Next Article in Journal
Product of Spacing Estimation of Stress–Strength Reliability for Alpha Power Exponential Progressively Type-II Censored Data
Next Article in Special Issue
Derivative Formulas and Gradient of Functions with Non-Independent Variables
Previous Article in Journal
M-WDRNNs: Mixed-Weighted Deep Residual Neural Networks for Forward and Inverse PDE Problems
Previous Article in Special Issue
Constant-Stress Modeling of Log-Normal Data under Progressive Type-I Interval Censoring: Maximum Likelihood and Bayesian Estimation Approaches
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

On Entropy Estimation of Inverse Weibull Distribution under Improved Adaptive Progressively Type-II Censoring with Applications

by
Farouq Mohammad A. Alam
1,* and
Mazen Nassar
1,2
1
Department of Statistics, Faculty of Science, King Abdulaziz University, Jeddah 21589, Saudi Arabia
2
Department of Statistics, Faculty of Commerce, Zagazig University, Zagazig 44519, Egypt
*
Author to whom correspondence should be addressed.
Axioms 2023, 12(8), 751; https://doi.org/10.3390/axioms12080751
Submission received: 17 May 2023 / Revised: 20 July 2023 / Accepted: 29 July 2023 / Published: 30 July 2023

Abstract

:
This article utilizes improved adaptive progressively Type-II censored data to estimate the entropy of the inverse Weibull distribution. Rényi, q, and Shannon entropy measurements are used to define entropy to achieve this objective. Both point and interval estimations of the entropy quantities are investigated through the maximum likelihood and maximum product of spacing methods. Two parametric bootstrap confidence intervals based on the two estimation techniques are also considered for the various entropy measures. A Monte Carlo simulation study is conducted to investigate how estimates behave at various sample sizes and different censoring schemes based on some statistical measurements. The simulations demonstrate that, as anticipated, when the sample size grows, the estimation accuracy also grows. Furthermore, they show that the estimated entropy measures get closer to the actual entropy values when the censoring level decreases. For purposes of explanation, two applications to actual datasets are taken into consideration. The results verified that the adaptive or improved adaptive progressive censoring schemes give more information about data than the conventional progressive censoring scheme in terms of minimum entropy measures.

1. Introduction

Entropy is one of the most often used metrics for assessing the degree of uncertainty regarding a random variable. It was first applied in physics, particularly in the context of the second law of thermodynamics. Measuring entropy is crucial in many fields of science, including statistics, physics, chemistry, economics, insurance, financial analysis, and biological phenomena. Less information in a sample is referred to as possessing higher entropy. Entropy was defined by Shannon [1] as a measure of information that provides a quantifiable measure of uncertainty using the methods of probability and statistics. This idea was strengthened by additional entropy measurements from various real-world applications; for a comprehensive survey, see Amigó et al. [2]. Three of the most used entropy metrics are the subject of this paper, namely, Rényi entropy (RE) by Rényi [3], the q-entropy (QE) by Tsallis [4], and Shannon entropy (SE) by [1].
Suppose that X is a random variable with probability density function (PDF) g ( y , Φ ) , where Φ is the vector of the unknown parameters. Following that, the RE, QE, and SE of X are defined, respectively, as:
R p = 1 1 p log [ g ( y ; Φ ) ] p d y , p 0 , p 1 ,
Q q = 1 q 1 1 [ g ( y ; Φ ) ] q d y . q 0 q 1 ,
and
S = g ( y ; Φ ) log g ( y ; Φ ) d y .
In reality, both the entropy and Φ are unknown. Due to this, the estimation of the parameters and entropy has received the most attention several research papers, including, but not limited to, Wong and Chen [5], Baratpour et al. [6], Morabbi and Razmkhah [7], Abo-Eleneen [8], Cramer and Bagh [9], Cho et al. [10], Hassan and Zaky [11], Bantan et al. [12], and Okasha and Nassar [13]. In the next two subsections, some detailed descriptions of preliminary concepts used in this study are presented.

1.1. Inverse Weibull Distribution and Its Entropy Indices

The first and foremost step that researchers must consider before thinking about dealing with the unknown entropy and Φ is to assume a suitable probability (lifetime) distribution and accordingly define the underlying PDF g ( y , Φ ) and the corresponding cumulative distribution function (CDF). This study considers the inverse Weibull (IW) distribution, which is a handy probability distribution to model various types of data, including reliability and actuarial sciences data, because its hazard rate can be decreasing or unimodal depending on the value of the shape parameter. The IW distribution was considered by Keller [14] to model failures of mechanical components subject to degradation. Afterward, many researchers studied the IW distribution, including, but not limited to, Calabria and Pulcini [15], Jiang et al. [16], Mahmoud et al. [17], Sultan [18], Kundu and Howlader [19], Hassan et al. [20], Kumar and Kumar [21], and Al-Duais [22]. The random variable Y follows the two-parameter IW distribution, denoted by IW ( θ , λ ) , if the corresponding PDF and CDF, are given by:
g ( y ; θ , λ ) = λ θ y ( θ + 1 ) e λ y θ , y 0 , θ , λ > 0 ,
and
G ( y ; θ , λ ) = e λ y θ , y 0 , θ , λ > 0 ,
respectively, where θ > 0 is the shape parameter and λ > 0 is the rate parameter. From (1) and (4), the RE of the random variable Y can be expressed as follows:
R p = log 1 θ + log p λ θ p log ( p ) 1 p + log Γ p 1 θ + p 1 p ,
with p 0 , p 1 , and p 1 1 + θ . Similarly, from (2), (3), and (4) the QE and SE of the random variable Y can be written, respectively, as:
Q q = 1 q 1 1 θ q 1 Γ q 1 θ + q λ q 1 θ q q 1 θ + q ,
with q 0 , q 1 and q 1 1 + θ and
S = 1 + log 1 λ θ + ( θ + 1 ) [ γ + log ( λ ) ] θ ,
where γ is the Euler constant.

1.2. Progressive Censoring Scheme and Some of Its Modifications

Typically, researchers conduct life-testing experiments on a random sample of n objects of interest to obtain data from which they can estimate Φ and accordingly estimate the entropy. However, waiting for the whole sample to fail is costly and time-consuming. Therefore, researchers obtain an incomplete dataset by a censoring scheme. Censoring is a widespread technique in life-testing experiments. In simple terms, data censoring means reducing cost and saving time, but at the same time, losing some information that might be important. The most common censoring schemes are the conventional Type-I and Type-II censoring schemes. While Type-I censoring ends the experiment at a predetermined time, Type-II censoring ends the experiment whenever a predetermined number of failures are attained. Because technology is developing rapidly, researchers frequently want to reduce expenses and test time. As a result, the progressive Type-II censoring (PT-IIC) scheme can be used as a generalized censoring technique. The PT-IIC sample can be described as follows: suppose a life-testing experiment involving n units is conducted according to a prefixed progressive censoring scheme ( R 1 , R 2 , , R m ) . Here, the number of observed failure times, say m, where m < n is predetermined. When the first failure occurs, R 1 items are removed from the remaining n 1 experimental units. Then, at the time of the second failure, R 2 units are removed from the n 2 R 1 remaining units. The process is repeated until the experiment reaches the mth failure, and at this point, all the remaining units are removed; afterward, the experiment is terminated. It is important to emphasize that the progressive censoring plan ( R 1 , R 2 , , R m ) must satisfy i = 1 m R i = n m . Estimating the parameters of some lifetime distributions based on the PT-IIC scheme has been the subject of several studies during the past two decades, see for example Rastogi et al. [23], Ahmed [24], and Dey et al. [25]. For more comprehensive details, see, for example, Balakrishnan and Aggarwala [26], Balakrishnan and Cramer [27], Dey et al. [28], and Kumar et al. [29].
Practically, the conventional PT-IIC scheme might take a while to reach the required failure times for the tested units; therefore, Ng et al. [30] proposed the adaptive progressive type-II censoring (APT-IIC) scheme as an alternative. For additional details about the latter censoring scheme, see, for example, Ye et al. [31], Sobhi and Soliman [32], and EL-Sagheer et al. [33]. Since the APT-TIIC scheme might not solve the problem of consuming experimental time, especially when the experimental units are highly reliable, Yan et al. [34] recently proposed the improved adaptive progressive Type-II censoring (IAPT-IIC) scheme. The process of the IAP-TIIC scheme can be defined as follows: assume an independent and identically distributed random sample of n units are set on a life test, the required number of failures m n is prefixed and ( R 1 , R 2 , , R m ) are also predetermined; however, some values of R i may adjust during the experimentation. Let T 1 , T 2 ( 0 , ) , where T 1 < T 2 , be two thresholds specified based on the dependability information on the product of interest. Let D 1 and D 2 be the number of failures occur before times T 1 and T 2 , respectively, where D 1 < D 2 . At the time of the first failure Y 1 : m : n , R 1 units are randomly withdrawn from n 1 live items. Likewise, at the time of the second failure Y 2 : m : n , R 2 of n R 1 2 items are randomly withdrawn from the experiment, and so on. If Y m : m : n occurs first before time T 1 , i.e., Y m : m : n < T 1 (Case-I: PT-IIC scheme), the experiment stops at Y m : m : n with censoring scheme ( R 1 , R 2 , , R m ) . If Y D 1 : m : n < T 1 < Y D 1 + 1 : m : n (Case-II: APT-IIC scheme), where D 1 > 0 and D 1 + 1 < m , the experiment stops at Y m : m : n with censoring scheme ( R 1 , R 2 , , R D 1 , 0 , , 0 , R * ) , where R * = n m i = 1 D 1 R i , then no live units will be withdrawn from the test by placing R i = 0 for i = D 1 + 1 , , m 1 and at the time of the m t h failure all staying units are extracted. Finally, if Y m : m : n is not failed before time T 2 , i.e., T 2 < Y m : m : n (Case-III: IAPT-IIC scheme), the test stops at T 2 with censoring scheme R i = 0 for i = D 1 + 1 , , D 2 , and at T 2 all the remaining items are withdrawn, i.e., R * = n D 2 i = 1 D 1 R i . An experiment considering the IAPT-IIC scheme has three outputs, as shown in Table 1.
Due to the facts that IW distribution is flexible in modeling real datasets, and the IAP-TIIC scheme’s efficiency in data acquisition, mainly when the experimental units are of a high degree of reliability, this study concentrates on estimating the entropy of the IW distribution utilizing samples obtained via IAP-TIIC plans. The main idea that motivated this study is comparing the samples acquired based on the PT-IIC, APT-IIC, and IAPT-IIC schemes based on the amount of information they provided. This comparison interests many researchers in selecting the appropriate censoring scheme when collecting the required data. Another motivation for this work is to compare the efficiency of two classical estimation methods, namely maximum likelihood and maximum product of spacing (MPS), and four confidence interval estimation methods, to see which estimation method is suitable for estimating the considered entropy measures assuming IW lifetimes. The main objectives of this work are: (1) To investigate point and interval estimations of the three entropy indices, namely RE, QE, and SE, using maximum likelihood and MPS techniques. (2) To compare the approximate confidence intervals (ACIs) with two parametric bootstrap confidence intervals of the entropy measures. (3) To examine the effectiveness of the various approaches using a variety of scenarios of sample sizes, progressive censoring techniques, and thresholds using simulation research. (4) To make clear the usage of the outlined methodologies by analyzing a pair of real datasets. It is crucial to note that the two selected datasets were utilized for the practical investigation when the parent distribution is the IW model, which does not necessarily suggest that additional datasets of this sort have the same connection.
The remainder of this paper is organized as follows. Section 2 explores the maximum likelihood estimators (MLEs) and ACIs for RE, WE, and SE. The MPS estimators (MPSEs) and ACIs of the entropy measure are acquired in Section 3. Section 4 covers two parametric bootstrap confidence intervals for the entropy measures. Section 5 reports the outcomes of Monte Carlo simulations, while Section 6 provides the outcomes of the analyses for two actual datasets. In Section 7, the paper is concluded with a discussion and future research directions.

2. Maximum Likelihood Estimation

This section employs the maximum likelihood method to get the point and the interval estimates of the entropy measure based on the IAPT-IIC data.

2.1. Point Estimation

Let y ̲ = ( y 1 : m : n , , y D 1 : m : n , , y D 2 : m : n ) be an IAP-TIIC sample of size D 2 from the IW distribution with PDF and CDF given by (4) and (5), respectively, with progressive censoring scheme R 1 , , R D 1 , 0 , , 0 , R * . Then, we can write the joint likelihood function of the observed data in the following form:
L ( Φ | y ̲ ) = A i = 1 D 2 g ( y i : m : n ) i = 1 D 1 1 G ( y i : m : n ) R i 1 G ( τ ) R * ,
where Φ = ( θ , λ ) , A is a normalizing constant which does not depend on the parameters, τ = T 2 for simplicity, and R * is the number of remaining items at time τ . Ignoring the normalized constant and from (4), (5), and (9), we can write the likelihood function as follows:
L ( Φ | y ̲ ) = λ D 2 θ D 2 exp ( θ + 1 ) i = 1 D 2 log ( y i ) λ i = 1 D 2 y i θ 1 e λ τ θ R * i = 1 D 1 1 e λ y i θ R i ,
where y i = y i : m : n for simplicity. The natural logarithm of (10) can be expressed as:
( Φ | y ̲ ) = D 2 log ( λ ) + D 2 log ( θ ) ( θ + 1 ) i = 1 D 2 log ( y i ) λ i = 1 D 2 y i θ + i = 1 D 1 R i w i + R * w τ ,
where w i = log 1 e λ y i θ and w τ = log 1 e λ τ θ . To get the MLEs of θ and λ , we need to obtain first partial derivatives of (11) with respect to θ and λ as:
( Φ | y ̲ ) θ = D 2 θ i = 1 D 2 log ( y i ) + λ i = 1 D 2 y i θ log ( y i ) + i = 1 D 1 R i w ´ i + R * w ´ τ ,
and
( Φ | y ̲ ) λ = D 2 λ i = 1 D 2 y i θ + i = 1 D 1 R i w ˙ i + R * w ˙ τ ,
where w ´ i = λ y i θ log ( y i ) e λ y i θ 1 e λ y i θ 1 and w ´ τ = λ τ θ log ( τ ) e λ τ θ 1 e λ τ θ 1 , while w ˙ i = y i θ e λ y i θ 1 e λ y i θ 1 and w ˙ τ = τ θ e λ τ θ 1 e λ τ θ 1 .
The MLEs of θ and λ denoted by θ ^ and λ ^ can be obtained by equating (12) and (13) to zero and solve the two equations simultaneously. It is noted that there are no closed forms for the MLEs in this case. Hence, numerical techniques can be utilized to calculate θ ^ and λ ^ . When the MLEs of θ and λ are acquired, one can utilize the invariance property of the MLEs to obtain the MLEs of entropy measures by replacing θ and λ in (6)–(8) by the corresponding MLEs θ ^ and λ ^ . In this case, the MLEs of the entropies R p , Q q , and S for the IW distribution can be obtained, respectively, as follows:
R ^ p = log 1 θ ^ + log p λ ^ θ ^ p log ( p ) 1 p + log Γ p 1 θ ^ + p 1 p ,
with p 0 , p 1 , and p 1 1 + θ ^ ,
Q ^ q = 1 q 1 1 θ ^ q 1 Γ q 1 θ ^ + q λ ^ q 1 θ ^ q q 1 θ ^ + q ,
with q 0 , q 1 , and q 1 1 + θ ^ and
S ^ = 1 + log 1 λ ^ θ ^ + ( θ ^ + 1 ) [ γ + log ( λ ^ ) ] θ ^ .

2.2. Interval Estimation

It is also interesting to acquire the confidence intervals for the entropy indices in addition to the point estimates. Here, we develop the ACIs of the unknown entropy measures using the asymptotic aspects of the MLEs. Here, the ACIs of R p , Q q , and S are obtained by approximating the variances of their estimators through the well-known delta method. First, we acquire the inverse of the observed Fisher information matrix as the approximate asymptotic variance-covariance matrix:
I ( Φ ^ ) = 2 ( Φ | y ̲ ) θ 2 2 ( Φ | y ̲ ) θ λ 2 ( Φ | y ̲ ) λ θ 2 ( Φ | y ̲ ) λ 2 ( θ , λ ) = ( θ ^ , λ ^ ) 1 ,
where Φ ^ = ( θ ^ , λ ^ ) and
2 ( Φ | y ̲ ) θ 2 = D 2 θ 2 λ i = 1 D 2 y i θ log 2 ( y i ) i = 1 D 1 R i w ´ ´ i R * w ´ ´ τ
2 ( Φ | y ̲ ) λ 2 = D 2 λ 2 i = 1 D 1 R i w ˙ ˙ i R * w ˙ ˙ τ
and
2 ( Φ | y ̲ ) θ λ = i = 1 D 2 y i θ log ( y i ) i = 1 D 1 R i w ´ ˙ i R * w ´ ˙ τ
where w ´ ´ i = w ´ i w ´ i log ( y i ) λ y i θ 1 , w ´ ´ τ = w ´ τ w ´ τ log ( τ ) λ τ θ 1 , w ˙ ˙ i = y i θ w ˙ i 2 , w ˙ ˙ τ = τ θ w ˙ τ 2 , w ´ ˙ i = w ˙ i w ´ i log ( y i ) λ y i θ 1 and w ´ ˙ τ = w ˙ τ w ´ τ log ( τ ) λ τ θ 1 .
To approximate the variances for the estimators of entropy measures R p , Q q and S using the delta method, let Δ R = ( R p / θ , R p / λ ) , Δ Q = ( Q q / θ , Q q / λ ) and Δ S = ( S / θ , S / λ ) , with the following elements:
Δ R θ = ψ p 1 θ + p log ( λ p ) θ 2 1 θ , Δ R λ = 1 λ θ ,
Δ Q θ = θ q 3 Γ q 1 θ + q λ q 1 θ q q 1 θ + q θ + log ( q ) + log ( λ ) + ψ p 1 θ + p , Δ Q λ = θ q 2 Γ q 1 θ + q λ 1 + q 1 θ q q 1 θ + q
and
Δ S θ = θ + λ + γ θ 2 , Δ S λ = 1 λ ,
where ψ ( . ) = Γ ´ ( . ) / Γ ( . ) is the digamma function and Γ ´ ( . ) is the first derivative of Γ ( . ) . Now, the approximate estimates for the variances of R p , Q q and S can be acquired, respectively, as:
v a r ^ ( R ^ p ) [ Δ R I ( Φ ^ ) Δ R ] | ( θ , λ ) = ( θ ^ , λ ^ ) ,
v a r ^ ( Q ^ q ) [ Δ Q I ( Φ ^ ) Δ Q ] | ( θ , λ ) = ( θ ^ , λ ^ )
and
v a r ^ ( S ^ ) [ Δ S I ( Φ ^ ) Δ S ] | ( θ , λ ) = ( θ ^ , λ ^ ) ,
where I ( Φ ^ ) is given by (17). Then, the two-sided ACIs of R p , Q q and S at confidence level 100 ( 1 α ) , are given, respectively, by:
R ^ p ± z α 2 v a r ^ ( R ^ p ) , Q ^ q ± z α 2 v a r ^ ( Q ^ q ) and S ^ ± z α 2 v a r ^ ( S ^ ) ,
where z α 2 is the 100 ( 1 α / 2 ) standard normal percentile.

3. Maximum Product of Spacing Estimation

Lately, the method of MPS has earned additional awareness from numerous researchers to estimate the parameters of probability distributions as a potential alternative estimation method to the classical maximum likelihood method. Rather than employing the parameter values that maximize the likelihood function, the MPSEs are performed by picking the parameter values that maximize the product of the spacing between cumulative distribution function values at adjacent ordered points. Cheng and Amin [35] presented the MPS method, and multiple researchers employed it because the MPSEs keep most of the characteristics of the MLEs, including the invariance and asymptotic properties; see Coolen and Newby [36] and Anatolyev and Kosenok [37]. The general criterion for calculating the MPSEs is that the PDF f ( y ) > 0 , y ( a , b ) and all the items in the sample are independently and identically distributed. In our case, the support of Y I W ( θ , λ ) is ( 0 , ) , which provides a = 0 and b = . Based on the IAP-TIIC, we can define the partitions using the sample information in the interval [ 0 , ) as [ 0 , y 1 ] , [ y 1 , y 2 ] , , [ y D 2 1 , y D 2 ] , [ y D 2 , ) . Utilizing these partitions, the spacings of the aforementioned intervals can be defined as [ G ( y i ) G ( y i 1 ) ] , i = 1 , , D 2 , where G ( y 0 ) = 0 , G ( y D 2 + 1 ) = 1 and [ G ( y i ) G ( y i 1 ) ] = 1 . Using these notation and based on an IAP-TIIC sample, the MPSEs can be acquired by maximizing the following product of spacing function (PSF) with respect to the unknown parameters:
P ( Φ | y ̲ ) = A i = 1 D 2 + 1 G ( y i ) G ( y i 1 ) i = 1 D 1 1 G ( y i ) R i 1 G ( τ ) R * .

3.1. Point Estimation

Suppose that y ̲ = ( y 1 : m : n , , y D 1 : m : n , , y D 2 : m : n ) be an IAP-TIIC sample of size D 2 from the IW distribution with progressive censoring scheme R 1 , , R D 1 , 0 , , 0 , R * . Then, from (4), (5), and (21), the PSF can be written as:
P ( Φ | y ̲ ) = i = 1 D 2 + 1 e λ y i θ e λ y i 1 θ i = 1 D 1 1 e λ y i θ R i 1 e λ τ θ R *
The natural logarithm of the PSF in (22), denoted by p ( Φ | y ̲ ) , can be expressed as:
p ( Φ | y ̲ ) = i = 1 D 2 + 1 log e λ y i θ e λ y i 1 θ + i = 1 D 1 R i w i + R * w τ .
Let θ ˜ and λ ˜ denote the MPSEs of θ and λ . Then, these estimators can be obtained by maximizing (23) with respect to θ and λ . Alternatively, the MPSEs can be acquired by solving the following normal equations simultaneously:
p ( Φ | y ̲ ) θ = i = 1 D 2 + 1 ν i ν i 1 e λ y i θ e λ y i 1 θ + i = 1 D 1 R i w ´ i + R * w ´ τ = 0
and
p ( Φ | y ̲ ) λ = i = 1 D 2 + 1 y i 1 θ e λ y i 1 θ y i θ e λ y i θ e λ y i θ e λ y i 1 θ + i = 1 D 1 R i w ˙ i + R * w ˙ τ = 0 ,
where ν i = λ y i θ log ( y i ) e λ y i θ . It is observed that θ ˜ and λ ˜ cannot be obtained analytically from (24) and (25) because the complicated expressions of the normal equations. Consequently, one can utilize numerical techniques to obtain them. Now, employing the invariance property of the MPSEs, we can obtain the MPSEs of R p , Q q , and S for the IW distribution from (6)–(8), respectively, as:
R ˜ p = log 1 θ ˜ + log p λ ˜ θ ˜ p log ( p ) 1 p + log Γ p 1 θ ˜ + p 1 p ,
with p 0 , p 1 , and p 1 1 + θ ˜ ,
Q ˜ q = 1 q 1 1 θ ˜ q 1 Γ q 1 θ ˜ + q λ ˜ q 1 θ ˜ q q 1 θ ˜ + q ,
with q 0 , q 1 , and q 1 1 + θ , and
S ˜ = 1 + log 1 λ ˜ θ ˜ + ( θ ˜ + 1 ) [ γ + log ( λ ˜ ) ] θ ˜ .

3.2. Interval Estimation

Here, by utilizing the asymptotic properties of the MPSEs, the ACIs of the entropy measures are established. As in the MLEs case, to get the ACIs of R p , Q q , and S, we first compute the approximate asymptotic variance-covariance matrix based on the MPSEs as follows:
I ( Φ ˜ ) = 2 p ( Φ | y ̲ ) θ 2 2 p ( Φ | y ̲ ) θ λ 2 p ( Φ | y ̲ ) λ θ 2 p ( Φ | y ̲ ) λ 2 ( θ , λ ) = ( θ ˜ , λ ˜ ) 1 ,
where Φ ˜ = ( θ ˜ , λ ˜ ) . The elements of (29) are given by:
2 p ( Φ | y ̲ ) θ 2 = i = 1 D 2 + 1 ν ´ i ν ´ i 1 e λ y i θ e λ y i 1 θ i = 1 D 2 + 1 ( ν i ν i 1 ) 2 e λ y i θ e λ y i 1 θ 2 i = 1 D 1 R i w ´ ´ i R * w ´ ´ τ ,
2 p ( Φ | y ̲ ) λ 2 = i = 1 D 2 + 1 y i 2 θ e λ y i θ y i 1 2 θ e λ y i 1 θ e λ y i θ e λ y i 1 θ i = 1 D 2 + 1 y i 1 θ e λ y i 1 θ y i θ e λ y i θ 2 e λ y i θ e λ y i 1 θ 2 i = 1 D 1 R i w ˙ ˙ i R * w ˙ ˙ τ
and
2 p ( Φ | y ̲ ) θ λ = i = 1 D 2 + 1 ν ˙ i ν ˙ i 1 e λ y i θ e λ y i 1 θ i = 1 D 2 + 1 ( ν i ν i 1 ) y i 1 θ e λ y i 1 θ y i θ e λ y i θ e λ y i θ e λ y i 1 θ 2 i = 1 D 1 R i w ´ ˙ i R * w ´ ˙ τ ,
where ν ´ i = ν i log ( y i ) ( λ y i θ 1 ) and ν ˙ i = ν i ( 1 / λ y i θ ) . Then, we can obtain the approximate variances of R p , Q q and S using the delta method as follows:
v a r ˜ ( R ˜ p ) [ Δ R I ( Φ ˜ ) Δ R ] | ( θ , λ ) = ( θ ˜ , λ ˜ ) ,
v a r ˜ ( Q ˜ q ) [ Δ Q I ( Φ ˜ ) Δ Q ] | ( θ , λ ) = ( θ ˜ , λ ˜ )
and
v a r ˜ ( S ˜ ) [ Δ S I ( Φ ˜ ) Δ S ] | ( θ , λ ) = ( θ ˜ , λ ˜ ) ,
where the elements of Δ R , Δ Q , and Δ S are given by (18)–(20) and I ( Φ ˜ ) is given by (29). Then, the two-sided ACIs of R p , Q q , and S, are given, respectively, by:
R ˜ p ± z α 2 v a r ˜ ( R ˜ p ) , Q ˜ q ± z α 2 v a r ˜ ( Q ˜ q ) and S ˜ ± z α 2 v a r ˜ ( S ˜ ) .

4. Bootstrap Confidence Intervals

This section details two parametric bootstrap confidence intervals for the entropy measures. The first one uses Efron’s concept of percentile bootstrap (PB) confidence intervals; see Efron [38]. The second one is the studentized bootstrap (SB) confidence intervals provided by Hall [39]. We establish these confidence intervals based on MLEs and MPSEs. We use the following procedures to produce these bootstrap confidence intervals. Henceforth, in this section, any quantity with superscript * means that the quantity is acquired via bootstrapping except for R * , which refers to the number of removals at time T 2 . Algorithm 1 describes the process of producing PB confidence intervals for θ and λ , while Algorithm 2 provides the steps of acquiring SB confidence intervals for the same parameters.
Algorithm 1 PB confidence interval method
Require: Number of bootstrapping samples B 1000
Require: IAP-TIIC sample y 1 : m : n , , y D 1 : m : n , , y D 2 : m : n
Require: Censoring scheme R 1 , , R D 1 , 0 , , 0 , R *
 1:
Acquire either MLEs or MPSEs for θ and λ , say, θ ^ and λ ^ using the IAP-TIIC sample y 1 : m : n , , y D 1 : m : n , , y D 2 : m : n and the censoring scheme R 1 , , R D 1 , 0 , , 0 , R *
 2:
for i 1 to B do
 3:   
Generate y 1 : m : n * , , y D 1 : m : n * , , y D 2 : m : n * assuming model parameters θ ^ and λ ^
 4:   
Obtain θ ^ i * and λ ^ i * using y 1 : m : n * , , y D 1 : m : n * , , y D 2 : m : n * , the censoring scheme R 1 , , R D 1 , 0 , , 0 , R * , and the considered estimation method
 5:   
Use θ ^ i * and λ ^ i * to calculate R ^ p * ( i ) , Q ^ q * ( i ) , and S ^ * ( i )
 6:
end for    
 7:
Arrange R ^ p * ( 1 ) , R ^ p * ( B ) in ascending order to get R ^ p * [ 1 ] , , R ^ p * [ B ] , then compute the two-sided 100 ( 1 α ) confidence intervals of R p as:
R ^ p * [ B ( α / 2 ) ] , R ^ p * [ B ( 1 α / 2 ) ]
 8:
Arrange Q ^ q * ( 1 ) , Q ^ q * ( B ) in ascending order to get Q ^ q * [ 1 ] , , Q ^ q * [ B ] , then compute the two-sided 100 ( 1 α ) confidence intervals of Q q as:
Q ^ q * [ B ( α / 2 ) ] , Q ^ q * [ B ( 1 α / 2 ) ]
 9:
Arrange S ^ * ( 1 ) , S ^ * ( B ) in ascending order to get S ^ * [ 1 ] , , S ^ * [ B ] , then compute the two-sided 100 ( 1 α ) confidence intervals of S as:
S ^ * [ ( α / 2 ) ] , S ^ * [ B ( 1 α / 2 ) ]
Algorithm 2 SB confidence interval method
Require: Number of bootstrapping samples B 1000
Require: IAP-TIIC sample y 1 : m : n , , y D 1 : m : n , , y D 2 : m : n
Require: Censoring scheme R 1 , , R D 1 , 0 , , 0 , R *
 1:
Acquire either MLEs or MPSEs for θ and λ , say, θ ^ and λ ^ using the IAP-TIIC sample y 1 : m : n , , y D 1 : m : n , , y D 2 : m : n and the censoring scheme R 1 , , R D 1 , 0 , , 0 , R *
 2:
Use θ ^ and λ ^ to calculate R ^ p , Q ^ q , S ^ , v a r ^ ( R ^ p ) , v a r ^ ( Q ^ q ) , and v a r ^ ( S ^ )
 3:
for i 1 to B do
 4:   
Generate y 1 : m : n * , , y D 1 : m : n * , , y D 2 : m : n * assuming model parameters θ ^ and λ ^
 5:   
Obtain θ ^ i * and λ ^ i * using y 1 : m : n * , , y D 1 : m : n * , , y D 2 : m : n * , the censoring scheme R 1 , , R D 1 , 0 , , 0 , R * , and the considered estimation method
 6:   
Use θ ^ i * and λ ^ i * to calculate R ^ p * ( i ) , Q ^ q * ( i ) , and S ^ * ( i )
 7:   
Compute T R * ( i ) = R ^ p * ( i ) R ^ p v a r ^ ( R ^ p * ( i ) )
 8:   
Compute T Q * ( i ) = Q ^ q * ( i ) Q ^ q v a r ^ ( Q ^ q * ( i ) )
 9:   
Compute T S * ( i ) = S ^ * ( i ) S ^ v a r ^ ( S ^ * ( i ) )
 10:
end for    
 11:
Arrange T R * ( 1 ) , , T R * ( B ) in ascending order to get T R * [ 1 ] , , T R * [ B ] , then compute the two-sided 100 ( 1 α ) confidence intervals of R p as:
R ^ p + T R * [ B α / 2 ] v a r ^ ( R ^ p ) , R ^ p + T R * [ B ( 1 α / 2 ) ] v a r ^ ( R ^ p )
 12:
Arrange T Q * ( 1 ) , , T Q * ( B ) in ascending order to get T Q * [ 1 ] , , T Q * [ B ] , then compute the two-sided 100 ( 1 α ) confidence intervals of Q q as:
Q ^ q + T Q * [ B α / 2 ] v a r ^ ( Q ^ q ) , Q ^ q + T Q * [ B ( 1 α / 2 ) ] v a r ^ ( Q ^ q )
 13:
Arrange T S * ( 1 ) , , T S * ( B ) in ascending order to get T S * [ 1 ] , , T S * [ B ] , then compute the two-sided 100 ( 1 α ) confidence intervals of S as:
S ^ + T S * [ B α / 2 ] v a r ^ ( S ^ ) , S ^ + T S * [ B ( 1 α / 2 ) ] v a r ^ ( S ^ )

5. Monte Carlo Simulation Outcomes

Examining estimation efficiency numerically for the estimators of R p , Q q , S is an important aspect of this research. Therefore, extensive Monte Carlo simulations are performed. Using different simulation settings as shown in Table 2, 1000 IAPT-IIC data are obtained assuming that the true model parameters are either λ = 2.5 and θ = 2.5 or λ = 4.5 and θ = 4.5 , without loss of generality (For the sake of brevity, all simulation outcomes are reported for λ = 2.5 , θ = 2.5 only. Outcomes for the case of λ = 4.5 , θ = 4.5 can be provided, upon request, from the corresponding author.). Furthermore, Table 3 shows the actual value of S , R p and Q q assuming different values of p , q , λ , and θ . It is important to mention that three progressive censoring schemes are considered in this study, and they are as follows:
Scheme 1:
PT-IIC scheme with T 1 = T 2 = , and R i = n / m 1 for all i,
Scheme 2:
APT-IIC scheme with T 1 as displayed in Table 2 and R i = n / m 1 for all i,
Scheme 3:
IAPT-IIC scheme with T 1 and T 2 as displayed in Table 2 and R i = n / m 1 for all i.
Moreover, the steps of an approach used to simulate IAPT-IIC data for given values of n , m , T 1 , T 2 , and R 1 , R 2 , , R m are as follows:
  • Generate the conventional PT-IIC sample Y 1 : m : n , Y 2 : m : n , , Y m : m : n with censoring scheme R 1 , R 2 , , R m according to the method proposed by Balakrishnan and Sandhu [40].
  • Find D 1 such that Y D 1 : m : n < T 1 < Y D 1 + 1 : m : n and discard the progressive order statistics Y D 1 + 2 : m : n , Y D 1 + 3 : m : n , , Y m : m : n .
  • Generate the first m D 1 1 order statistics from the truncated distribution g ( y ; θ , λ ) / [ 1 g ( y ; θ , λ ) ] based on (4) and (5) with sample size n i = 1 D 1 R i D 1 1 as Y D 1 + 2 : m : n , Y D 1 + 3 : m : n , , Y m : m : n .
  • Find D 2 such that Y D 2 : m : n < T 2 ; accordingly, discard Y D 2 + 1 : m : n , Y D 2 + 2 : m : n , , Y m : m : n to obtain the required IAPT-IIC sample.
For each simulation setting, the bias and the root mean square errors (RMSEs) for each estimation of entropy measures are computed as shown in Figure 1 and Figure 2. The confidence interval lengths (CILs) and the coverage probabilities (CPs) of the various interval estimations are illustrated in Figure 3, Figure 4, Figure 5, Figure 6, Figure 7 and Figure 8. The CIL and CP for any entropy measure, say ϕ , are obtained, respectively, by:
CIL ( ϕ ) = 1 1000 j = 1 1000 U j L j
and
CP ( ϕ ) = 1 1000 j = 1 1000 1 L j ; U j ϕ ,
where 1 ( · ) is the indicator function and L j and U j denote the interval lower and upper bounds of sample j, respectively. This approach is used to obtain the CILs and CPs of the different interval estimation methods, including the bootstrap confidence intervals. The evaluation of CPs is based on the assumption that the nominal confidence level is 95%. Heatmaps are used to display the simulation results in this study. For example, Figure 1 depicts the bias of several entropy measurements for λ = 2.5 and θ = 2.5 . Each heatmap in Figure 1 ranges in color from yellow to red. The yellow color represents a low bias value, but the red color shows an increase in the bias value. It is to be noted that all numerical computations are implemented via R statistical programming language software [41] (The R source code for reproducing the Monte Carlo simulation outcomes is not reported here; nevertheless, it may be requested from the corresponding author.). From the obtained figures of the conducted simulation study, one can note the following observations:
  • Overall, as n (or m / n ) increases, the estimation efficiency improves, i.e., biases and RMSEs tend to 0, while the CILs decrease for all investigated interval estimates, and their CPs increase as expected.
  • As θ and λ increase, both biases and RMSEs of the considered point estimators decrease.
  • Estimation based on MLEs underestimates S , R p and Q q noticeably, while estimation based on MPSEs overestimates these entropy measurements.
  • In most cases, the estimators of the considered entropy measurements based on MLEs outperform their counterparts based on MPSEs in terms of biases and RMSEs. This observation was remarked by [13] when they performed a similar study but based on conventional PT-IIC data.
  • Regarding CILs, all considered confidence intervals based on MLEs, are either shorter than their counterparts based on MPSEs or similar.
  • Assuming a nominal level of 95%, the least simulated CP among all confidence intervals and simulation settings was 75%. It is observed that confidence intervals based on MPSEs outperformed their counterparts based on MLEs in terms of CPs and sometimes achieved the nominal level. This observation is noticed in all considered simulation settings except for the PBs intervals in the case of Scheme 3 (i.e., IAPT-IIC).

6. Illustrative Examples

In this section, two numerical applications are reported to illustrate the applications of the proposed methodologies to natural phenomena. The first dataset (Data No. 1) consists of the vinyl chloride data (in mg/L) obtained from clean-up-gradient monitoring wells. Several researchers analyzed the data; see Bhaumik et al. [42], Vishwakarma et al. [43], and Okasha and Nassar [13]. The second dataset (referred to as Data No. 2) contains the times (in min) to breakdown of an insulating fluid between 19 electrodes recorded at 34 kV, see Lawless [44]. See Dey and Nassar [45], Elshahhat and Rastogi [46], and Okasha and Nassar [13] for recent applications using these data. Okasha and Nassar [13] checked the fit of the IW distribution to this dataset via the Kolmogorov–Smirnov and Cramér-von Mises goodness-of-fit tests. They concluded that the IW distribution is a suitable for the given two datasets. Table 4 and Table 5 show a PT-IIC sample, an APT-IIC sample, and an IAPT-IIC sample generated from the original datasets, respectively.
The MLEs and MPSEs of the entropy measures and the corresponding standard errors (SEs) are computed and displayed in Table 6 for the two real datasets. The standard errors are obtained using B = 1000 parametric bootstrap samples. The latter table indicates that if the APT-IIC scheme is considered, then the MLEs should be used to estimate the model parameters. Alternatively, if the IAPT-IIC scheme is utilized, then the MPSEs should be considered when estimating the model parameters. Furthermore, one can conclude that the APT-IIC or IAPT-IIC schemes provide more information for Data No. 1, based on MLEs and MPSEs, respectively. On the contrary, it is seen that the PT-IIC scheme and IAPT-IIC schemes provide more information regarding Data No. 2, using the MLEs and MPSEs, respectively. This analysis shows that the APT-IIC and IAPT-IIC provide more information than the traditional PT-IIC for some progressive censoring plans. Alongside the calculated estimators and corresponding SEs for both datasets, the parametric bootstrap samples are used to calculate the observed lengths of confidence intervals (CIs) for ACIs, PB, and SB confidence intervals of the different entropy measures using 90%, 95%, and 99% confidence levels, as shown in Table 7 and Table 8 for Data No. 1 and No. 2, respectively. The following remarks are observed from the latter tables:
  • As the confidence level increases, the lengths of the CIs increase as expected.
  • The CIs obtained based on APT-IIC and IAPT-IIC have fewer lengths than those obtained using the PT-IIC scheme.
  • The bootstrap-based confidence intervals based on MPSEs have fewer lengths than those obtained using their counterparts established based on the MLEs.
Combining the above results, we suggest using the APT-IIC or IAPT-IIC schemes to study the IW distribution characteristics. Furthermore, one can decide which scheme to use based on the MLEs or MPSEs using the smallest SEs calculated from bootstrap samples.

7. Conclusions

This paper has considered two estimation methods for Rényi, q, and Shannon entropies for inverse Weibull distribution based on improved adaptive progressively Type-II censored data. The estimation procedures of interest are the methods of maximum likelihood and maximum product of spacing. The point estimators are obtained through the invariance property. Moreover, the asymptotic confidence intervals and bootstrapped-based confidence intervals are also computed. Monte Carlo simulations have been carried out to examine estimation efficiency for the considered inferential procedures. Furthermore, two illustrative examples have been analyzed for the same purpose. The numerical study demonstrates that the maximum likelihood method yields reasonable point estimates for the three entropy measurements. On the other hand, numerical outcomes suggest that the maximum product of the spacing method is preferred when obtaining confidence intervals for these measurements. The data analysis demonstrated that the samples obtained using improved adaptive progressive Type-II or adaptive progressive Type-II censoring schemes provided more information than those gathered based on the traditional progressive Type-II censoring scheme based on the used progressive censoring plans.
Two research directions are being considered in the future. One research direction is to compare the performance of the considered conventional estimation methods to other non-conventional counterparts, such as those established on the least squares theory. Another research direction that needs to be addressed is comparing estimation efficiency between improved adaptive progressively Type-II censored data and generalized progressively hybrid censored data.

Author Contributions

F.M.A.A. and M.N. contributed equally to this work. All authors have read and agreed to the published version of the manuscript.

Funding

The Deanship of Scientific Research (DSR) at King Abdulaziz University, Jeddah, Saudi Arabia has funded this Project under grant no. (G: 231-130-1443).

Data Availability Statement

Not applicable.

Acknowledgments

The authors would like to convey their appreciation to the respected reviewers for their constructive observations and recommendations, which significantly enhanced the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Shannon, C.E. A Mathematical Theory of Communication. Bell Syst. Tech. J. 1948, 27, 379–423. [Google Scholar] [CrossRef] [Green Version]
  2. Amigó, J.; Balogh, S.; Hernández, S. A Brief Review of Generalized Entropies. Entropy 2018, 20, 813. [Google Scholar] [CrossRef] [Green Version]
  3. Rényi, A. On measures of entropy and information. In Proceedings of the Fourth Berkeley Symposium on Mathematical Statistics and Probability, Berkeley, CA, USA, 20 June–30 July 1961; University of California Press: Berkeley, CA, USA, 1961; pp. 547–561. [Google Scholar]
  4. Tsallis, C. Possible generalization of Boltzmann-Gibbs statistics. J. Stat. Phys. 1988, 52, 479–487. [Google Scholar] [CrossRef]
  5. Wong, K.; Chen, S. The entropy of ordered sequences and order statistics. IEEE Trans. Inf. Theory 1990, 36, 276–284. [Google Scholar] [CrossRef]
  6. Baratpour, S.; Ahmadi, J.; Arghami, N.R. Entropy properties of record statistics. Stat. Pap. 2007, 48, 197–213. [Google Scholar] [CrossRef]
  7. Morabbi, H.; Razmkhah, M. Entropy of Hybrid Censoring Schemes. J. Stat. Res. Iran 2010, 6, 161–176. [Google Scholar] [CrossRef]
  8. Abo-Eleneen, Z.A. The Entropy of Progressively Censored Samples. Entropy 2011, 13, 437–449. [Google Scholar] [CrossRef] [Green Version]
  9. Cramer, E.; Bagh, C. Minimum and Maximum Information Censoring Plans in Progressive Censoring. Commun. Stat.-Theory Methods 2011, 40, 2511–2527. [Google Scholar] [CrossRef]
  10. Cho, Y.; Sun, H.; Lee, K. An Estimation of the Entropy for a Rayleigh Distribution Based on Doubly-Generalized Type-II Hybrid Censored Samples. Entropy 2014, 16, 3655–3669. [Google Scholar] [CrossRef] [Green Version]
  11. Hassan, A.S.; Zaky, A.N. Estimation of entropy for inverse Weibull distribution under multiple censored data. J. Taibah Univ. Sci. 2019, 13, 331–337. [Google Scholar] [CrossRef] [Green Version]
  12. Bantan, R.A.R.; Elgarhy, M.; Chesneau, C.; Jamal, F. Estimation of Entropy for Inverse Lomax Distribution under Multiple Censored Data. Entropy 2020, 22, 601. [Google Scholar] [CrossRef] [PubMed]
  13. Okasha, H.; Nassar, M. Product of spacing estimation of entropy for inverse Weibull distribution under progressive type-II censored data with applications. J. Taibah Univ. Sci. 2022, 16, 259–269. [Google Scholar] [CrossRef]
  14. Keller, A.; Goblin, M.; Farnworth, N. Reliability analysis of commercial vehicle engines. Reliab. Eng. 1985, 10, 15–25. [Google Scholar] [CrossRef]
  15. Calabria, R.; Pulcini, G. Bayes 2-sample prediction for the inverse weibull distribution. Commun. Stat.-Theory Methods 1994, 23, 1811–1824. [Google Scholar] [CrossRef]
  16. Jiang, R.; Murthy, D.; Ji, P. Models involving two inverse Weibull distributions. Reliab. Eng. Syst. Saf. 2001, 73, 73–81. [Google Scholar] [CrossRef]
  17. Mahmoud, M.; Sultan, K.; Amer, S. Order statistics from inverse weibull distribution and associated inference. Comput. Stat. Data Anal. 2003, 42, 149–163. [Google Scholar] [CrossRef]
  18. Sultan, K.S. Bayesian Estimates Based on Record Values from the Inverse Weibull Lifetime Model. Qual. Technol. Quant. Manag. 2008, 5, 363–374. [Google Scholar] [CrossRef]
  19. Kundu, D.; Howlader, H. Bayesian inference and prediction of the inverse Weibull distribution for Type-II censored data. Comput. Stat. Data Anal. 2010, 54, 1547–1558. [Google Scholar] [CrossRef]
  20. Hassan, A.S.; Assar, S.M.; Zaky, A.N. Constant-stress partially accelerated life tests for inverted Weibull distribution with multiple censored data. Int. J. Adv. Stat. Probab. 2015, 3, 72. [Google Scholar] [CrossRef]
  21. Kumar, K.; Kumar, I. Estimation in Inverse Weibull Distribution Based on Randomly Censored Data. Statistica 2019, 79, 47–74. [Google Scholar] [CrossRef]
  22. Al-Duais, F.S. Bayesian Analysis of Record Statistic from the Inverse Weibull Distribution under Balanced Loss Function. Math. Probl. Eng. 2021, 2021, 6648462. [Google Scholar] [CrossRef]
  23. Rastogi, M.K.; Tripathi, Y.M.; Wu, S.J. Estimating the parameters of a bathtub-shaped distribution under progressive type-II censoring. J. Appl. Stat. 2012, 39, 2389–2411. [Google Scholar] [CrossRef]
  24. Ahmed, E.A. Bayesian estimation based on progressive Type-II censoring from two-parameter bathtub-shaped lifetime model: An Markov chain Monte Carlo approach. J. Appl. Stat. 2013, 41, 752–768. [Google Scholar] [CrossRef]
  25. Dey, S.; Nassar, M.; Maurya, R.K.; Tripathi, Y.M. Estimation and prediction of Marshall–Olkin extended exponential distribution under progressively type-II censored data. J. Stat. Comput. Simul. 2018, 88, 2287–2308. [Google Scholar] [CrossRef]
  26. Balakrishnan, N.; Aggarwala, R. Progressive Censoring; Birkhäuser: Boston, MA, USA, 2000. [Google Scholar] [CrossRef]
  27. Balakrishnan, N.; Cramer, E. The Art of Progressive Censoring; Springer: New York, NY, USA, 2014. [Google Scholar] [CrossRef]
  28. Dey, S.; Nassar, M.; Kumar, D. Moments and estimation of reduced Kies distribution based on progressive type-II right censored order statistics. Hacet. J. Math. Stat. 2018, 48, 332–350. [Google Scholar] [CrossRef] [Green Version]
  29. Kumar, D.; Nassar, M.; Malik, M.R.; Dey, S. Estimation of the Location and Scale Parameters of Generalized Pareto Distribution Based on Progressively Type-II Censored Order Statistics. Ann. Data Sci. 2023, 10, 349–383. [Google Scholar] [CrossRef]
  30. Ng, H.K.T.; Kundu, D.; Chan, P.S. Statistical analysis of exponential lifetimes under an adaptive Type-II progressive censoring scheme. Nav. Res. Logist. (NRL) 2009, 56, 687–698. [Google Scholar] [CrossRef] [Green Version]
  31. Ye, Z.S.; Chan, P.S.; Xie, M.; Ng, H.K.T. Statistical inference for the extreme value distribution under adaptive Type-II progressive censoring schemes. J. Stat. Comput. Simul. 2014, 84, 1099–1114. [Google Scholar] [CrossRef]
  32. Sobhi, M.M.A.; Soliman, A.A. Estimation for the exponentiated Weibull model with adaptive Type-II progressive censored schemes. Appl. Math. Model. 2016, 40, 1180–1192. [Google Scholar] [CrossRef]
  33. EL-Sagheer, R.M.; Mahmoud, M.A.W.; Abdallah, S.H.M. Statistical inferences for new Weibull-Pareto distribution under an adaptive Type-II progressive censored data. J. Stat. Manag. Syst. 2018, 21, 1021–1057. [Google Scholar] [CrossRef]
  34. Yan, W.; Li, P.; Yu, Y. Statistical inference for the reliability of Burr-XII distribution under improved adaptive Type-II progressive censoring. Appl. Math. Model. 2021, 95, 38–52. [Google Scholar] [CrossRef]
  35. Cheng, R.C.H.; Amin, N.A.K. Estimating Parameters in Continuous Univariate Distributions with a Shifted Origin. J. R. Stat. Soc. Ser. B (Methodol.) 1983, 45, 394–403. [Google Scholar] [CrossRef]
  36. Coolen, F.; Newby, M. A Note on the Use of the Product of Spacings in Bayesian Inference; Memorandum COSOR, Technische Universiteit Eindhoven: Eindhoven, The Netherlands, 1990. [Google Scholar]
  37. Anatolyev, S.; Kosenok, G. An Alternative to Maximum Likelihood Based on Spacings. Econom. Theory 2005, 21, 472–476. [Google Scholar] [CrossRef] [Green Version]
  38. Efron, B. The Jackknife, the Bootstrap and Other Resampling Plans; Society for Industrial and Applied Mathematics: Philadelphia, PA, USA, 1982. [Google Scholar] [CrossRef]
  39. Hall, P. Theoretical Comparison of Bootstrap Confidence Intervals. Ann. Stat. 1988, 16, 927–953. [Google Scholar] [CrossRef]
  40. Balakrishnan, N.; Sandhu, R.A. A Simple Simulational Algorithm for Generating Progressive Type-II Censored Samples. Am. Stat. 1995, 49, 229–230. [Google Scholar] [CrossRef]
  41. R Core Team. R: A Language and Environment for Statistical Computing; R Foundation for Statistical Computing: Vienna, Austria, 2022. [Google Scholar]
  42. Bhaumik, D.K.; Kapur, K.; Gibbons, R.D. Testing Parameters of a Gamma Distribution for Small Samples. Technometrics 2009, 51, 326–334. [Google Scholar] [CrossRef]
  43. Vishwakarma, P.K.; Kaushik, A.; Pandey, A.; Singh, U.; Singh, S.K. Bayesian Estimation for Inverse Weibull Distribution Under Progressive Type-II Censored Data With Beta-Binomial Removals. Austrian J. Stat. 2018, 47, 77–94. [Google Scholar] [CrossRef] [Green Version]
  44. Lawless, J.F. Statistical Models and Methods for Lifetime Data; Wiley-Interscience: Hoboken, NJ, USA, 2003; p. 630. [Google Scholar]
  45. Dey, S.; Nassar, M. Classical methods of estimation on constant stress accelerated life tests under exponentiated Lindley distribution. J. Appl. Stat. 2019, 47, 975–996. [Google Scholar] [CrossRef]
  46. Elshahhat, A.; Rastogi, M.K. Estimation of Parameters of Life for an Inverted Nadarajah–Haghighi Distribution from Type-II Progressively Censored Samples. J. Indian Soc. Probab. Stat. 2021, 22, 113–154. [Google Scholar] [CrossRef]
Figure 1. Average biases of the estimators of S , R p and Q q for λ = 2.5 , θ = 2.5 .
Figure 1. Average biases of the estimators of S , R p and Q q for λ = 2.5 , θ = 2.5 .
Axioms 12 00751 g001
Figure 2. Average log ( RMSEs) of the estimators of S , R p and Q q for λ = 2.5 , θ = 2.5 .
Figure 2. Average log ( RMSEs) of the estimators of S , R p and Q q for λ = 2.5 , θ = 2.5 .
Axioms 12 00751 g002
Figure 3. The simulated CILs of ACIs for S , R p and Q q when λ = 2.5 , θ = 2.5 .
Figure 3. The simulated CILs of ACIs for S , R p and Q q when λ = 2.5 , θ = 2.5 .
Axioms 12 00751 g003
Figure 4. The simulated CPs of ACIs for S , R p and Q q when λ = 2.5 , θ = 2.5 .
Figure 4. The simulated CPs of ACIs for S , R p and Q q when λ = 2.5 , θ = 2.5 .
Axioms 12 00751 g004
Figure 5. The simulated CILs of PBs for S , R p and Q q when λ = 2.5 , θ = 2.5 .
Figure 5. The simulated CILs of PBs for S , R p and Q q when λ = 2.5 , θ = 2.5 .
Axioms 12 00751 g005
Figure 6. The simulated CPs of PBs for S , R p and Q q when λ = 2.5 , θ = 2.5 .
Figure 6. The simulated CPs of PBs for S , R p and Q q when λ = 2.5 , θ = 2.5 .
Axioms 12 00751 g006
Figure 7. The simulated CILs of SBs for S , R p and Q q when λ = 2.5 , θ = 2.5 .
Figure 7. The simulated CILs of SBs for S , R p and Q q when λ = 2.5 , θ = 2.5 .
Axioms 12 00751 g007
Figure 8. The simulated CPs of SBs for S , R p and Q q when λ = 2.5 , θ = 2.5 .
Figure 8. The simulated CPs of SBs for S , R p and Q q when λ = 2.5 , θ = 2.5 .
Axioms 12 00751 g008
Table 1. Cases of the IAPT-IIC scheme.
Table 1. Cases of the IAPT-IIC scheme.
TimelineTermination TimeScheme
y 1 : m : n < < y m : m : n < T 1 < T 2 y m : m : n PT-IIC
y 1 : m : n < < y D 1 : m : n < T 1 < y D 1 + 1 : m : n < < y m : m : n < T 2 y m : m : n APT-IIC
y 1 : m : n < < y D 1 : m : n < T 1 < y D 1 + 1 : m : n < < y D 2 : m : n < T 2 T 2 IAPT-IIC
Table 2. Simulation settings of n , m , T 1 , and T 2 assuming different values of p , q , λ , and θ .
Table 2. Simulation settings of n , m , T 1 , and T 2 assuming different values of p , q , λ , and θ .
n40406060606080808080
m20202020303020204040
T 1 11.211.211.211.211.2
T 2 1.51.71.51.71.51.71.51.71.51.7
Table 3. Actual values of S , R p , and Q q assuming different values of p , q , λ and θ .
Table 3. Actual values of S , R p , and Q q assuming different values of p , q , λ and θ .
ParametersS R 0.6 R 0.8 Q 0.6 Q 0.8
λ = 2.5 , θ = 2.5 1.2583271.7614391.4386682.557471.66701
λ = 4.5 , θ = 4.5 0.53564780.8600060.6595861.0264550.705069
Table 4. Generated samples from Data No. 1.
Table 4. Generated samples from Data No. 1.
Schemen m , D 1 , D 2 T 1 T 2 RData
PT-IIC3417, -, - ( 1 17 ) 0.4, 0.4, 0.5, 0.5, 0.6, 0.6, 0.9, 0.9, 1.2,
1.3, 2.0, 2.4, 2.5, 2.7, 3.2, 4.0, 6.8
APT-IIC3417, 8, -1 ( 1 8 , 0 8 , 9 ) 0.4, 0.4, 0.4, 0.5, 0.6, 0.6, 0.9, 1.0, 1.1,
1.2, 1.2, 1.3, 1.8, 2.0, 2.0, 2.3, 2.4
IAPT-IIC3417, 8, 1512 ( 1 8 , 0 6 , 11 ) 0.4, 0.4, 0.4, 0.5, 0.6, 0.6, 0.9, 1.0, 1.1,
1.2, 1.2, 1.3, 1.8, 2.0, 2.0
Table 5. Generated samples from Data No. 2.
Table 5. Generated samples from Data No. 2.
Schemen m , D 1 , D 2 T 1 T 2 RData
PT-IIC199, -, - ( 1 8 , 2 ) 2.78, 3.16, 4.15, 4.67, 7.35,
8.01, 12.06, 32.52, 33.91
APT-IIC199, 4, -30 ( 1 4 , 0 4 , 6 ) 2.78, 3.16, 4.67, 7.35, 31.75,
32.52, 33.91, 36.71, 72.89
IAPT-IIC199, 4, 73035 ( 1 4 , 0 2 , 8 ) 2.78, 3.16, 4.67, 7.35,
31.75, 32.52, 33.91
Table 6. The various estimates of entropies (with their SEs in parentheses) for the real data.
Table 6. The various estimates of entropies (with their SEs in parentheses) for the real data.
MLE
DataEntropyPT-IICAPT-IICIAPT-IIC
1SE2.597 (0.452)2.213 (0.409)2.253 (0.441)
RE (0.6)4.765 (1.369)3.823 (0.970)3.924 (1.082)
QE (0.6)14.315 (6.678)9.034 (4.083)9.512 (4.636)
RE (0.9)2.822 (0.505)2.400 (0.450)2.445 (0.487)
QE (0.9)3.261 (0.618)2.713 (0.559)2.770 (0.604)
2SE4.664 (0.661)6.419 (0.900)6.425 (1.030)
RE (0.7)5.881 (1.207)10.096 (3.655)10.123 (4.236)
QE (0.7)16.126 (1.769)65.581 (10.360)66.137 (12.071)
RE (0.9)4.913 (0.746)6.951 (1.103)6.959 (1.270)
QE (0.9)6.344 (0.769)10.039 (1.140)10.055 (1.312)
MPSE
DataEntropyPT-IICAPT-IICIAPT-IIC
1SE3.194 (0.581)2.278 (0.491)1.462 (0.466)
RE (0.6)6.704 (3.108)3.827 (1.143)2.427 (0.816)
QE (0.6)34.021 (22.934)9.056 (4.501)4.100 (3.167)
RE (0.9)3.483 (0.666)2.461 (0.540)1.593 (0.500)
QE (0.9)4.166 (0.795)2.791 (0.664)1.727 (0.645)
2SE4.738 (0.729)5.967 (0.899)4.143 (0.784)
RE (0.7)6.201 (1.503)9.185 (3.286)5.358 (1.474)
QE (0.7)18.085 (2.513)49.104 (8.633)13.298 (2.474)
RE (0.9)5.025 (0.840)6.460 (1.100)4.392 (0.889)
QE (0.9)6.528 (0.886)9.080 (1.156)5.515 (0.959)
Table 7. The observed lengths of CIs for the Data No. 1.
Table 7. The observed lengths of CIs for the Data No. 1.
PT-IIC Scheme
MethodEntropy90% PB95% PB99% PB90% SB95% SB99% SB90% ACI95% ACI99% ACI
MLESE1.5181.7692.3381.6301.9442.5541.4881.7742.331
RE (0.7)4.6635.9158.7525.0296.1338.8664.5035.3667.052
QE (0.7)42.95567.353186.00033.99942.09655.37121.96826.17734.402
RE (0.9)1.7462.0332.7421.9142.2012.9441.6611.9802.602
QE (0.9)2.3012.6863.6332.5042.8873.8032.0332.4233.184
MPSESE1.5281.8232.4001.7512.0942.8921.9112.2772.993
RE (0.7)8.58710.09513.9119.65512.03517.53310.22412.18316.011
QE (0.7)359.823617.2942256.764162.740212.909327.56075.44589.898118.146
RE (0.9)2.0262.3933.1702.0982.4433.5232.1902.6093.429
QE (0.9)2.9523.4884.6583.0253.5425.1282.6153.1164.095
APT-IIC Scheme
MethodEntropy90% PB95% PB99% PB90% SB95% SB99% SB90% ACI95% ACI99% ACI
MLESE1.3261.6072.0511.4381.7302.2801.3451.6022.106
RE (0.7)3.3634.2555.8273.4514.1805.4703.1923.8034.998
QE (0.7)18.23226.30849.94915.29818.48024.17113.43116.00421.033
RE (0.9)1.4391.7392.3421.5751.8932.5971.4791.7622.316
QE (0.9)1.8182.1942.9691.9802.3723.2501.8372.1892.877
MPSESE1.2381.4711.9371.6811.9842.7081.6161.9252.530
RE (0.7)2.9303.5634.8384.4885.4246.8733.7594.4795.886
QE (0.7)13.73218.08029.58319.88323.78230.95814.80817.64523.189
RE (0.9)1.3771.6162.1971.8822.2263.1201.7772.1172.782
QE (0.9)1.7212.0212.7412.2752.7803.8512.1832.6023.419
IAPT-IIC Scheme
MethodEntropy90% PB95% PB99% PB90% SB95% SB99% SB90% ACI95% ACI99% ACI
MLESE1.9882.2802.8252.2372.6033.1761.4521.7302.273
RE (0.7)4.1745.4087.8305.7556.6778.8893.5584.2405.572
QE (0.7)21.87735.27883.55922.20826.25634.68115.25118.17323.883
RE (0.9)2.2472.5953.1792.6173.0233.5461.6021.9082.508
QE (0.9)2.7933.2243.9993.0963.5354.0941.9882.3693.113
MPSESE1.1771.4011.8261.7892.1182.8491.5321.8262.400
RE (0.7)1.8472.1622.8693.5534.2095.5972.6853.2004.205
QE (0.7)3.9034.5816.3396.5147.3898.99010.41912.41516.316
RE (0.9)1.2361.4901.9251.9372.3133.1431.6441.9602.575
QE (0.9)1.3841.6652.1401.9992.4043.1172.1232.5303.325
Table 8. The observed lengths of CIs for the Data No. 2.
Table 8. The observed lengths of CIs for the Data No. 2.
PT-IIC Scheme
MethodEntropy90% PB95% PB99% PB90% SB95% SB99% SB90% ACI95% ACI99% ACI
MLESE2.1552.5913.6402.5483.2684.7602.1742.5913.405
RE(0.7)3.8924.5386.1734.9336.2979.4973.9704.7316.218
QE(0.7)24.05829.55244.32935.50455.800109.8685.8216.9369.116
RE(0.9)2.3993.0104.1942.9513.8995.4572.4542.9243.843
QE(0.9)3.8574.8426.7075.0686.8229.7842.5303.0153.963
MPSESE2.3312.7963.6452.4543.0263.9772.3972.8563.753
RE(0.7)5.7067.06114.5864.9906.1688.2714.9455.8927.744
QE(0.7)53.72777.886746.23232.06643.94366.3538.2669.85012.945
RE(0.9)2.7333.2814.4042.8163.5034.8432.7633.2924.327
QE(0.9)4.5645.5127.5354.7146.1839.1692.9153.4744.565
APT-IIC Scheme
MethodEntropy90% PB95% PB99% PB90% SB95% SB99% SB90% ACI95% ACI99% ACI
MLESE2.8043.3494.3133.4404.1376.1412.9603.5274.636
RE(0.7)8.97811.32614.85716.52222.07537.54212.02414.32718.829
QE(0.7)266.041477.3841085.660475.609664.8071561.74534.08040.60953.369
RE(0.9)3.6834.3045.7274.5295.3157.6573.6284.3235.681
QE(0.9)7.3338.66311.6619.07110.92216.2833.7494.4675.870
MPSESE2.6043.1754.0993.4934.3225.9682.9583.5254.632
RE(0.7)8.23210.79014.28517.37822.10629.11810.80912.88016.927
QE(0.7)154.209311.100725.601358.010449.731903.18828.40033.84144.474
RE(0.9)3.1444.0095.0124.3585.3957.1323.6194.3135.668
QE(0.9)5.6677.3749.2918.24310.02113.8723.8034.5315.955
IAPT-IIC Scheme
MethodEntropy90% PB95% PB99% PB90% SB95% SB99% SB90% ACI95% ACI99% ACI
MLESE4.1924.9046.8684.6155.4907.5083.3894.0395.308
RE(0.7)9.06711.25116.17925.80633.35843.82313.93516.60521.822
QE(0.7)212.786372.5761351.513782.0501174.1031973.13439.71147.31962.187
RE(0.9)6.4427.62611.2175.9656.9279.6084.1774.9786.542
QE(0.9)14.27317.60929.26312.93314.96922.7504.3165.1436.759
MPSESE2.2122.6673.5163.5344.2165.7262.5793.0734.039
RE(0.7)3.7234.6545.9358.0709.60311.6004.8485.7767.591
QE(0.7)14.06419.15027.71147.12960.478114.4778.1399.69812.746
RE(0.9)2.4092.8723.9774.1444.9737.2612.9243.4844.579
QE(0.9)3.3754.0525.5246.4958.42012.4193.1563.7604.942
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Alam, F.M.A.; Nassar, M. On Entropy Estimation of Inverse Weibull Distribution under Improved Adaptive Progressively Type-II Censoring with Applications. Axioms 2023, 12, 751. https://doi.org/10.3390/axioms12080751

AMA Style

Alam FMA, Nassar M. On Entropy Estimation of Inverse Weibull Distribution under Improved Adaptive Progressively Type-II Censoring with Applications. Axioms. 2023; 12(8):751. https://doi.org/10.3390/axioms12080751

Chicago/Turabian Style

Alam, Farouq Mohammad A., and Mazen Nassar. 2023. "On Entropy Estimation of Inverse Weibull Distribution under Improved Adaptive Progressively Type-II Censoring with Applications" Axioms 12, no. 8: 751. https://doi.org/10.3390/axioms12080751

APA Style

Alam, F. M. A., & Nassar, M. (2023). On Entropy Estimation of Inverse Weibull Distribution under Improved Adaptive Progressively Type-II Censoring with Applications. Axioms, 12(8), 751. https://doi.org/10.3390/axioms12080751

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop