2 k 2 exp ( β 2 ω ) n 2 .
The likelihood equations with respected to β s , s = 1 , 2 are given by
( Θ | t ̲ ) β 1 = θ 11 + θ 12 β 1 2 i = 1 k η i ( 1 β 1 t i ) exp ( β 1 t i ) + ( n 1 k 1 ) ( 1 β 1 w ) exp ( β 1 ω ) n 1 + i = 1 k η i t i = 0
and
( Θ | t ̲ ) β 2 = θ 21 + θ 22 β 2 2 i = 1 k ( 1 η i ) ( 1 β 2 t i ) exp ( β 2 t i ) + ( n 2 k 2 ) ( 1 β 2 w ) exp ( β 2 ω ) n 2 + i = 1 k ( 1 η i ) t i = 0 ,
The likelihood Equations (13) and (14) have shown that the ML estimators of the model parameters β s , s = 1 , 2 are reduced to two non-linear equations, which require an iteration method to solve.
Theorem 1.
For a given m s k > 0 , s , k = 1 , 2 , the conditional ML estimators of parameters β s are presented by
β s i + 1 = h ( β s i ) ,
where
h ( β s i ) = m 11 + m 12 D 1 i = 1 k η i t i i = 1 k η i ( β 1 t i 1 ) exp ( β 1 t i ) + n 1 ( β 1 ω 1 ) exp ( β 1 ω ) + n 1 , s = 1 m 21 + m 22 D 2 i = 1 k ( 1 η i ) t i i = 1 k ( 1 η i ) ( β 1 t i 1 ) exp ( β 1 t i ) + n 1 ( β 1 ω 1 ) exp ( β 1 ω ) + n 2 , s = 2
Proof. 
From the iteration relation in (15) and fixed point method, the iteration is stopped after | β s i + 1 β s i | is sufficiently small. For fixed point theorem and its applications one can refer to Abdul Mannan et al. [40]. By substituting from (10) into (13) and (14). Using the properties of the operator-function in (16), we can immediately obtain the proof.    □
Remark 1.
The iteration procedure needs a suitable initial value, which can be obtained using the profile likelihood function given by
g ( β 1 , β 2 | t ̲ ) = m 11 log m 11 β 1 D 1 + m 12 log m 12 β 1 D 1 + m 21 log m 21 β 2 D 2 + m 22 log m 22 β 2 D 2 + β 1 i = 1 k η i t i + β 2 i = 1 k ( 1 η i ) t i m 11 + m 12 + m 21 + m 22 .
The ML estimate of parameters θ s j can be obtained from (10) by substituting the values of β s by β ^ s . Using the invariance property of MLEs, the ML estimators of reliability function and the corresponding failure rate function can be obtained from
S ^ s j ( t ) = exp θ ^ s j β ^ s ( exp ( β ^ s t ) 1 ) ,
and
h ^ s j ( t ) = θ ^ s j exp ( β ^ s t ) ,
in which we replace θ s j and β s with their MLEs
Remark 2.
It should be noted that it is more difficult to formulate the exact distributions of θ ^ 1 j and θ ^ 2 j , which are specified as a combination of discrete and continuous distributions; see Kundu and Joarder [2]. The estimators of the parameters, reliability and failure rate functions are formulated with respect to the value of integers m s j . Therefore, when using the value of m 1 j = ( 0 or k 1 ), and m 2 j = ( 0 or k 2 ), the estimates θ ^ 1 j and θ ^ 2 j , respectively, are not exist.

4.2. Interval Estimate

In many cases, providing an interval of values that may contain the parameter’s true value with some degree of certainty is preferable to only reporting a point estimate of the unknown parameter. As the exact distributions of the MLEs are difficult to determine, in this subsection, we investigate the asymptotic confidence intervals of ACIs based on the asymptotic normality of MLEs. The definition of the Fisher information matrix in the literature provides the negative expectation of the second partial derivatives of the log-likelihood function. The asymptotic confidence intervals are formulated with respect to the Fisher information matrix of the model parameters. However, in different cases, the problem of obtaining the expectation of second partial derivatives is more serious, especially in models with high-dimensional cases. Therefore, the observed information matrix was adopted as the natural alternative to the Fisher information matrix. The observed information matrix of the model parameters Θ = { θ 11 , θ 12 , θ 21 , θ 22 , β 1 , β 2 } is defined by the formula
i ( Θ | t ̲ ) 2 ( Θ | t ̲ ) Θ i Θ l , i , l = 1 , 2 , , 6 ,
where the second derivatives are given by
2 ( Θ | t ̲ ) β 1 2 = θ 11 + θ 12 β 1 3 i = 1 k η i β 1 t i 2 + 2 β 1 t i 2 exp ( β 1 t i ) + ( n 1 k 1 ) β 1 w 2 + 2 β 1 w 2 exp ( β 1 w ) n 1 ,
2 ( Θ | t ̲ ) β 2 2 = θ 21 + θ 22 β 2 3 i = 1 k ( 1 η i ) β 2 t i 2 + 2 β 2 t i 2 exp ( β 2 t i ) + ( n 2 k 2 ) β 2 w 2 + 2 β 2 w 2 exp ( β 2 w ) n 2 ,
2 ( Θ | t ̲ ) θ s j 2 = m s j θ s j 2 s , j = 1 , 2 ,
2 ( Θ | t ̲ ) θ s j θ i l = 0 , For each s j i l ,
2 ( Θ | t ̲ ) β 1 θ 1 j = 2 ( Θ | t ̲ ) θ 1 j β 1 = 1 β 1 2 i = 1 k η i ( 1 β 1 t i ) exp ( β 1 t i ) + n 1 k 1 ( 1 β 1 ω ) exp ( β 1 ω ) n 1 β 1 2 , j = 1 , 2 ,
2 ( Θ | t ̲ ) β 2 θ 2 j = 2 ( Θ | t ̲ ) θ 2 j β 2 = 1 β 2 2 i = 1 k ( 1 η i ) ( 1 β 2 t i ) exp ( β 2 t i ) + n 2 β 2 2 ( 1 β 2 ω ) exp ( β 2 ω ) n 2 β 2 2 , j = 1 , 2 ,
and
2 ( Θ | t ̲ ) β 1 θ 2 j = 2 ( Θ | t ̲ ) β 2 θ 1 j = 2 ( Θ | t ̲ ) θ 2 j β 1 = 2 ( Θ | t ̲ ) θ 1 j β 2 = 2 ( Θ | t ̲ ) β 1 β 2 = 2 ( Θ | t ̲ ) β 2 β 1 = 0 .
The observed information matrix at the estimate value of model parameters Θ ^ = { θ ^ 11 , θ ^ 12 , θ ^ 21 , θ ^ 22 , β ^ 1 , β ^ 2 } is denoted by i 0 ( Θ | t ̲ )
i 0 ( Θ | t ̲ ) = 2 ( Θ | t ̲ ) Θ i Θ l Θ ^ = { θ ^ 11 , θ ^ 12 , θ ^ 21 , θ ^ 22 , β ^ 1 , β ^ 2 } , i , l = 1 , 2 , , 6 ,
For the model parameter Θ = { θ 11 , θ 12 , θ 21 , θ 22 ,   β 1 ,   β 2 } , , the approximate distribution of MLE Θ ^ is such that ( Θ ^ Θ ) has a normal N ( Θ , i 0 ( Θ | t ̲ ) distribution, where ( i 0 1 ( Θ | t ̲ ) denotes the inverse of the observed Fisher information matrix. The approximate ( 1 2 α )% confidence intervals of the model parameters are given by
θ 11 z α e 11 , θ 12 z α e 23 θ 21 z α e 33 , θ 22 z α e 44 β 1 z α e 55 , β 2 z α e 66 ,
where e i i , i = 1 , , 6 are non-zero values of the elements of diagonal of i 0 1 ( Θ | t ̲ ) and the value of z α is a standard normal value computed under the significance level α .
Equation (29) has shown that the lower bound of interval estimate can be of a negative value. Hence, the asymptotic distribution of log Θ i , i = 1 , 2 , , 6 can be described by the delta method of the logarithmic transformation; see [41,42].
The pivotal Z = log Θ i log Θ ^ i Var ( log Θ ^ i ) has normal properties, with mean 0 and variance 1. Therefore, 100 ( 1 2 α ) % approximate interval estimators of Θ = { θ 11 , θ 12 , θ 21 , θ 22 , β 1 , β 2 } can be defined by
Θ ^ i exp γ α Var ( log Θ ^ i ) , Θ ^ i exp γ α Var ( log Θ ^ i ) ,
where Var( log Θ ^ i ) = Var ( Θ ^ i ) Θ ^ i and i = 1 , 2 , , 6; for more details, see Shih and Emura [43].

5. Bootstrap Confidence Intervals

The bootstrap method is a resampling technique for statistical inference that can be used to construct confidence intervals (CIs) for the model parameters. In the literature, the bootstrap technique is frequently used to gauge an estimator’s bias and variance. This technique is widely used in calibrate hypothesis tests. There are two types of bootstrap techniques, parametric and nonparametric techniques; see Davison and Hinkley [44] and Efron and Tibshirani [45]. In the parametric bootstrap technique, the percentile bootstrap-p and bootstrap-t techniques are applied; see Efron [46] and Hall [47]. In this section, we adopted the percentile bootstrap-p and bootstrap-t techniques to formulate the confidence intervals of the model parameters, which can be implemented with the following algorithm (Algorithm 1).
Algorithm 1 Percentile bootstrap-p and bootstrap-t confidence interval.
Step 1:
For given the original joint competing risks Type-II GHC data t ̲ = { ( t 1 , η 1 , ρ 1 ) , ( t 2 , η 2 , ρ 2 ) , , ( t k , η k , ρ k ) } , compute the ML estimates of the model parameters Θ ^ = { θ ^ 11 , θ ^ 12 , θ ^ 21 , θ ^ 22 , β ^ 1 , β ^ 2 } .
Step 2:
Generate two samples of size n 1 from Gompertz( β ^ 1 , θ ^ 11 + θ ^ 12 ) and sample of size n 2 from Gompertz( β ^ 2 ,   θ ^ 21 + θ ^ 22 ).
Step 3:
For a given ( τ 1 , τ 2 ) and m , generate the joint Type-II GHC competing risks data defined by t ̲ * = { ( t 1 * , η 1 , ρ 1 ) , ( t 2 * , η 2 , ρ 2 ) , , ( t k * , η k , ρ k ) } .
Step 4:
Using the bootstrap sample t ̲ * , compute the integers k , k 1 , k 2 and determine the termination time ω .
Step 5:
The numbers of failure m s j (obtained from the line Ω s under the obtained j , where s , j = 1 , 2) are generated from the binomial distribution with parameters k s and θ s j θ s 1 + θ s 2 .
Step 6:
The bootstrap estimates Θ ^ * = { θ ^ 11 * , θ ^ 12 * , θ ^ 21 * , θ ^ 22 * , β ^ 1 * , β ^ 2 * } are computed using (10) and (15).
Step 7:
Repeat Steps (2–6) N times.
Step 8:
The resulting bootstrap estimates are arranged in ascending order, ( Θ ^ i * ( 1 ) ,   Θ ^ i * ( 2 ) , , Θ ^ i * ( N ) ) , i = 1 , 2 , , 6 .
Percentile bootstrap confidence interval (PBCI)
Let ϝ ( z ) = P ( Θ ^ i * z ) , i = 1 , 2 , , 6 be the empirical cumulative distribution function of Θ ^ i * ; then, the point bootstrap estimate of Θ i is given by
Θ ^ i ( boot ) = 1 N i = 1 N Θ ^ i * ( i ) .
The corresponding 100 ( 1 2 α ) % PBCIs are given by
( Θ ^ i * ( N α ) , Θ ^ i * ( N ( 1 α ) ) ,
where Θ ^ i * = ϝ 1 ( z ) .
Bootstrap-t confidence interval (BTCI)
From the ascending order sample ( Θ ^ i * ( 1 ) , Θ ^ i * ( 2 ) , , Θ ^ i * ( N ) ) , i = 1 , 2 , , 6, we built the order statistics values Δ i * ( 1 ) < Δ i * ( 2 ) < < Δ i * ( N ) , where
Δ i * [ l ] = Θ ^ i * ( i ) Θ ^ i var Θ ^ i * ( i ) , l = 1 , 2 , , N , i = 1 , 2 , 3 , 4 , 5 , 6 .
Hence, 100 ( 1 2 α ) % BTCIs are given by
Δ ˜ i boot-t ( α ) * , Δ ˜ i boot-t ( 1 α ) * ,
where Δ ˜ l boot-t * is given by
Δ ˜ i boot-t * = Δ ^ i * + Var ( Δ ^ i * ) ϝ 1 ( z ) ,
and ϝ 1 ( z ) = P ( Δ ^ i * z ) is the cumulative distribution function of Δ ^ i * .

6. Bayesian Approach

In this section, to obtain the joint Type-II GHC competing risks data t ̲ = { ( t 1 , η 1 , ρ 1 ) , ( t 2 , η 2 , ρ 2 ) , , ( t k , η k , ρ k ) } , we consider the problem of the Bayesian estimation of model parameters. We assume that the prior distributions for the unknown parameters are independent gamma priors. Therefore, the prior information formulated for the parameter vector Θ = { θ 11 , θ 12 , θ 21 ,   θ 22 , β 1 , β 2 } as
Θ i Θ i a i 1 exp ( b i Θ i ) , Θ i > 0 , a i , b i > 0 , i = 1 , 2 , 3 , 4 , 5 , 6 .
Hence, the joint prior density function of the model parameters is given by
Π * ( Θ ) = i = 1 6 b i a i Γ ( a i ) Θ i a i 1 exp ( b i Θ i ) .
The joint posterior density function of the model parameters is given by
Π ( Θ | t ̲ ) = Π * ( Θ ) × L ( Θ | t ̲ ) Θ Π * ( Θ ) × L ( Θ | t ̲ ) × d Θ Π * ( Θ ) × L ( Θ | t ̲ ) .
Inserting (6) and (37) in (38) and ignoring the additive constant, the joint posterior density can be expressed as
Π ( Θ | t ̲ ) θ 11 m 11 + a 1 1 θ 12 m 12 + a 2 1 θ 21 m 21 + a 3 1 θ 22 m 22 + a 4 1 β 1 a 5 1 β 2 a 6 1 exp β 1 i = 1 k η i t i + β 2 i = 1 k ( 1 η i ) t i θ 11 + θ 12 β 1 i = 1 k η i exp ( β 1 t i ) θ 21 + θ 22 β 2 i = 1 k ( 1 η i ) exp ( β 2 t i ) ( n 1 k 1 ) θ 11 + θ 12 β 1 exp ( β 1 ω ) ( n 2 k 2 ) θ 21 + θ 22 β 2 exp ( β 2 ω ) + n 1 θ 11 + θ 12 β 1 + n 2 θ 21 + θ 22 β 2 b 1 θ 11 b 2 θ 12 b 3 θ 21 b 4 θ 22 b 5 β 1 b 6 β 2 .
Under the squared error loss (SEL) function, the Bayes estimate of the parameter is the posterior mean. Then, the Bayes estimate of the parameters or any function of the parameters, such as reliability or failure rate functions, say Ψ ( Θ ), is given by
Ψ ^ B ( Θ ) = Θ Ψ ( Θ ) Π ( Θ | t ̲ ) d Θ .
Equation (40) shows that the Bayes estimate of Ψ ( Θ ) needs to compute a high-dimensional integral. Appropriate numerical methods could be used to approximate Bayesian estimation.
One of the most common methods applied in this paper is the Markov Chain Monte Carlo method (MCMC method). Compared with traditional methods, the MCMC method is more flexible and provides an alternative approach to parameter estimation. The key to the MCMC technique is obtaining posterior distribution in the empirical form and generating MCMC samples from the posterior distribution, and then computing Bayes estimators and constructing the associated credible intervals. Therefore, we describe this technique as follows.
From Equation (39), the posterior full conditional density functions of the parameters and data can be obtained as
Π j ( θ 1 j | Θ θ 1 j , t ̲ ) θ 1 j m 1 j + a j 1 exp b j θ 1 j θ 1 j β 1 i = 1 k η i exp ( β 1 t i ) ( n 1 k 1 ) θ 1 j β 1 exp ( β 1 ω ) + n 1 θ 1 j β 1 ,
Π j + 2 ( θ 2 j | Θ θ 2 j , t ̲ ) θ 2 j m 1 j + a j + 2 1 exp b j + 2 θ 2 j θ 2 j β 2 i = 1 k ( 1 η i ) exp ( β 2 t i ) ( n 2 k 2 ) θ 2 j β 2 exp ( β 2 ω ) + n 2 θ 2 j β 2 ,
Π 5 ( β 1 | Θ β 1 , t ̲ ) β 1 a 5 1 exp β 1 i = 1 k η i t i θ 11 + θ 12 β 1 i = 1 k η i exp ( β 1 t i ) ( n 1 k 1 ) θ 11 + θ 12 β 1 exp ( β 1 ω ) b 5 β 1 + n 1 θ 11 + θ 12 β 1 ,
and
Π 6 ( β 2 | Θ β 2 , t ̲ ) β 2 a 6 1 exp β 2 i = 1 k ( 1 η i ) t i θ 21 + θ 22 β 2 i = 1 k ( 1 η i ) exp ( β 2 t i ) n 2 θ 21 + θ 22 β 2 exp ( β 2 ω ) b 6 β 2 + n 2 θ 21 + θ 22 β 2 ,
where j = 1 , 2 and, for example, ( θ 11 | Θ θ 11 , t ̲ ) mean ( θ 11 | θ 12 , θ 21 , θ 22 , β 1 , β 2 , t ̲ ) . The full conditional posterior distributions show that the posterior distribution is reduced to four gamma distributions, for which any conventional methods of generating random numbers can be used. And two general unknown functions make it impossible to generate random samples directly from the conditional posterior distributions. Therefore, to generate random samples from the two unknown distributions, the Metropolis–Hastings (M–H) algorithm with normal proposal distribution can be used; see [48]. The following steps describe the algorithm used to generate from the posterior distribution (Algorithm 2).
Algorithm 2 Gibbs with M-H sampler algorithms.
Step 1:
Begin with the indicated number J = 1 and the initial parameter values Θ ( 0 ) = { θ ^ 11 , θ ^ 12 , θ ^ 21 , θ ^ 22 , β ^ 1 , β ^ 2 } .
Step 2:
The values θ 1 j ( J ) and θ 2 j ( J ) are generated from gamma distributions given by (40) and (41), respectively, j =  1, 2.
Step 3:
The values β j ( J ) generated under M–H algorithms with a normal proposal distribution with a mean β j ( J 1 ) and variance e j + 4 j + 4 , obtained from an approximate information matrix, j =  1, 2, as follows
(I)
For the index j = 1 , 2 , begin with starting points β j ( J 1 ) , where β j ( 0 ) = β ^ j .
(II)
Generate a candidate sample points β j ( * ) , from N( β j ( J 1 ) , e j + 4 j + 4 ), as proposal distributions.
(III)
Compute the probability (the acceptance probability) from (43) and (44)
P j β j ( J 1 ) , β j ( * ) = min 1 , Π j + 4 ( β j ( * ) | Θ 1 , t ̲ ) Π j + 4 ( β j ( J 1 ) | Θ 1 , t ̲ ) .
(IV)
Generate U j from uniform (0, 1).
(V)
If U j P j β j ( J 1 ) , β j ( * ) , we accept the candidate sample points β j ( * ) as β j ( J ) . Otherwise, the values β j ( * ) are rejected and β j ( J ) = β j ( J 1 ) is set.
Step 4:
Put J = J + 1
Step 5:
Repeat steps (2–4) N times.
Step 6:
Put the generated parameter vector Θ i ( J ) in ascending order; for example, Θ i [ J ] , i = 1 , 2 , , 6 .

6.1. MCMC Bayesian Point Estimations

The initial simulated variants of the algorithm are often discarded at the start of the analysis (burn-in time) to eliminate the bias caused by the initially selected value. Suppose that the number of iterations needed to reach the stationary distribution is N * (burn-in). In all computations, we take the number N * = 1000 iteration. Hence, the Bayes point estimator when using the MCMC method is given by
Ψ ^ B ( Θ ) = E Π ( Ψ ( Θ ) | t ̲ ) = 1 N N * l = N * + 1 N Ψ Θ i ( l ) , i = 1 , 2 , , 6 .
The corresponding variance in the Bayes estimate is given by
V ^ ( Ψ ( Θ ) | t ̲ ) = 1 N N * l = N * + 1 N Ψ Θ i ( l ) Ψ ^ B ( Θ ) 2 .

6.2. MCMC Bayesian Interval Estimations

To establish the two-sided credible intervals of Ψ ( Θ ) ; sort Ψ Θ i ( l ) , i = 1 , 2 , 3 , 4 , 5 , 6 ; j = N * + 1 , N * + 2 , , N . in ascending order. Hence, 100 ( 1 2 α ) % credible intervals of Ψ ( Θ ) can be constructed as:
Ψ ( Θ ) α ( N N * ) , Ψ ( Θ ) ( 1 α ) ( N N * ) .

7. Simulation Studies

In this section, the estimation results obtained and developed in this paper are assessed and compared using the Monte Carlo simulation study. In our study, we assessed the effect of changing sample size N = n 1 + n 2 , and affected sample size m , two times ( τ 1 , τ 2 ) and parameters vector Θ = ( θ 11 , θ 12 , θ 21 , θ 22 , β 1 , β 2 ) . Therefore, we adopted two sets of parameter values Θ 1 = { 0.05 , 0.1 , 0.07 , 0.12 , 0.4 , 0.5 } and Θ 2 = { 0.2 , 0.3 , 0.4 , 0.2 , 1.0 , 1.0 } . For the censoring schemes, different combinations were adopted and are shown in Table 1, Table 2, Table 3 and Table 4. The prior information was selected using the relation (prior mean a i b i ) , where a i and b i are hyper-parameters of gamma prior. The point estimate were tested by computing the mean squared error (MSE). The interval estimates were evaluated using average length (AL) criterion, as well as the coverage probabilities (CPs). Using the Bayesian approach, we adopted.
Non-informative prior ( P 1 ) and informative prior ( P 2 ), where P 1 ( a i , b i ) = ( 0.0001, 0.0001 ) , and P 2 = { (0.5, 5), (0.5, 4), (1, 6), (1, 4), (1, 3), (2, 4)} for θ 1 and P 2 = { (1, 3), (2, 5), (2, 4), (1, 3), (2, 2), (3, 2)} for θ 2 are selected. For the MCMC method, we reported 11,000 iterations and the first 1000 iterations were discarded. The simulation results were formulated according to the following algorithm (Algorithm 3).
Algorithm 3 Monte Carlo simulation study.
Step 1:
From Gompertz distribution with two parameters θ s 1 + θ s 2 and β s   generate samples of size n 1 and n 2 , s = 1 , 2 , , respectively.
Step 2:
From the joint sample of size n = n 1 + n 2 and for given censoring parameters m, τ 1 , τ 2 . If, T m < τ 1 ; then, k m and the test is terminated at ω = τ 1 . However, if τ 1 < T m < τ 2 , k = m and the test is terminated at ω = T m and if τ 1 < τ 2 < T m , k m and the test is terminated at ω = τ 2 .
Step 3:
From step 2, the number of failures k , test termination time ω and failure times are generated. Hence, the observed joint Type-II GHC competing risks data are obtained.
Step 4:
The two values k 1 and k 2 (number of units from the first and second line in joint Type-II GHC competing risks data) are observed.
Step 5:
The integer numbers m s j , s , j = 1 , 2 are generated from binomial distributions.
Step 6:
We obtain various estimates by considering 1000 replications of samples. Steps (1–4) are repeated 1000 times.
Step 7:
For each sample, the MLE, bootstrap and Bayes estimate are computed.
Step 8:
The values of each MSE, AL and CP are computed, and the results are reported in Table 1, Table 2, Table 3 and Table 4.
Discussion: Recently, the problem of obtaining adequate information about the competing lifetime distributions and their parameters it has been of interest to many authors. Therefore, the reliability experimenter may resort to censoring techniques. In this paper, we proposed joint Type-II GHCS. The behavior of different estimation methods under different censoring schemes can be obtained from a simulation study. The numerical results presented in Table 1, Table 2, Table 3 and Table 4 show that the proposed model and the methods of estimation work well. The quality of the proposed model did not change for different model parameters. We summarize some points that describe the capabilities and the behavior of estimators as follows.
  • The values of MSEs decrease when sample size n 1 + n 2 or effected sample size m increases.
  • The model quality improves at increasing τ 1 and τ 2 .
  • The results under classical ML and non-informative Bayes estimation are both closed.
  • Informative prior Bayes estimates present the best estimation.
  • Estimation results under two Gompertz distribution parameters are more acceptable.
  • Interval estimations are more acceptable using bootstrap-t and informative Bayes estimation.

8. Real Data Analysis

Real datasets obtained from laboratory experiments were used to discuss the results of this paper. This data presented by Hoel [49] describe the survival time of male mice under a conventional laboratory environment. The test time considered an age of 5–6 weeks and male mice were exposed to radiation dose of 300 roentgens. These data were analyzed by Pareek et al. [50], Sarhan et al. [51] and Cramer and Schmiedt [52]. Data obtained under progressive first failure of compertz population were analyzed by Soliman et al. [27,28]. In this section, we considered two groups of radiated male mice, as shown in Table 5. For causes of failure, we considered Thymine Lymphoma as the first cause and the other causes were considered the second cause of failure. The data were divided by 1000 for simplicity of computation. To generate the joint Type-II GHC competing risks sample, the following algorithms were used (Algorithm 4).
Table 5. Two groups of failure for the laboratory radiation male mice Ω 1 and Ω 2 .
Table 5. Two groups of failure for the laboratory radiation male mice Ω 1 and Ω 2 .
Thymic Lymphoma
Ω 1 159189191198200207220235245250256261265266
280343356383403414428432
Other causes
Ω 1 4042 5162163179206222228252249282324333
341366385407420431441461462482517517524564
567586619620621622647651686761763
Thymic Lymphoma
Ω 2 158192193194195202212215229230237240244247
259300301321337415434444485496529537624707
800
Other causes
Ω 2 136246255376421565616617652655658660662675
681734736737757769777800807825855857864868
87087087388289591093494210151019
Algorithm 4 Generate joint Type-II GHC competing risks data.
Step 1:
Suppose that the censoring scheme has m = 70, τ 1 = 0.2 , τ 2 = 0.4 and ( n 1 , n 2 ) = ( 61 , 67 ) .
Step 2:
For the joint sample of size n = n 1 + n 2 given in Table 5 and Table 6 and the corresponding censoring scheme, we observed that, τ 1 < τ 2 < T m .
Step 3:
Hence, the value of k = 58 < m and the test was terminated at ω = τ 2 = 0.4 .
Step 4:
For the joint Type-II GHC data of zise 58 given in Table 7, we obtained k 1 = 35 from the first line and k 2 = 23 from the second line, and ( m 11 , m 12 , m 21 , m 22 ) = (18, 17, 19, 4).
Table 6. Jointly type-II GHCS competing risks sample from Hoal data with m = 50 .
Table 6. Jointly type-II GHCS competing risks sample from Hoal data with m = 50 .
t i 0.040.0420.051 0.0620.1360.158 0.1590.1630.179 0.1890.1910.1920.1930.194
η i 111100 11111000
ρ i 222221 1221111 1
t i 0.1950.1980.20.2020.2060.2070.2120.2150.220.2220.2280.2290.230.235
η i 011011 00111001
ρ i 111121 1112211 1
t i 0.2370.240.2440.2450.2460.2470.2490.250.2520.2550.2560.2590.2610.265
η i 000100 11101011
ρ i 111121 2122111 1
t i 0.2660.280.2820.30.3010.3210.3240.3330.337 0.3410.3430.356 0.3660.376
η i 111000 11011110
ρ i 112111 2212112 2
t i 0.3830.385
η i 11
ρ i 12
Table 7. Point estimates with 95% CIs of the parameters.
Table 7. Point estimates with 95% CIs of the parameters.
Pa.(.) ML (.) Boot (.) B-MCMC ACIBoot-pBoot-tCI
θ 11 0.33650.54120.4675(0.0501, 0.6228)(0.0472, 1.3214)(0.1784, 0.9115) (0.1903, 0.9029)
θ 12 0.3178 0.45780.4442 (0.0450, 0.5905)(0.1472, 0.8897)(0.1954, 0.8874) (0.1782, 0.8789)
θ 21 0.3156 0.46520.4636 (0.0006, 0.6306)(0.0015, 0.9541)(0.1924, 0.8556) (0.1778, 0.8789)
θ 22 0.0664 0.12430.1184 (-0.0216, 0.1545)(0.0824, 0.4123)(0.0336, 0.2911) (0.0298, 0.2824)
β 1 5.1907 5.32544.1962 (2.1508, 8.2306)(2.3652, 8.4562)(1.4215, 7.1921) (1.3725, 7.0651)
β 2 4.5269 4.77713.3093 (0.8129, 8.2408)(0.9112, 8.7214)(0.741, 6.4007) (0.6402, 6.4894)
Using the joint Type-II GHCS presented by Table 6, we plotted the profile log-likelihood function (16) as in Figure 1. The maximum values need to begin with initial values of the parameters β 1 and β 2 , showing that the iteration can be run with initial values that are almost in the neighborhood of the maximum values in Figure 1; therefore, the initial values were taken to be ( β 1 , β 2 ) = (5, 6). For Bayes estimation, we adopted non-informative prior with a i = b i = 0.0001 , i = 1 , 2 , …, 6. For the MCMC approach in Bayes method, we ran the chain 11,000 with the first 1000 values as burn-in. The MCMC approach that describes the empirical posterior distribution is shown in Figure 2, Figure 3, Figure 4, Figure 5, Figure 6 and Figure 7. Hence, the results of the ML point and interval estimates and different Bayes estimates were computed and the results are presented in Table 7 and Table 8.

9. Conclusions

Inference under various censoring techniques is crucial for life testing. Here, the problem of statistical inferences under a joint censoring scheme for Gompertz distribution is considered. Various inferences for unknown parameters of the proposed model were obtained from classical and Bayesian methods. We proposed that Gompertz units have two independent causes of failure, which can be determined using a competing risks model. Classical ML and bootstrap methods were used. Additionally, by using the Bayes technique and the MCMC method, the point and interval estimates were computed based on informative and non-informative priors. The asymptotic confidence intervals and Bayes credible intervals were also discussed. We used real data analysis and Monte Carlo simulation studies to assess and discuss the results. From the numerical result, we observed that the MLEs and non-informative Bayes estimations were closed. The Bayes method and bootstrap-t under informative prior P 1 worked better than other methods. The numerical results generally showed that using an informative prior distribution in Bayes computations produces superior results to likelihood estimates. The estimates obtained under MCMC method also performed well for all sample sizes and affected sample size in terms of MSEs and interval average widths. The study demonstrated that the comparative Gompertz distributions has good flexibility for modeling joint samples of survival times of male mice under a conventional laboratory environment. Finally, we can say that the proposed model and proposed method of estimation work well. Therefore, our results are very important in the field of comparative life testing, especially when units fail due to several causes of failure.

Author Contributions

Conceptualization, L.A.A.-E. and A.A.S.; Data curation, A.A.S. and G.A.A.-E.; Formal analysis, L.A.A.-E. and H.M.A.; Investigation, L.A.A.-E. and A.A.S.; Methodology, A.A.S. and G.A.A.-E.; Project administration, L.A.A.-E. and H.M.A.; Software, G.A.A.-E.; Supervision, L.A.A.-E. and A.A.S.; Validation, L.A.A.-E. and H.M.A.; Visualization, A.A.S.; Writing—original draft, L.A.A.-E.; Writing—review and editing, L.A.A.-E. and A.A.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University, through the Research Funding Program, Grant No. (FRP-1443-19).

Data Availability Statement

The data sets are available in the paper.

Acknowledgments

The authors would like to express their thanks to the editor and the three referees for helpful comments and suggestions. This research was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University, through the Research Funding Program, Grant No. (FRP-1443-19).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Childs, A.; Chandrasekar, B.; Balakrishnan, N.; Kundu, D. Exact likelihood inference based on Type-I and Type-II hybrid censored samples from the exponential distribution. Ann. Inst. Stat. Math. 2003, 2, 319–330. [Google Scholar] [CrossRef]
  2. Kundu, D.; Joarder, A. Analysis of type-II progressively hybrid censored data. Comput. Stat. Data Anal. 2006, 50, 2509–2528. [Google Scholar] [CrossRef]
  3. Balakrishnan, N.; Rasouli, A.; Sanjari Farsipour, N. Exact likelihood inference based on an unified hybrid censored sample from the exponential distribution. J. Stat. Comput. Simul. 2008, 78, 475–488. [Google Scholar] [CrossRef]
  4. Lone, S.A.; Panahi, H. Estimation procedures for partially accelerated life test model based on unified hybrid censored sample from the Gompertz distribution. Eksploat. Niezawodnosc-Maint. Reliab. 2022, 24, 427–436. [Google Scholar] [CrossRef]
  5. Cox, D.R. The analysis of exponentially distributed lifetimes with two types of failures. J. R. Stat. Soc. 1959, 21, 411–421. [Google Scholar]
  6. Crowder, M.J. Classical Competing Risks; Chapman and Hall: London, UK, 2001. [Google Scholar]
  7. Balakrishnan, N.; Han, D. Exact inference for a simple step-stress model with competing risks for failure from exponential distribution under Type-II censoring. J. Stat. Plan. Inference 2008, 138, 4172–4186. [Google Scholar] [CrossRef]
  8. Modhesh, A.A.; Abd-Elmougod, G.A. Analysis of Progressive First-Failure-Censoring in the Burr XII Model for Competing Risks Data. Am. J. Theor. Appl. Stat. 2015, 4, 610–618. [Google Scholar] [CrossRef] [Green Version]
  9. Bakoban, R.A.; Abd-Elmougod, G.A. MCMC in analysis of progressively first failure censored competing risks data for Gompertz model. J. Comput. Theor. Nanosci. 2016, 10, 6662–6670. [Google Scholar] [CrossRef]
  10. Debnath, P.; Mohiuddine, S.A. Soft Computing Techniques in Engineering, Health, Mathematical and Social Sciences; CRC Press: Boca Raton, FL, USA, 2021. [Google Scholar]
  11. Alghamdi, A.S. Statistical inferences of competing risks generalized half-logistic lifetime populations in presence of generalized type-I hybrid censoring scheme. J. Comput. Theor. Nanosci. 2023, 65, 699–708. [Google Scholar] [CrossRef]
  12. Ganguly, A.; Kundu, D. Analysis of simple step-stress model in presence of competing risks. J. Stat. Comput. Simul. 2016, 86, 1989–2006. [Google Scholar] [CrossRef]
  13. Abu-Zinadah, H.H.; Neveen, S.A. Competing risks model with partially step-stress accelerate life tests in analyses lifetime Chen data under type-II censoring scheme. Open Phys. 2019, 17, 192–199. [Google Scholar] [CrossRef]
  14. Rao, U.V.R.; Savage, I.R.; Sobel, M. Contributions to the theory of rank order statistics: The two-sample censored case. Ann. Math. Stat. 1960, 31, 415–426. [Google Scholar] [CrossRef]
  15. Johnson, R.A.; Mehrotra, K.G. Locally most powerful rank tests for the two-sample problem with censored data. Ann. Math. Stat. 1972, 43, 823–831. [Google Scholar] [CrossRef]
  16. Bhattacharyya, G.K.; Mehrotra, K.G. On testing equality of two exponential distributions under combined type-IIcensoring. J. Am. Stat. Assoc. 1981, 76, 886–894. [Google Scholar] [CrossRef]
  17. Mehrotra, K.G.; Bhattacharyya, G.K. Confidence intervals with jointly type-II censored samples from two exponential distributions. J. Am. Stat. Assoc. 1982, 77, 441–446. [Google Scholar] [CrossRef]
  18. Balakrishnan, N.; Rasouli, A. Exact likelihood inference for two exponential populations under joint type-II censoring. Comput. Stat. Data Anal. 2008, 52, 2725–2738. [Google Scholar] [CrossRef]
  19. Rasouli, A.; Balakrishnan, N. Exact likelihood inference for two exponential populations under joint progressive type-II censoring. Commun. Stat. Theory Methods 2010, 39, 2172–2191. [Google Scholar] [CrossRef]
  20. Shafaya, A.R.; Alakrishnanbc, B.N.; Abdel-Atyd, Y. Bayesian inference based on a jointly type-II censored sample from two exponential populations. J. Stat. Comput. Simul. 2014, 84, 2427–2440. [Google Scholar] [CrossRef]
  21. Algarni, A.; Almarashi, A.M.; Abd-Elmougod, G.A.; Abo-Eleneen, Z.A. Two compound Rayleigh lifetime distributions in analyses the jointly type-II censoring samples. J. Math. Chem. 2019, 58, 950–966. [Google Scholar] [CrossRef]
  22. Mondal, S.; Kundu, D. Bayesian Inference for Weibull Distribution under the Balanced Joint Type-II Progressive Censoring Scheme. Am. J. Math. Manag. Sci. 2019, 39, 56–74. [Google Scholar] [CrossRef]
  23. Mondal, S.; Kundu, D. Inferences of Weibull parameters under balance two sample type-II progressive censoring scheme. Qual. Reliab. Eng. Int. 2020, 36, 1–17. [Google Scholar] [CrossRef]
  24. Almarashi, A.M.; Algarni, A.; Daghistani, A.M.; Abd-Elmougod, G.A.; Abdel-Khalek, S.; Raqab, M.Z. Inferences for Joint Hybrid Progressive Censored Exponential Lifetimes under Competing Risk Model. Math. Probl. Eng. 2021, 2021, 3380467. [Google Scholar] [CrossRef]
  25. Tahani, A.A.; Soliman, A.A.; Abd-Elmougod, G.A. Statistical inferences of Burr XII lifetime models under joint Type-1 competing risks samples. J. Math. 2021, 2021, 9553617. [Google Scholar]
  26. Abdulaziz Alghamdi, S.; Abd-Elmougod, G.A.; Kundu, D.; Marin, M. Statistical Inference of Jointly Type-II Lifetime Samples under Weibull Competing Risks Models. Symmetry 2022, 14, 701. [Google Scholar] [CrossRef]
  27. Soliman, A.A.; Abd Ellah, A.H.; Abou-Elheggag, N.A.; Abd-Elmougod, G.A. A simulation based approach to the study of coefficient of variation of Gompertz distribution under progressive first-failure censoring. Indian J. Pure Appl. Math. 2011, 42, 335–356. [Google Scholar] [CrossRef]
  28. Soliman, A.A.; Abd Ellah, A.H.; Abou-Elheggag, N.A.; Abd-Elmougod, G.A. Estimation of the parameters of life for Gompertz distribution using progressive first-failure censoring data. Comput. Stat. Data Anal. 2012, 56, 2471–2485. [Google Scholar] [CrossRef]
  29. Lodhi, C.; Tripathi, Y.M.; Bhattacharya, R. On a progressively censored competing risks data from Gompertz distribution. Commun. Stat. Simul. Comput. 2021, 56, 1–22. [Google Scholar] [CrossRef]
  30. Wang, L.; Tripathi, Y.M.; Dey, S.; Shi, Y. Inference for dependence competing risks with partially observed failure causes from bivariate Gompertz distribution under generalized progressive hybrid censoring. Qual. Reliab. Eng. Int. 2021, 37, 1150–1172. [Google Scholar] [CrossRef]
  31. Gupta, R.D.; Kundu, D. Hybrid censoring schemes with exponential failure distribution. Commun. Stat. Theory Methods 1998, 27, 3065–3083. [Google Scholar] [CrossRef]
  32. Zhang, L.; Bhatti, M.M.; Michaelides, E.E.; Marin, M.; Ellahi, R. Hybrid nanofluid flow towards an elastic surface with tantalum and nickel nanoparticles, under the influence of an induced magnetic field. Eur. Phys. J. Spec. Top. 2022, 231, 521–533. [Google Scholar] [CrossRef]
  33. Kundu, D.; Pradhan, B. Estimating the parameters of the generalized exponential distribution in presence of hybrid censoring. Commun. Stat. Theory Methods. 2009, 38, 2030–2041. [Google Scholar] [CrossRef] [Green Version]
  34. Algarni, A.; Almarashi, M.A.; Abd-Elmougod, G.A. Joint type-I generalized hybrid censoring for estimation the two Weibull distributions. J. Inf. Sci. 2020, 36, 1243–1260. [Google Scholar]
  35. Chandrasekar, B.; Childs, A.; Balakrishnan, N. Exact likelihood inference for the exponential distribution under generalized Type-I and Type-II hybrid censoring. Nav. Res. Logist. 2004, 51, 994–1004. [Google Scholar] [CrossRef]
  36. Chakrabarty, J.B.; Chowdhury, S.; Roy, S. Optimum reliability acceptance sampling plan using Type-I generalized hybrid censoring scheme for products under warranty. Int. J. Qual. Reliab. Manag. 2019, 38, 780–799. [Google Scholar] [CrossRef]
  37. Balakrishnan, N. Progressive censoring methodology: An appraisal. Test 2007, 16, 211–296. [Google Scholar] [CrossRef]
  38. Balakrishnan, N.; Cramer, E. The Art of Progressive Censoring; Birkauser: New York, NY, USA, 2014. [Google Scholar]
  39. El-Sherpieny, E.A.; Almetwally, E.M.; Muhammed, H.Z. Progressive Type-II Hybrid Censored Schemes based on Maximum Product Spacing with Application to Power Lomax Distribution. Physica A 2020, 553, 1–12. [Google Scholar] [CrossRef]
  40. Abdul Mannan, M.; Rahman, M.R.; Akter, H.; Nahar, N.; Mondal, S. A Study of Banach Fixed Point Theorem and It’s Applications. Am. J. Comput. Math. 2021, 11, 157–174. [Google Scholar] [CrossRef]
  41. Xu, J.; Long, J.S. Using the Delta Method to Construct Confidence Intervals for Predicted Probabilities, Rates, and Discrete Changes; Lecture Notes; Indiana University: Bloomington, IN, USA, 2005. [Google Scholar]
  42. Wang, L.; Tripathi, Y.M.; Lodhi, C. Inference for Weibull competing risks model with partially observed failure causes under generalized progressive hybrid censoring. J. Comput. Appl. Math. 2020, 368, 1–15. [Google Scholar] [CrossRef]
  43. Shih, J.H.; Emura, T. Likelihood-based inference for bivariate latent failure time models with competing risks under the generalized FGM copula. Comput. Stat. 2018, 33, 1293–1323. [Google Scholar] [CrossRef]
  44. Davison, A.C.; Hinkley, D.V. Bootstrap Methods and Their Applications, 2nd ed.; Cambridge University Press: Cambridge, UK, 1997. [Google Scholar]
  45. Efron, B.; Tibshirani, R.J. An Introduction to the Bootstrap; Chapman and Hall: New York, NY, USA, 1993. [Google Scholar]
  46. Efron, B. The jackknife, the bootstrap and other resampling plans. In CBMS-NSF Regional Conference Series in Applied Mathematics; SIAM: Phiadelphia, PA, USA, 1982; Volume 38. [Google Scholar]
  47. Hall, P. Theoretical comparison of bootstrap confidence intervals. Ann. Stat. 1988, 16, 927–953. [Google Scholar] [CrossRef]
  48. Metropolis, N.; Rosenbluth, A.W.; Rosenbluth, M.N.; Teller, A.H.; Teller, E. Equations of state calculations by fast computing machines. J. Chem. Phys. 1953, 21, 1087–1091. [Google Scholar] [CrossRef] [Green Version]
  49. Hoel, D.G. A Representation of Mortality Data by Competing Risks. Biometrics 1972, 28, 475–488. [Google Scholar] [CrossRef] [PubMed]
  50. Pareek, B.; Kundu, D.; Kumar, S. On progressively censored competing risks data for Weibull distributions. Comput. Stat. Data Anal. 2009, 53, 4083–4094. [Google Scholar] [CrossRef]
  51. Sarhan, A.M.; Hamilton, D.C.; Smith, B. Statistical analysis of competing risks models. Reliab. Eng. Syst. Saf. 2010, 95, 953–962. [Google Scholar] [CrossRef]
  52. Cramer, E.; Schmiedt, A.B. Progressively Type-II censored competing risks data from Lomax distributions. Comput. Stat. Data Anal. 2011, 55, 1285–1303. [Google Scholar] [CrossRef]
Figure 1. Profile log-likelihood function (y-axis) of ( β 1 , x-axis) and ( β 2 , z-axis).
Figure 1. Profile log-likelihood function (y-axis) of ( β 1 , x-axis) and ( β 2 , z-axis).
Axioms 12 00322 g001
Figure 2. Trace (Left) and histogram (Right) plots of the parameter θ 11 .
Figure 2. Trace (Left) and histogram (Right) plots of the parameter θ 11 .
Axioms 12 00322 g002
Figure 3. Trace (Left) and histogram (Right) plots of the parameter θ 12 .
Figure 3. Trace (Left) and histogram (Right) plots of the parameter θ 12 .
Axioms 12 00322 g003
Figure 4. Trace (Left) and histogram (Right) plots of the parameter θ 21 .
Figure 4. Trace (Left) and histogram (Right) plots of the parameter θ 21 .
Axioms 12 00322 g004
Figure 5. Trace (Left) and histogram (Right) plots of the parameter θ 22 .
Figure 5. Trace (Left) and histogram (Right) plots of the parameter θ 22 .
Axioms 12 00322 g005
Figure 6. Trace (Left) and histogram (Right) plots of the parameter β 1 .
Figure 6. Trace (Left) and histogram (Right) plots of the parameter β 1 .
Axioms 12 00322 g006
Figure 7. Trace (Left) and histogram (Right) plots of the parameter β 2 .
Figure 7. Trace (Left) and histogram (Right) plots of the parameter β 2 .
Axioms 12 00322 g007
Table 1. MSEs of the parameter estimates for the choose Θ 1 = { 0.05 , 0.1 , 0.07 , 0.12 , 0.4 , 0.5 } .
Table 1. MSEs of the parameter estimates for the choose Θ 1 = { 0.05 , 0.1 , 0.07 , 0.12 , 0.4 , 0.5 } .
( n 1 , n 2 , m )( τ 1 , τ 2 ) θ 11 θ 12 θ 21 θ 22 β 1 β 2
(25, 25, 30)(2.0, 6.0)ML0.03450.07280.04210.08540.23100.3523
Boot0.04880.08970.05640.13240.33800.5201
BayesP10.03110.07040.03980.08220.22890.3510
BayesP20.02410.05890.02550.06450.20090.3324
(25, 25, 40)(2.0, 6.0)ML0.03210.07070.03900.08310.22870.3504
Boot0.04590.08710.05350.13010.33470.5172
BayesP10.02910.06840.03750.08000.22510.3500
BayesP20.02190.05540.02210.06190.18800.3303
(25, 25, 30)(2.0, 8.0)ML0.03270.07130.03920.08410.22790.3511
Boot0.04480.08690.05250.13070.33510.5168
BayesP10.02940.06820.03660.08050.22510.3503
BayesP20.02240.05510.02210.06150.18830.3311
(40, 40, 50)(2.0, 8.0)ML0.02850.06770.03520.08050.22440.3451
Boot0.04180.08500.05010.12750.33150.5128
BayesP10.02620.06510.03450.07620.22140.3462
BayesP20.01840.05110.01810.05760.18420.3259
(40, 40, 65)(2.0, 8.0)ML0.02410.06280.03090.07650.22050.3411
Boot0.03790.08010.04280.12250.32820.5100
BayesP10.02190.06090.03110.07210.21710.3429
BayesP20.01420.04710.01550.05270.18110.3215
Table 2. AL and CP of the parameter estimates for the chosen Θ 1 = { 0.05 , 0.1 , 0.07 , 0.12 , 0.4 , 0.5 } .
Table 2. AL and CP of the parameter estimates for the chosen Θ 1 = { 0.05 , 0.1 , 0.07 , 0.12 , 0.4 , 0.5 } .
( n 1 , n 2 , m )( τ 1 , τ 2 ) θ 11 θ 12 θ 21 θ 22 β 1 β 2
ALCP ALCPALCPALCPALCPALCP
(25, 25, 30)(2.0, 6.0) ML0.1450.880.3210.890.1850.890.3740.871.254 0.891.4520.88
Boot-p0.1700.890.3550.900.2210.890.3990.861.2800.891.7720.89
Boot-t0.1190.890.3000.900.1540.910.3420.891.2280.901.4180.89
BayesP 1 0.1370.880.3180.88 0.1720.890.3660.891.2410.901.4380.90
BayesP 2 0.0820.910.2740.90 0.1190.910.3150.901.2020.901.3790.91
(25, 25, 40)(2.0, 6.0)ML0.1220.900.3020.910.1640.900.3510.891.229 0.891.4250.90
Boot-p0.1480.890.3250.900.1880.900.3650.891.2510.891.7410.90
Boot-t0.0890.920.2690.920.1170.930.3110.921.2000.911.3790.91
BayesP 1 0.1120.890.2890.91 0.1420.9600.331 0.911.2190.93 1.4050.92
BayesP 2 0.0660.920.2490.92 0.0890.910.2870.931.1810.921.3510.91
(25, 25, 30)(2.0, 8.0)ML0.1290.910.3110.910.1580.910.3550.891.233 0.881.4170.91
Boot-p0.1510.880.3210.910.1920.890.3610.881.2440.901.7290.91
Boot-t0.0850.910.2710.920.1120.910.3150.911.1970.921.3750.93
BayesP 1 0.1150.890.2870.90 0.1330.920.3180.911.2110.911.3990.93
BayesP 2 0.0620.910.2410.91 0.0850.920.2910.921.1780.911.3480.92
(40, 40, 50)(2.0, 6.0)ML0.0910.920.2810.930.1420.920.3250.911.211 0.921.4010.94
Boot-p0.1240.900.3110.910.1620.920.3430.911.2320.941.7150.93
Boot-t0.0710.930.2510.910.1000.910.2920.951.1780.941.3620.93
BayesP 1 0.1000.900.2770.91 0.1210.920.3170.921.2020.921.3810.93
BayesP 2 0.0470.950.2280.91 0.0550.930.2620.941.1570.911.3320.94
(40, 40, 65)(2.0, 8.0)ML0.0750.910.2630.940.1180.920.3030.931.191 0.941.3820.92
Boot-p0.1010.910.3010.920.1510.900.3240.921.2140.911.7000.91
Boot-t0.0540.940.2360.920.0840.930.2750.921.1510.921.3380.94
BayesP 1 0.0890.920.2550.93 0.1010.920.3000.941.1870.911.3590.94
BayesP 2 0.0250.910.2070.92 0.0350.940.2410.941.1350.921.3090.96
Table 3. MSEs of the parameter estimates for the Θ 2 = { 0.2 , 0.3 , 0.4 , 0.2 , 1.0 , 1.0 } .
Table 3. MSEs of the parameter estimates for the Θ 2 = { 0.2 , 0.3 , 0.4 , 0.2 , 1.0 , 1.0 } .
( n 1 , n 2 , m )( τ 1 , τ 2 ) θ 11 θ 12 θ 21 θ 22 β 1 β 2
(25, 25, 30)(0.3, 6.0)ML0.12620.18950.25410.06780.45210.5742
Boot0.13100.19520.25980.07510.46600.5789
BayesP10.12540.18820.25370.06610.45090.5729
BayesP20.11420.17510.24100.05560.43900.5642
(25, 25, 40)(0.3, 6.0)ML0.12280.18660.25050.06450.44820.5715
Boot0.12840.19190.25710.07150.46280.5761
BayesP10.12190.18610.25110.06330.44810.5700
BayesP20.11140.17250.23790.05260.43540.5609
(25, 25, 30)(0.3, 0.9)ML0.12310.18720.25110.06410.44910.5709
Boot0.12870.19240.25680.07080.46220.5767
BayesP10.12250.18660.25150.06390.44870.5705
BayesP20.11170.17190.23660.05220.43580.5613
(40, 40, 50)(0.3, 0.9)ML0.11350.14610.24150.06080.44510.5671
Boot0.12390.18850.25400.06770.45910.5719
BayesP10.11810.18220.24710.06000.44490.5662
BayesP20.10750.16810.23290.04880.43150.5571
(40, 40, 65)(0.3, 0.9)ML0.11020.14270.23850.05870.44220.5645
Boot0.12110.18610.25150.06410.45650.5691
BayesP10.11550.18000.24420.05690.44220.5636
BayesP20.10410.16520.23030.04540.42870.5552
Table 4. AL and CP of the parameter estimates for Θ 2 = { 0.2 , 0.3 , 0.4 , 0.2 , 1.0 , 1.0 } .
Table 4. AL and CP of the parameter estimates for Θ 2 = { 0.2 , 0.3 , 0.4 , 0.2 , 1.0 , 1.0 } .
( n 1 , n 2 , m )( τ 1 , τ 2 ) θ 11 θ 12 θ 21 θ 22 β 1 β 2
ALCPALCPALCPALCPALCPALCP
(25, 25, 30)(0.3, 0.6)ML0.542 0.880.7410.89 1.2540.890.5470.873.2450.892.9890.89
Boot-p0.6650.860.8540.891.4520.890.6450.883.345 0.903.2140.89
Boot-t0.4900.900.6940.911.2010.900.5000.913.191 0.902.9140.90
BayesP 1 0.5110.890.7070.901.2220.890.5190.893.215 0.892.9510.90
BayesP 2 0.4250.910.6240.911.1100.890.4210.903.100 0.902.7980.91
(25, 25, 40)(0.3, 0.6)ML0.502 0.900.7080.90 1.2110.890.5020.903.2110.892.9410.91
Boot-p0.6280.900.8170.891.4220.890.6190.893.312 0.913.1870.89
Boot-t0.4620.900.6710.921.1750.910.4750.913.167 0.922.8870.92
BayesP 1 0.4770.890.6820.911.2000.890.4910.903.182 0.902.9120.91
BayesP 2 0.3920.930.5890.931.0810.920.3870.923.69 0.922.7640.96
(25, 25, 30)(0.3, 0.9)ML0.511 0.920.7040.91 1.2170.890.5080.913.2150.902.9470.92
Boot-p0.6240.890.8210.911.4280.900.6120.903.308 0.923.1910.85
Boot-t0.4570.900.6700.931.1820.900.4690.953.162 0.902.8910.93
BayesP 1 0.4720.920.6870.921.2050.900.4880.913.188 0.932.9170.94
BayesP 2 0.3870.940.5800.911.0880.910.3810.933.64 0.912.7550.93
(40, 40, 50)(0.3, 0.9)ML0.461 0.920.6740.93 1.1740.920.4690.933.1700.912.9120.93
Boot-p0.5910.920.8000.911.3890.900.5940.923.281 0.923.1410.91
Boot-t0.4220.930.6250.941.1310.920.4480.943.129 0.962.8510.94
BayesP 1 0.4390.910.6480.931.1640.920.4350.923.144 0.932.8740.95
BayesP 2 0.3540.920.5620.941.0470.910.3550.953.514 0.942.7240.92
(40, 40, 65)(0.3, 0.9)ML0.418 0.950.6340.92 1.1410.950.4320.933.1440.942.8880.92
Boot-p0.5540.940.7710.931.3510.920.5710.933.248 0.963.1090.92
Boot-t0.3920.930.6000.911.0920.950.4150.953.094 0.922.8150.91
BayesP 1 0.4140.920.6140.931.1270.910.4110.943.119 0.942.8480.92
BayesP 2 0.3170.930.5270.941.0010.920.3250.943.489 0.932.6870.95
Table 8. Point estimates of the reliability and failure rates at t = 0.1.
Table 8. Point estimates of the reliability and failure rates at t = 0.1.
Method R 11 R 12 R 21 R 22 h 11 h 12 h 21 h 22
(.) ML 0.95690.95920.96090.9916 0.56540.53400.49630.1045
(.) Bayes 0.94480.94750.94780.9864 0.68690.65230.62130.1588
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Al-Essa, L.A.; Soliman, A.A.; Abd-Elmougod, G.A.; Alshanbari, H.M. Comparative Study with Applications for Gompertz Models under Competing Risks and Generalized Hybrid Censoring Schemes. Axioms 2023, 12, 322. https://doi.org/10.3390/axioms12040322

AMA Style

Al-Essa LA, Soliman AA, Abd-Elmougod GA, Alshanbari HM. Comparative Study with Applications for Gompertz Models under Competing Risks and Generalized Hybrid Censoring Schemes. Axioms. 2023; 12(4):322. https://doi.org/10.3390/axioms12040322

Chicago/Turabian Style

Al-Essa, Laila A., Ahmed A. Soliman, Gamal A. Abd-Elmougod, and Huda M. Alshanbari. 2023. "Comparative Study with Applications for Gompertz Models under Competing Risks and Generalized Hybrid Censoring Schemes" Axioms 12, no. 4: 322. https://doi.org/10.3390/axioms12040322

APA Style

Al-Essa, L. A., Soliman, A. A., Abd-Elmougod, G. A., & Alshanbari, H. M. (2023). Comparative Study with Applications for Gompertz Models under Competing Risks and Generalized Hybrid Censoring Schemes. Axioms, 12(4), 322. https://doi.org/10.3390/axioms12040322

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop