Next Article in Journal
Despeckling Algorithm for Removing Speckle Noise from Ultrasound Images
Previous Article in Journal
Discrete-Time Stochastic Quaternion-Valued Neural Networks with Time Delays: An Asymptotic Stability Analysis
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Statistical Inference of the Lifetime Performance Index with the Log-Logistic Distribution Based on Progressive First-Failure-Censored Data

Department of Mathematics, Beijing Jiaotong University, Beijing 100044, China
*
Author to whom correspondence should be addressed.
Symmetry 2020, 12(6), 937; https://doi.org/10.3390/sym12060937
Submission received: 6 May 2020 / Revised: 26 May 2020 / Accepted: 28 May 2020 / Published: 3 June 2020

Abstract

:
Estimating the accurate evaluation of product lifetime performance has always been a hot topic in manufacturing industry. This paper, based on the lifetime performance index, focuses on its evaluation when a lower specification limit is given. The progressive first-failure-censored data we discuss have a common log-logistic distribution. Both Bayesian and non-Bayesian method are studied. Bayes estimator of the parameters of the log-logistic distribution and the lifetime performance index are obtained using both the Lindley approximation and Monte Carlo Markov Chain methods under symmetric and asymmetric loss functions. As for interval estimation, we apply the maximum likelihood estimator to construct the asymptotic confidence intervals and the Metropolis–Hastings algorithm to establish the highest posterior density credible intervals. Moreover, we analyze a real data set for demonstrative purposes. In addition, different criteria for deciding the optimal censoring scheme have been studied.

1. Introduction

With the advancement of technology and the improvement of living standards, requirements for daily necessities have also increased. Product lifetime (PL), mentioned in Reference [1,2], is defined here as the functional life of a product. PL is related not only to the rights and interests of consumers but also to the survival and development of enterprises. The Process capability index (PCI), a parameter index used to appraise the performance of processes in the manufacturing and service industries, is used to test whether the manufactured products meet the minimum requirements. Generally, it is a default rule that the life span of a product can reflect its quality. In Reference [3], the lifetime performance index C L is proposed to measure such qualitative characteristics, and L represents an artificially set lower specification limit. Many scholars have considered the statistical inference for the lifetime performance index C L with various well-informed distributions from different censored samples; see References [4,5,6,7,8].
Generally, censoring is used in lifetime experiments owing to the restriction on time and funds in real life. Certain types of classic censoring schemes, of which type-I and type-II are the most common analyzed schemes, have been studied in survival analysis. In the former, it tests N units within a predetermined period of time t. On the contrary, the test will not terminate until m ( < N ) units failed in the latter scheme. The sharing shortcoming of type-I and type-II censoring lies in the limitation that no test unit can be removed until the termination of the test. Later, a whole new censoring which allows removal of units at various stages during the lifetime test: progressive censoring is proposed in Reference [9].
Compared with the traditional censoring schemes mentioned above in reliability theory, progressive censoring greatly improves the efficiency of reasoning method. The two can also be used in combination; see Reference [10]. In the monograph [11], a more detailed statement on progressive censoring schemes is given. In order to shun the problem that the long life of the product in most cases leads to a long time for review experiments, statisticians introduce new censoring schemes. The first-failure examination scheme is defined in Reference [12]. Randomly group the total N = n * k units to n batches, and each batch we get contains k identical units. All of the units are tested simultaneously. When the first failure of a unit contained in a batch is observed, the whole batch will be removed from the life test. Applying this model, a mass of time and economic costs can be saved.
Combining the advantage of progressive censoring and first-failure censoring mentioned in the previous paragraph, the progressive first-failure censoring is proposed in Reference [13]. We study this censoring, and the following is a brief introduction. Likewise, N samples are randomly assigned to n independent batches with k identical units (satisfy the equation N = n × k ) during the initial life test. On observing the failure of the mth unit, the experiment is terminated. The batch containing the ith observed failure unit along with R i randomly selected batches are removed jointly, where ( i = 1 , , m 1 ) . When the mth unit fails, the delete operation is performed to remove all surviving batches in life test. It is worthwhile to emphasize that m, k, and R = ( R 1 , R 2 , R m ) are predetermined constants. The progressive first-failure censoring has the advantages of reducing trial time, saving trial resources, and removing a significant number of risky units from the trial at various stages of the life test. It has been widely used in reliability studies and several researchers; refer to References [14,15,16,17,18,19,20].
Note the following:
  • When k = 1, R i = 0 ( i = 1 , ) , we acquire the complete sample.
  • When equations k = 1, R i = 0 ( i = 1 , , m 1 ) , and R m = n m are satisfied, we get type-II censoring.
  • When R i = 0 ( i = 1 , , m ) , the progressive first-failure censoring reduces to the first-failure censoring.
  • When k is equal to 1, we get a simplified form: the more familiar progressive type-II censoring.
The lifetime data we use is from log-logistic distribution. It is a kind of classical life distribution in reliability studies and is discussed by many scholars; refer to Reference [21,22,23]. When we have x > 0 , α > 0 , β > 0 , the cumulative distribution function (cdf) and the probability density function (pdf) of the log-logistic distribution are
F ( x ) = x β α β + x β
f ( x ) = β α ( x α ) β 1 ( 1 + ( x α ) β ) 2
Note that β is the shape parameter; α is the scale parameter and the median of the log-logistic distribution.
Moreover, the hazard rate function of log-logistic distribution is
r ( x , α , β ) = β x β 1 α β + x β
We assume β > 2 for calculating the variance of the log-logistic distribution. As we can see from Figure 1, log-logistic distributions have a non-monotonic hazard function. It will decrease monotonically if β 1 and will become a unimodal function if β > 1 . Therefore, the hazard function we will study is unimodal.
In Section 2, we will discuss some basic characters of C L as well as the relationship between the product qualification ratio and the lifetime performance index. In Section 3, attention will be paid to the Maximum Likelihood Estimation (MLE) of C L using Fisher information matrix. In Section 4, we study normal approximation of the MLE and the log-transformed MLE. Then, Section 5 will use the Bayesian method to estimate C L with the help of Lindley approximation and Monte Carlo Markov Chain method. Section 6 and Section 7 contain simulation studies and an illustrative example. Optimal censoring plan will be discussed in Section 8. In Section 9, some conclusions will be summarized.

2. The Lifetime Performance Index C L

Let X represent the lifetime of the products. The C L X (the specific value of C L when using the random variable X) is defined in Reference [3] as follows:
C L X = μ X L X σ X
where μ X is the mean of X and σ X is the standard deviation of X. L X , the lower specification limit predetermined according to the market demands, specifies the minimum acceptable life of the product. Note that random variable X follows a log-logistic distribution throughout the whole paper. Since the pdf and the cdf of log-logistic distribution are presented earlier as in Equations (1) and (2), we can easily calculate that μ X = E ( X ) = α b sin b and σ X = V a r ( X ) = α 2 ( 2 b sin 2 b b 2 sin 2 b ) , where α > 0 , β > 2 and b = π β . Then, from Equation (4), the lifetime performance index is
C L X = 1 A ( b sin b L X α ) , < C L X < b tan b b
Here, we have A = 2 b sin 2 b b 2 sin 2 b . It is evident that C L X > 0 while L X < α b sin b . According to Equations (3) and (5), we can conservatively draw the conclusion that it is rational for C L X to represent the lifetime performance of products since the hazard rate function r ( x , α , β ) and C L X have the opposite performance when α increases.
In this paper, a product is assumed to be qualified (subquality) when X > ( < ) L X . We define the product qualification rate P r , which is also named as the conforming rate, as follows:
P r = P ( X L X ) = 1 1 + ( b sin b A C L X ) β , < C L X < b tan b b
Visibly, a strictly monotonic increasing relationship exits between P r and C L X for given β > 2 .
All in all, C L X has great practical relevance because it can represent the lifetime performance of products and can calculate the theoretical value of conforming rate P r .

3. Maximum Likelihood Estimation for C L X

Based on progressive first-failure-censored samples, the maximum likelihood estimation (MLE) for α , β , and C L X with log-logistic distribution are analysed in this section. Firstly, let X 1 : m : n X 2 : m : n X m : m : n be the sample generated from the log-logistic distribution following censoring schemes ( R 1 , , R m ) . Then, under this progressive first-failure-censored sample, the joint pdf based on the abovementioned censoring scheme is
f X 1 : m : n X 2 : m : n X m : m : n ( x 1 , x 2 , x m ) = B k m i = 1 m f ( x i : m : n ) × [ 1 F ( x i : m : n ) ] k ( R i + 1 ) 1 ,
where B = n ( n R 1 1 ) ( n R 1 R m 1 m + 1 ) is a normal constant and 0 < x 1 < x 2 < < x m < + is obligatory.
Substituting Equations (1) and (2) into Equation (7), we get the likelihood function ( l f ):
L ( α , β ) = B k m β m α β k i = 1 m ( R i + 1 ) i = 1 m x i β 1 ( α β + x i β ) k ( R i + 1 ) + 1
Both α and β are assumed to be unknown for further discussion. Take the logarithm of Equation (8) and the log-likelihood function l ( α , β , x ) becomes the following:
l = log B + m log k β + β k log α × i = 1 m ( R i + 1 ) + ( β 1 ) i = 1 m ln x i i = 1 m [ k ( R i + 1 ) + 1 ] log ( α β + x i β )
l ( α , β , x ) differentiates α and β respectively, and we can get the following:
l α = β α i = 1 m k ( R i + 1 ) i = 1 m [ k ( R i + 1 ) + 1 ] β α β 1 α β + x i β
l β = m β + k ln α i = 1 m ( R i + 1 ) + i = 1 m ln x i i = 1 m [ k ( R i + 1 ) + 1 ] α β log ( α ) + x β log ( x ) α β + x β
Set the above two Equations (9) and (10) to zero, and the MLEs of α and β can be obtained through calculation. From Equation (9), we can observe the following:
α = W m 1 β
where W = i = 1 m k ( R i + 1 ) x i β .
Then, substitute the value of α from Equation (11) into Equation (10):
m β + i = 1 m W W + m x i β ( ln x i 1 β ln W m ) i = 1 m k ( R i + 1 ) m x i β W + m d x i β ( ln x i 1 β ln W m ) = 0
Choosing a suitable iterative procedure, the solution to Equation (12) can be evaluated numerically when values of ( k , n , m , R , x ) are given. Let the MLE of β be β ^ , and the MLE of b can be obtained as b ^ = π β ^ . Then, it is available to get α ^ , the MLE of α , by substituting β ^ into Equation (11). Due to the invariance property, the MLE of C L X is obtained as follows:
C L X ^ = 1 A ^ ( b ^ sin b ^ L X α ^ )

4. Confidence Intervals

4.1. Asymptotic Confidence Intervals for MLE

Let θ = ( α , β ) , and the Fisher information matrix of θ is as follows:
I ( θ ) = E 2 l α 2 2 l α β 2 l β α 2 l β 2 .
The specific expressions of sencond derivatives of l are presented in Appendix A.
It is infeasible to derive the expectation of above expressions; henceforward, the observed Fisher information matrix is utilized for calculation. Set θ ^ = ( α ^ , β ^ ) to be the MLE of θ = ( α , β ) . When θ = θ ^ = ( α ^ , β ^ ) , the inverse of Equation (14) is the observed variance–covariance matrix of MLEs:
I 1 ( θ ^ ) = V a r ^ ( α ^ ) C o v ^ ( α ^ , β ^ ) C o v ^ ( β ^ , α ^ ) V a r ^ ( β ^ ) θ = θ ^
With mean as ( α , β ) and covariance matrix as I 1 ( α , β ) , the asymptotic distribution of MLEs θ ^ is approximately bivariately normal; 100 ( 1 ζ ) % two-tailed asymptotic confidence intervals of α and β are respectively the following:
α ^ ± Z ζ / 2 V a r ^ ( α ^ ) a n d β ^ ± Z ζ / 2 V a r ^ ( β ^ )
The ζ / 2 percentile of the standard normal distribution is Z ζ / 2 . Then, applying Monte Carlo simulation, the coverage probabilities (CPs) of α and β are respectively
C P α = P | ( α ^ α ) V a r ^ ( α ^ ) | Z ζ / 2 a n d C P β = P | ( β ^ β ) V a r ^ ( β ^ ) | Z ζ / 2
.
In addition, we assume that R T = ( C L X α , C L X β ) and we have the following:
C L X α = L X α 2 2 π csc 2 π β β π 2 csc 2 π β β 2 ,
C L X β = M C L X N
where
M = π 2 cot π β csc π β β 3 π csc π β β 2 2 π csc 2 π β β π 2 csc 2 π β β 2 N = 2 π 3 cot π β csc 2 π β β 4 + 2 π 2 csc 2 π β β 3 + 4 π 2 cot 2 π β csc 2 π β β 3 2 π csc 2 π β β 2 2 2 π csc 2 π β β π 2 csc 2 π β β 2
Then, we define the asymptotic estimator of V a r ^ ( C L X ^ ) as follows:
V a r ^ ( C L X ^ ) [ R T I 1 R ] ( α , β ) = ( α ^ , β ^ )
Using the delta method, we know that
C L X ^ C L X V a r ^ ( C L X ^ ) N ( 0 , 1 )
Thus, the 100 ( 1 ζ ) % asymptotic confidence interval of C L X can be derived as
C L X ^ ± Z ζ / 2 V a r ^ ( C L X ^ )

4.2. Asymptotic Confidence Intervals for the Log-Transformed MLE

According to References [8,24], the asymptotic confidence intervals has better CP using log-transformed MLE. The 100 ( 1 ζ ) % asymptotic confidence intervals of α and β for the log-transformed MLE are
log α ^ ± Z ζ / 2 V a r ^ ( log α ^ ^ ) a n d log β ^ ± Z ζ / 2 V a r ^ ( log β ^ ^ )
The 100 ( 1 ζ ) % approximate confidence intervals of α and β for log-transformed MLE are
α ^ exp [ ± Z ζ / 2 V a r ^ ( α ^ ) α ^ ] a n d β ^ exp [ ± Z ζ / 2 V a r ^ ( β ^ ) β ^ ]
Similarly, the 100 ( 1 ζ ) % normal approximation confidence interval of C L X is
C L X ^ exp [ ± Z ζ / 2 V a r ^ ( C L X ^ ) C L X ^ ] .

5. Bayesian Estimation

5.1. Prior Distribution and Posterior Analysis

A more precise and efficient method is considered to obtain approximate estimators of α and β here. First of all, prior distributions used in calculation are Gamma distributions:
g 1 ( α ) α a 1 1 e b 1 α , α > 0 , a 1 > 0 , b 1 > 0 g 2 ( β ) β a 2 1 e b 2 β , β > 2 , a 2 > 0 , b 2 > 0
The joint prior distribution is
π ( α , β ) α a 1 1 β a 2 1 e ( b 1 α + b 2 β )
The joint posterior distribution is
π ( α , β | x ) = π ( α , β ) L ( x | α , β ) 0 2 π ( α , β ) L ( x | α , β ) d α d β = 1 K α γ 1 1 β γ 2 1 e ( b 1 α + b 2 β ) i = 1 m x i β 1 ( α β + x i β ) k ( R i + 1 ) + 1
where
K = 0 2 α γ 1 1 β γ 2 1 e ( b 1 α + b 2 β ) i = 1 m x i β 1 ( α β + x i β ) k ( R i + 1 ) + 1 d α d β . γ 1 = β i = 1 m k ( R i + 1 ) + a 1 , γ 2 = m + a 2

5.2. Asymmetric and Symmetric Loss Functions

In the Bayesian estimation, the loss function is of great importance. The Bayesian estimation for parameters α and β and lifetime performance index C L X from a log-logistic distribution under both asymmetric as well as symmetric loss functions are carried out. The loss functions we chose are widely studied: the squared error loss function (SELF), the linex loss function (LF), the general entropy loss function (GELF). Their definitions are as follows:
L S E L F ( η , η ^ ) = ( η ^ η ) 2 L L F ( η , η ^ ) = e ψ ( η ^ η ) ψ ( η ^ η ) 1 L G E L F ( η , η ^ ) = ( η ^ η ) φ φ log η ^ η 1
Note that η ^ represents an estimate of η , ψ 0 , and φ 0 . In LF and GELF, the positive and negative natures of ψ and φ show the direction of the asymmetry and the value size shows the degree of asymmetry.
The Bayesian estimation of η under SELF, LF, and GELF are respectively as follows:
η ^ S E L F = E η [ η | X ]
η ^ L F = 1 ψ log ( E η [ e ψ η | X ] )
η ^ G E L F = E η [ η φ | X ] 1 φ
The Bayesian estimation under SELF, LF, and GELF of any given function of α and β , let us say ϕ ( α , β ) , are
ϕ ^ ( α , β ) S E L F = 0 2 ϕ ( α , β ) d α d β 0 2 d α d β
ϕ ^ ( α , β ) L F = 1 ψ log 0 2 e ψ ϕ ( α , β ) d α d β 0 2 d α d β
ϕ ^ ( α , β ) G E L F = 0 2 ϕ ( α , β ) φ d α d β 0 2 d α d β 1 φ
where = π ( α , β ) × L ( x | α , β ) .
Clearly, it is infeasible to get the accurate closed form of the Bayesian estimation. Hence, Lindley method is used in the next section to derive the Bayes estimator.

5.3. Lindley Approximation Method

Lindley approximation method is introduced by Reference [25] to approximate two integral ratios. According to this method, the Bayes estimate of any function of ( 1 , 2 ) , ϕ ( 1 , 2 ) , is
ϕ ^ = ϕ ( 1 ^ , 2 ^ ) + 0.5 ( E + l 30 F 12 + l 03 F 21 + l 21 G 12 + l 12 G 21 ) + ρ 1 E 12 + ρ 2 E 21
where
E = i = 1 2 j = 1 2 ϕ i j τ i j , E i j = ϕ i τ i i + ϕ j τ j i , l i j = i + j l ( 1 , 2 ) 1 i 2 j F i j = ( ϕ i τ i i + ϕ j τ j i ) σ i i G i j = 3 ϕ i j τ i i τ j j + ϕ j ( τ i i τ j j + 2 τ i j 2 ) , ρ i = ρ i , ρ = log π ( 1 , 2 ) ϕ i = ϕ i , ϕ i j = 2 ϕ i j i , j = 1 , 2 ρ 1 = ρ α = a 1 1 α b 1 , ρ 2 = ρ β = a 2 1 β b 2
The specific expressions of l i j (also known as third derivatives of l) are presented in Appendix B. τ i j represents the ( i , j ) th element from the observed variance–covariance matrix in Equation (15) calculated in Section 4.1. We calculate ϕ ^ for the estimation of ( 1 , 2 ) = ( α , β ).

5.3.1. The Squared Error Loss Function (SELF)

Taking ϕ ( α , β ) = α , β and C L X , first of all, the Bayes estimator of α and β under SELF can be obtained respectively as
α ^ L B = α ^ + ρ 1 τ 11 + ρ 2 τ 12 + 0.5 τ 11 ( l 30 τ 11 + 2 l 21 τ 12 + l 12 τ 22 ) + τ 21 ( l 21 τ 11 + 2 l 12 τ 21 + l 03 τ 22 ) β ^ L B = β ^ + ρ 1 τ 21 + ρ 2 τ 22 + 0.5 τ 12 ( l 30 τ 11 + 2 l 21 τ 12 + l 12 τ 22 ) + τ 22 ( l 21 τ 11 + 2 l 12 τ 21 + l 03 τ 22 )
Similarly, we take ϕ ( α , β ) = C L X , and the Bayes estimator of C L X can be obtained as follows:
C ^ L X S E L F = C ^ L X + 0.5 ( ϕ ^ 11 + 2 ϕ ^ 1 ρ ^ 1 ) τ ^ 11 + ( ϕ ^ 12 + 2 ϕ ^ 1 ρ ^ 2 ) τ ^ 12 + ( ϕ ^ 21 + 2 ϕ ^ 2 ρ ^ 1 ) τ ^ 21 + ( ϕ ^ 22 + 2 ϕ ^ 2 ρ ^ 2 ) τ ^ 22 + ( ϕ ^ 1 τ ^ 11 + ϕ ^ 2 τ ^ 12 ) ( l ^ 30 τ ^ 11 + 2 l ^ 21 τ ^ 12 + l ^ 12 τ ^ 22 ) + ( ϕ ^ 1 τ ^ 21 + ϕ ^ 2 τ ^ 22 ) ( l ^ 21 τ ^ 11 + 2 l ^ 12 τ ^ 21 + l ^ 03 τ ^ 22 )
The specific expressions of ϕ i and ϕ i j under SELF are presented in Appendix C.1.

5.3.2. The Linex Loss Function (LF)

For α , taking ϕ ( α , β ) = e ψ α , we obtain that
ϕ 1 = ψ e ψ α , ϕ 11 = ψ 2 e ψ α , ϕ 2 = ϕ 12 = ϕ 21 = ϕ 22 = 0 .
Substituting Equation (23) into Equation (22), the Bayes estimator of α under LF is
α ^ L F = 1 ψ log e ψ α ^ + 0.5 ( ψ 2 e ψ α τ 11 ψ e ψ α ( 2 ρ 1 τ 11 + 2 ρ 2 τ 12 + τ 11 ( l 30 τ 11 + 2 l 21 τ 12 + l 12 τ 22 ) + τ 21 ( l 21 τ 11 + 2 l 12 τ 21 + l 03 τ 22 ) ) )
Similarly, taking ϕ ( α , β ) = e ψ β , we can obtain that
ϕ 2 = ψ e ψ β , ϕ 22 = ψ 2 e ψ β , ϕ 1 = ϕ 11 = ϕ 21 = ϕ 12 = 0 .
The Bayes estimator of β according to Equation (22) under LF is
β ^ L F = 1 ψ log e ψ β ^ + 0.5 ( ψ 2 e ψ β τ 22 ψ e ψ β ( 2 ρ 1 τ 21 + 2 ρ 2 τ 22 + τ 12 ( l 30 τ 11 + 2 l 21 τ 12 + l 12 τ 22 ) + τ 22 ( l 21 τ 11 + 2 l 12 τ 21 + l 03 τ 22 ) ) )
Then, we compute the Bayesian estimation of C L X under LF when ϕ ( α , β ) = e ψ C L X is
C ^ L X L F = 1 ψ log e ψ C ^ L X + 0.5 ( ( ϕ 11 + 2 ϕ 1 ρ 1 ) τ 11 + ( ϕ 12 + 2 ϕ 1 ρ 2 ) τ 12 + ( ϕ 21 + 2 ϕ 2 ρ 1 ) τ 21 + ( ϕ 22 + 2 ϕ 2 ρ 2 ) τ 22 + ( ϕ 1 τ 11 + ϕ 2 τ 12 ) ( l 30 τ 11 + 2 l 21 τ 12 + l 12 τ 22 ) + ( ϕ 1 τ 21 + ϕ 2 τ 22 ) ( l 21 τ 11 + 2 l 12 τ 21 + l 03 τ 22 ) )
The specific expressions of ϕ i and ϕ i j under LF are presented in Appendix C.2.

5.3.3. The General Entropy Loss Function (GELF)

Taking ϕ ( α , β ) = α φ , we calculate that
ϕ 1 = φ α φ 1 , ϕ 11 = φ ( φ + 1 ) α φ 2 , ϕ 12 = ϕ 21 = ϕ 2 = ϕ 22 = 0
Then, we can get the Bayesian estimation of α under GELF as
α ^ G E L F = α ^ φ + 0.5 ( φ ( φ + 1 ) α φ 2 τ 11 φ α φ 1 ( 2 ρ 1 τ 11 + 2 ρ 2 τ 12 + τ 11 ( l 30 τ 11 + 2 l 21 τ 12 + l 12 τ 22 ) + τ 21 ( l 21 τ 11 + 2 l 12 τ 21 + l 03 τ 22 ) ) ) 1 φ
Taking ϕ ( α , β ) = β φ , we have
ϕ 2 = φ β φ 1 , ϕ 22 = φ ( φ + 1 ) β φ 2 , ϕ 12 = ϕ 21 = ϕ 1 = ϕ 11 = 0
Then, we can get the Bayesian estimation of β under GELF as
β ^ G E L F = β ^ φ + 0.5 ( φ ( φ + 1 ) β φ 2 τ 22 φ β φ 1 ( 2 ρ 1 τ 21 + 2 ρ 2 τ 22 + τ 12 ( l 30 τ 11 + 2 l 21 τ 12 + l 12 τ 22 ) + τ 22 ( l 21 τ 11 + 2 l 12 τ 21 + l 03 τ 22 ) ) ) 1 φ
Similarly, taking ϕ ( α , β ) = C L X φ , the Bayes estimate of C L X under GELF is
C L X G E L F ^ = C ^ L X φ + 0.5 ( ( ϕ 11 + 2 ϕ 1 ρ 1 ) τ 11 + ( ϕ 12 + 2 ϕ 1 ρ 2 ) τ 12 + ( ϕ 21 + 2 ϕ 2 ρ 1 ) τ 21 + ( ϕ 22 + 2 ϕ 2 ρ 2 ) τ 22 + ( ϕ 1 τ 11 + ϕ 2 τ 12 ) ( l 30 τ 11 + 2 l 21 τ 12 + l 12 τ 22 ) + ( ϕ 1 τ 21 + ϕ 2 τ 22 ) ( l 21 τ 11 + 2 l 12 τ 21 + l 03 τ 22 ) ) 1 φ
The specific expressions of ϕ i and ϕ i j under GELF are presented in Appendix C.3.
The Bayes estimator of parameters α and β and the lifetime performance index C L X can be obtained using the Lindley method. Unfortunately, the Higher Posterior Density (HPD) credible intervals could not be studied since the Lindley approximation method only makes the point estimation. That is what we are going to focus on in the next section.

5.4. Monte Carlo Markov Chain Method

When estimating intricate Bayesian models, Monte Carlo Markov Chain (MCMC) is an effective method and have been used for research by many scholars; see Reference [16,26]. Metropolis–Hastings algorithm is the most commonly used Monte Carlo Markov Chain method in statistics, digital communication, signal processing, and other fields. In this paper, a mixed strategy combining the Metropolis–Hastings algorithm within the type of random walk chain is utilized for generating progressive first-failure-censored samples from each posterior distribution arising from log-logistic distribution. We apply the R function rwmetrop in the LearnBayes package. Reference [27] gave a detailed description.
From Equation (21), we acquire the joint posterior distributions of α and β :
π ( α , β | x ) α γ 1 1 e b 1 α β γ 2 1 e b 2 β i = 1 m x i β 1 ( α β + x i β ) k ( R i + 1 ) + 1 b 1 γ 1 Γ ( γ 1 ) α γ 1 1 e b 1 α × b 2 γ 2 Γ ( γ 2 ) β γ 2 1 e b 2 β i = 1 m x i β 1 ( α β + x i β ) k ( R i + 1 ) + 1 π ( α , β | x ) π 1 ( α | β , x ) × π 2 ( β | α , x ) .
Here, we have
π 1 ( α | β , x ) = G a m m a ( γ 1 , b 1 ) = b 1 γ 1 Γ ( γ 1 ) α γ 1 1 e b 1 α π 2 ( β | α , x ) = b 2 γ 2 Γ ( γ 2 ) β γ 2 1 e β ( b 2 i = 1 m ln x i ) i = 1 m 1 x i ( α β + x i β ) k ( R i + 1 ) + 1
Since π 1 ( α | β , x ) is a standard gamma density function, samples of α can be easily generated. Unfortunately, π 2 ( β | α , x ) cannot be simplified to the widely studied distributions. Consequently, the required random samples are generated from the conditional posterior density by applying the Metropolis–Hastings method and the process is as follows:
Step  1:
Initialize the values of ( α 1 , β 1 ) .
Step 2:
Set the initial value of t to 1.
Step 3:
Generate α t from G a m m a ( γ 1 , b 1 ) .
Step 4:
Generate β t from π 2 ( β t 1 | α t , x ) , using the following algorithm:
Step 4-1:
Generate β ˙ from N o r m a l ( β t 1 , V a r i a n c e ( β ) ) .
Step 4-2:
Generate ω from U n i f o r m ( 0 , 1 ) d i s t r i b u t i o n .
Step 4-3:
Set β t = β ˙ i f ω < ν β β t 1 i f ω > ν β and ν β = m i n ( 1 , π 2 ( β ˙ | α t , x ) π 2 β t 1 | α t , x ) .
Step 5:
t = t + 1 .
Step 6:
Repeat steps 3–5 for M times.
Under SELF, the approximate Bayes estimator of parameters α and β , and the lifetime performance index C L X = ( α i , β i ) can be obtained as
α ^ M C M C S E = 1 M i = 1 M α i β ^ M C M C S E = 1 M i = 1 M β i C L X ^ M C M C S E = 1 M i = 1 M ( α i , β i )
HPD credible intervals of parameters α and β and the lifetime performance index C L X can be obtained applying MCMC techniques as follows:
(1) Arrange α i and β i as α 1 , α 2 , , α M and β 1 , β 2 , , β M .
(2) The ( 100 ζ ) % symmetric credible intervals of α and β are α M ( ζ / 2 ) , α M ( 1 ζ / 2 ) and β M ( ζ / 2 ) , β M ( 1 ζ / 2 ) , respectively.
(3) Similarly, the ( 100 ζ ) % symmetric credible interval of C L X is C L X M ( ζ / 2 ) , C L X M ( 1 ζ / 2 ) .

6. Simulation Results

The Monte Carlo simulation study is used for analyzing and comparing the performance of various estimators proposed in the preceding sections. Values of various scale parameters α and β and different sample sizes n, group sizes k, effective sample sizes m, and censored schemes ( R 1 , R 2 , , R m ) from log-logistic distribution are used in simulation study. Reference [28] proposed referential algorithm for generating the progressive first-failure-censored samples. Briefly summarized, generating the progressive first-failure censored sample with cdf F ( x ) can be regarded as generating the progressive type-II censored sample with cdf 1 ( 1 F ( x ) ) k on calculating. Furthermore, different censoring schemes ( R 1 , R 2 , , R m ) presented in the Table 1, Table 2, Table 3, Table 4, Table 5, Table 6, Table 7 and Table 8 are abbreviations. For example, (0*3) denotes (0,0,0) and ((0,1)*2) denotes (0,1,0,1). Note that we use R for simulation study.
In simulation study, we generate the progressive first-failure-censored data from log-logistic distribution ( α = 1.1 , β = 1.1 π ). We suppose that L = 1 , and according to Equation (5), the corresponding C L X is 0.4761017. The optim command in the R software is utilized to acquire the approximate MLEs of α , β , and C L X . Under symmetric loss function, the Lindley method and the Monte Carlo Markov Chain method are used to perform the Bayesian estimation precisely as well as under asymmetric loss functions. In Bayesian estimation, set the value of the hyperparameters equal to the true values and ( a 1 , b 1 , a 2 , b 2 ) = ( 5 , 4 , 1.1 π , 1 ) . We assume that ψ = 1 and ψ = 1 under LF and that φ = 1 and φ = 0.8 under GELF. Set M = 1000 in the Metropolis–Hastings algorithm, and the whole process is simulated for N = 1000 times; 95% asymptotic confidence intervals of the lifetime performance index C L X are obtained using both the MLEs and the log-transformed MLEs. Using the Metropolis–Hastings algorithm, we obtain 95% symmetric credible intervals of C L X . Under the abovementioned estimators, the calculation results of the expected values (EV) and the corresponding mean square error (MSE) are shown in Table 1, Table 2, Table 3, Table 4, Table 5, Table 6 and Table 7. Table 8 presents the interval estimation of C L X .
Due to limited space, we only list the results of group sizes k = 2 and three cases n = 50 , 70 , 100 in Table 3, Table 4, Table 5, Table 6, Table 7 and Table 8. Table 1 and Table 2 are fully listed as representatives to show the affect of k on simulation results of MLE and Bayesian estimation, respectively. The complete results of group sizes k = 2 , 3 are listed in Appendix D. From Table 1, Table 2, Table 3, Table 4, Table 5, Table 6, Table 7 and Table 8, we can draw the following conclusions:
(1)
From Table 1, we conclude that, in MLE, the MSEs of α increase as k increases when n and m are invariant and decrease as n or m increases when k is invariant. The MSEs of β and C L X decrease when we assume that only one of the three parameters (k, m, and n) increases and that the other two are invariant. Figure 2 is drawn to better illustrate the relationship. In all cases, the MSEs of the parameters and the lifetime performance index perform well since the values of MSEs are close to 0.
(2)
From Table 2, we conclude that, in Bayesian estimation, the MSEs of α , β , and C L X decrease when we assume that m or n increases and that the k is invariant. When m and n are invariant, the MSEs of α increase while the MSEs of β and C L X decrease as k increases. From Table 2, Table 3, Table 4, Table 5, Table 6 and Table 7, the Bayesian estimation results based on the Lindley method perform better than the Bayesian estimation based on Metropolis–Hastings method in respect of MSEs. From Table 3 and Table 4, the result of Lindley approximation under LF when ψ = 1 performs better than when ψ = 1 . From Table 5 and Table 6, the result of Lindley approximation under GELF when φ = 1 performs better than when φ = 1 . It is also concluded from Table 1, Table 2, Table 3, Table 4, Table 5, Table 6 and Table 7 that the point estimation performs better as the failure proportion m n increases when k is invariant.
(3)
In Table 8, when we set that only one of the three parameters (k, m, and n) increases and the other two are invariant, the average length (AL) of 95% asymptotic confidence/HPD credible intervals narrow down. In almost all cases, the CP of C L X reaches their prescribed confidence intervals. To conclude, it is better to apply the log-transformed MLEs than MLEs when considering the asymptotic confidence intervals.
Broadly speaking, the Bayesian estimation of parameters and the lifetime performance index is recommended in this situation.

7. Real Data Analysis

To illustrate the reliability of the simulation results using the methods discussed above, a set of real data is used here. We consider a lifetime data of 100 observations of tensile strength of carbon fibers. Reference [29] originally reported this data set which was later discussed by Reference [30]. The dataset is presented in Table 9.
In the first step, the complete data set is used for the log-logistic distribution fitting and the fitting results are compared to that of some well-informed distributions, for instance, Rayleigh distribution, inverse Weibull distribution, and generalized inverted exponential distribution (GIED). The probability density functions are f ( x ) = 2 θ e x 2 / θ , f ( x ) = α β x ( α + 1 ) e β x α , and f ( x ) = α β x 2 e β / x ( 1 e β / x ) α 1 , respectively.
Based on the MLE method, various methods can be applied to test the fitting performance of the abovementioned distributions. We consider various indicators, l n L , A I C , B I C , and Kolmogorov–Smirnov K-S statistics with p-value. l n L is estimated to be a negative log-likelihood function. A I C ( = 2 × ( p l n L ) ) is the Akaike information criterion. B I C ( = p × ln ( n ) 2 × log ( L ) ) is Bayesian information criterion, where p is the parameter value of distribution, n is sample size, and L is the maximum of l f . If log-logistic distribution fits the data well, it will have the lowest statistic values of l n L , A I C , B I C , and K-S and the highest statistic value of p-value. A graphical method in R is used to show the goodness of fitness of different distributions mentioned above. Quantile-quantile plots (Q-Q) are drawn and are showed in Figure 3. In Table 10, the values of MLEs of parameters, l n L , A I C , B I C , and K-S statistics with p-value of different distributions are shown, and it is obvious that the log-logistic distribution best fits the lifetime data. Simultaneously, the above conclusions are clearly shown in Figure 3.
Next, randomly grouping the given data into n = 50 groups with k = 2 items in each, we obtain the progressive first-failure-censored sample in Table 11.
Then, for the abovementioned progressive first-failure censored data, three different censoring schemes when set at m = 30 is applied to obtain three different censored samples. The first column in each row of Table 12 is a censored scheme, and the second column is the corresponding censored sample. We calculate the MLE and Bayes estimates of α , β , and C L X for three censoring schemes. For the Metropolis–Hastings procedure, we take M = 1000 . We also obtain 95% asymptotic confidence and HPD credible intervals for α and β . The results are listed in Table 13.

8. Optimal Censoring Plan

The point and interval estimation of unknown quantities α and β and the lifetime performance index C L X of log-logistic distribution is analysed with progressive first-failure censored data. In simulation and real data analysis, different censoring schemes have been considered. It raises the problem about how to decide the optimal censoring schemes. Many scholars and researchers—see [7,31]—have studied the criteria of comparing and analyzing different progressive and hybrid censored schemes. It is desirable in life-testing experiments to select the optimal censoring schemes from a set of censoring schemes as well as in reliability theory. Here are some evaluation criteria that we consider:
Criterion 1:
Minimum determinant of I 1 ( θ ^ ) . Under this criterion, the optimal censoring scheme for the experiment is supposed to have the minimum value of the determinant of I 1 ( θ ^ ) of MLEs.
Criterion 2:
Minimum trace I 1 ( θ ^ ) . The optimal censoring scheme is considered to have the minimum value of the trace of I 1 ( θ ^ ) of MLEs under this criterion. Without scale-invariant characteristic, criteria 1 and 2 are efficacious when lifetime distributions have one parameter.
Criterion 3:
Minimum Var [ ln T ^ p ] . Under this criterion, the optimal censoring scheme has the minimum value of ( l n T ^ p ) and the pth ( 0 < p < 1 ) quantile of the MLE logarithmic variance of log-logistic distribution can also be written as ln T p = ln α ( p 1 p ) 1 / β . We can get the approximation value of V a r ( l n T ^ p ) as [ ln T ^ p ] T [ V a r ( θ ^ ) ] [ ln T ^ p ] , where [ ln T ^ p ] T = ( ln T p α , ln T p β ) α = α ^ , β = β ^ . The results of criterion 3 hinges on the selection of p.
Criterion 4:
Minimum 0 1 Var [ ln T ^ p ] w ( p ) d p . ln T ^ p is defined in criterion 3. w ( p ) is nonnegative and satisfies 0 1 w ( p ) d p = 1 . We take w ( p ) = 1 when 0 < p < 1 .
Example : Based on the real data set analyzed in Section 7, we elaborate on how the above criteria are utilized in actual tests. p = 0.05 and p = 0.95 are two different values computed under criterion 3. The values that we calculated are shown in Table 14. Conclusions are that R 1 is the optimal scheme under criteria 3 and 4, and R 3 is optimal for criteria 1 and 2.

9. Conclusions

Our main consideration is the lifetime performance index C L , an indicator employed to evaluate the performance of a progress. In this article, different methods of estimating C L with progressive first-failure-censored data with the log-logistic distribution is discussed carefully. Both the MLE and the Bayesian estimation of α and β and the lifetime performance index C L are investigated. The main difference between MLE and the Bayes estimate is the consideration of prior distributions. The parameters are regarded as unknown variables in MLE while they are random variables following known prior distributions in Bayesian estimation. For Bayesian estimation, Lindley method and the Monte Carlo Markov Chain method are applyed to approximate the Bayes estimator under asymmetric and symmetric loss functions. Asymptotic confidence intervals are constructed based on MLEs and log-transformed MLEs applying the observed Fisher information matrix. The HPD confidence intervals are studied applying the Metropolis–Hastings algorithm with the type of random walk chain. The performances of estimations have been compared and discussed. Also, four criteria of selecting optimal censoring plan in a real life test have been considered since it is significant for a researcher to determine under certain circumstances which censoring scheme will best fit the life-testing experiment.
It is worth noting that, here, we focus on the functional time of a product, which is strongly related to manufacturers and designers and can be enhanced on aspects of innovation, technology, design improvement, and systems approaches. Refurbishment, remanufacturing, and various business models can extend product life cycles since products can have one or more use. In this way, materials can be recycled into other products so that we can better defend the environment. For more detailed information, see References [32,33].

Author Contributions

Investigation, Y.X.; Supervision, W.G. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by Project 201910004093 which was supported by National Training Program of Innovation and Entrepreneurship for Undergraduates.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Second Derivatives of l

2 l α 2 = β α 2 i = 1 m k ( R i + 1 ) i = 1 m k ( R i + 1 ) + 1 ( β 1 ) β α β 2 α β + x i β β 2 α 2 β 2 α β + x i β 2 , 2 l β 2 = m β 2 i = 1 m [ k ( R i + 1 ) + 1 ] α β log 2 ( α ) + x i β log 2 ( x i ) α β + x i β α β log ( α ) + x i β log ( x i ) 2 α β + x i β 2 , 2 l β α = 2 l α β = 1 α i = 1 m k ( R i + 1 ) i = 1 m [ k ( R i + 1 ) + 1 ] α β 1 α β + x i β + β α β 1 log ( α ) α β + x i β β α β 1 α β log ( α ) + x i β log ( x i ) α β + x i β 2 .

Appendix B. Third Derivatives of l (lij)

l 30 = 3 l ( α , β ) α 3 = 2 β α 3 i = 1 m k ( R i + 1 ) i = 1 m [ k ( R i + 1 ) + 1 ] 2 β 3 α 3 β 3 α β + x i β 3 β 2 ( 3 β 3 ) α 2 β 3 α β + x i β 2 + ( β 2 ) ( β 1 ) β α β 3 α β + x i β , l 12 = 3 l ( α , β ) α β 2 = i = 1 m [ k ( R i + 1 ) + 1 } β α β 1 log 2 ( α ) α β + x i β β α β 1 α β log 2 ( α ) + x i β log 2 ( x i ) α β + x i β 2 + 2 β α β 1 α β log ( α ) + x i β log ( x i ) 2 α β + x i β 3 + 2 α β 1 log ( α ) α β + x i β 2 β α β 1 log ( α ) α β log ( α ) + x i β log ( x i ) α β + x i β 2 2 α β 1 α β log ( α ) + x i β log ( x i ) α β + x i β 2 , l 21 = 3 l ( α , β ) α 2 β = 1 α 2 i = 1 m k ( R i + 1 ) i = 1 m [ k ( R i + 1 ) + 1 ] 2 β 2 α 2 β 2 α β log ( α ) + x i β log ( x i ) α β + x i β 3 2 β 2 α 2 β 2 log ( α ) α β + x i β 2 + ( 2 β 1 ) α β 2 α β + x i β 2 β α 2 β 2 α β + x i β 2 + ( β 1 ) β α β 2 log ( α ) α β + x i β ( β 1 ) β α β 2 α β log ( α ) + x i β log ( x i ) α β + x i β 2 , l 03 = 3 l ( α , β ) β 3 = 2 m β 3 i = 1 m [ k ( R i + 1 ) + 1 ] α β log 3 ( α ) + x i β log 3 ( x i ) α β + x i β 3 α β log 2 ( α ) + x i β log 2 ( x i ) α β log ( α ) + x i β log ( x i ) α β + x i β 2 + 2 α β log ( α ) + x i β log ( x i ) 3 α β + x i β 3 .

Appendix C. ϕi and ϕij

Appendix C.1. The Squared Error Loss Function

ϕ 1 = L X α 2 2 π csc 2 π β β π 2 csc 2 π β β 2 , ϕ 2 = M C L X N ϕ 11 = 2 L X α 3 2 π csc 2 π β β π 2 csc 2 π β β 2 , ϕ 12 = ϕ 21 = L X N α 2 2 π csc 2 π β β π 2 csc 2 π β β 2 , ϕ 22 = R 2 M N + 3 C L X N 2 S C L X 2 2 π csc 2 π β β π 2 csc 2 π β β 2 .
where
S = 2 π 4 csc 4 π β β 6 + 12 π 3 cot π β csc 2 π β β 5 6 π 2 csc 2 π β β 4 4 π 4 cot 2 π β csc 2 π β β 6 + 8 π 3 csc 3 2 π β β 5 + 8 π 3 cot 2 2 π β csc 2 π β β 5 + 4 π csc 2 π β β 3 16 π 2 cot 2 π β csc 2 π β β 4 R = π 3 csc 3 π β β 5 + π 3 cot 2 π β csc π β β 5 4 π 2 cot π β csc π β β 4 + 2 π csc π β β 3 2 π csc 2 π β β π 2 csc 2 π β β 2

Appendix C.2. The Linex Loss Function

ϕ 1 = ψ e ψ C L X L X α 2 2 π csc 2 π β β π 2 csc 2 π β β 2 , ϕ 11 = ψ 2 e ψ C L X L X 2 α 4 2 π csc 2 π β β π 2 csc 2 π β β 2 + ψ e ψ C L X 2 L X α 3 2 π csc 2 π β β π 2 csc 2 π β β 2 , ϕ 12 = ϕ 21 = e ψ C L X ψ L X N α 2 2 π csc 2 π β β π 2 csc 2 π β β 2 + L X ψ e ψ C L X α 2 2 π csc 2 π β β π 2 csc 2 π β β 2 ψ M + ψ C L X N ,
ϕ 2 = e ψ C L X ψ M + ψ C L X N ϕ 22 = e ψ C L X ψ M + ψ C L X N 2 + e ψ C L X ψ R + 2 ψ M N 3 ψ C L X N 2 + ψ C L X S 2 2 π csc 2 π β β π 2 csc 2 π β β 2

Appendix C.3. The General Entropy Loss Function

ϕ 1 = L φ C L X φ 1 α 2 2 π csc 2 π β β π 2 csc 2 π β β 2 , ϕ 11 = 2 L φ C L X φ 1 α 3 2 π csc 2 π β β π 2 csc 2 π β β 2 + L 2 ( φ + 1 ) φ C L X φ 2 α 4 2 π csc 2 π β β π 2 csc 2 π β β 2 , ϕ 12 = ϕ 21 = L φ N C L X φ 1 α 2 2 π csc 2 π β β π 2 csc 2 π β β 2 + L ( φ + 1 ) φ C L X φ 2 α 2 2 π csc 2 π β β π 2 csc 2 π β β 2 × ( M C L X N ) ϕ 2 = φ C L X φ 1 ( M C L X N ) , ϕ 22 = ( φ + 1 ) φ C L X φ 2 M C L X N 2 φ C L X φ 1 R 2 M N + 3 C L X N 2 C L X S 2 2 π csc 2 π β β π 2 csc 2 π β β 2 .

Appendix D. Complete Tables

Table A1. Bayes estimates of α , β , and C L X using the Lindley approximation method under LF when L = 1 , N = 1000 , α = 1.25 , β = 1.1 π , C L X = 0.4761017 , a1 = 5, b1 = 4, a2 = 1.1 π , b2 = 1, and ψ = 1 .
Table A1. Bayes estimates of α , β , and C L X using the Lindley approximation method under LF when L = 1 , N = 1000 , α = 1.25 , β = 1.1 π , C L X = 0.4761017 , a1 = 5, b1 = 4, a2 = 1.1 π , b2 = 1, and ψ = 1 .
knmCensoring Scheme α ^ LF β ^ LF C L X ^ LF
EVMSEEVMSEEVMSE
5030(10,0*28,10)1.26980.00953.64390.32850.46500.0072
(1*20,0*10)1.26740.01043.62520.27080.46350.0072
(1*10,0*10,1*10)1.26380.00993.65530.32770.46020.0073
40(10,0*39)1.26260.00703.60850.21830.47250.0058
(1*10,0*30)1.26050.00753.61450.21650.47090.0061
(0*39,10)1.26550.00753.61110.25270.47020.0058
7035(35,0*34)1.26370.00743.62800.24800.47400.0067
2 (1*35)1.26070.00823.64660.26400.46210.0055
(0*34,35)1.26610.00973.68380.33800.45760.0055
50((0,1)*20,1*10)1.25720.00563.55810.17040.46510.0039
(1*20,0*30)1.26290.00643.54980.14460.47010.0041
(0*30,1*20)1.26320.00553.58330.19000.47170.0042
10050(25,0*48,25)1.26230.00533.59180.19520.47060.0039
(1*50)1.26590.00633.58570.18170.47200.0033
(0*49,50)1.26400.00633.61340.22930.46590.0031
5030(10,0*28,10)1.27190.01043.66190.34460.45990.0059
(1*20,0*10)1.27330.01133.61880.27040.46240.0056
(1*10,0*10,1*10)1.26720.01063.66550.35190.45660.0059
40(10,0*39)1.25830.00723.60250.23210.46220.0050
(1*10,0*30)1.26230.00753.60730.21080.46830.0051
(0*39,10)1.26810.00723.61380.24790.46760.0044
7035(35,0*34)1.25980.00783.62540.24610.46520.0062
3 (1*35)1.27160.01023.61700.24870.46120.0052
(0*34,35)1.28490.013593.64390.33400.45770.0049
50((0,1)*20,1*10)1.26220.00653.59160.17880.46990.0037
(1*20,0*30)1.26210.00583.56290.15710.46980.0036
(0*30,1*20)1.26540.00653.57570.18930.46670.0033
10050(25,0*48,25)1.26610.007023.57540.19120.46440.0032
(1*50)1.26150.00653.57730.16250.46420.0032
(0*49,50)1.27320.00993.58500.21820.45970.0034
Table A2. Bayes estimates of α , β , and C L X using the Lindley approximation method under LF when L = 1 , N = 1000 , α = 1.25 , β = 1.1 π , C L X = 0.4761017 , a1 = 5, b1 = 4, a2 = 1.1 π , b2 = 1, and ψ = 1.
Table A2. Bayes estimates of α , β , and C L X using the Lindley approximation method under LF when L = 1 , N = 1000 , α = 1.25 , β = 1.1 π , C L X = 0.4761017 , a1 = 5, b1 = 4, a2 = 1.1 π , b2 = 1, and ψ = 1.
knmCensoring Scheme α ^ LF β ^ LF C L X ^ LF
EVMSEEVMSEEVMSE
5030(10,0*28,10)1.26100.00813.37620.24310.45630.0067
(1*20,0*10)1.25550.00853.42660.18800.45950.0063
(1*10,0*10,1*10)1.25260.00833.40540.22550.45230.0066
40(10,0*39)1.25390.00703.39970.16260.46400.0064
(1*10,0*30)1.25860.00723.40480.17380.46560.0057
(0*39,10)1.25480.00623.41680.19600.46250.0053
7035(35,0*34)1.25450.00783.40260.17400.46280.0070
2 (1*35)1.25810.00813.41220.18880.45630.0051
(0*34,35)1.25720.00843.40700.23000.44650.0064
50((0,1)*20,1*10)1.25270.00553.41330.13010.46290.0042
(1*20,0*30)1.25880.00543.42350.13130.47020.0040
(0*30,1*20)1.25360.00563.43170.14670.46380.0039
10050(25,0*48,25)1.25750.00513.41570.14790.46450.0033
(1*50)1.25750.00563.42570.13150.46420.0032
(0*49,50)1.25570.00563.43710.15460.45930.0032
5030(10,0*28,10)1.26080.00943.40060.23770.44960.0061
(1*20,0*10)1.26210.00943.40850.21940.45390.0056
(1*10,0*10,1*10)1.26240.00943.39700.22680.45080.0058
40(10,0*39)1.25180.00723.44080.18510.45990.0055
(1*10,0*30)1.26480.00683.39970.15630.46700.0046
(0*39,10)1.25920.00673.41690.20720.45790.0038
7035(35,0*34)1.25560.00723.40910.15450.46060.0053
3 (1*35)1.26360.00943.38990.17840.45170.0050
(0*34,35)1.27010.01173.38970.22740.44580.0052
50((0,1)*20,1*10)1.26120.00593.40590.12870.46470.0035
(1*20,0*30)1.25680.00553.43890.11720.46730.0035
(0*30,1*20)1.25790.00583.39780.15940.45720.0033
10050(25,0*48,25)1.25730.00613.41850.16160.45660.0031
(1*50)1.25970.00663.4260.14310.45990.0032
(0*49,50)1.26200.00803.4160.16040.45340.0033
Table A3. Bayes estimates of α , β , and C L X using the Lindley approximation method under GELF when L = 1 , N = 1000 , α = 1.25 , β = 1.1 π , C L X = 0.4761017 , a1 = 5, b1 = 4, a2 = 1.1 π , b2 = 1, and φ = 1 .
Table A3. Bayes estimates of α , β , and C L X using the Lindley approximation method under GELF when L = 1 , N = 1000 , α = 1.25 , β = 1.1 π , C L X = 0.4761017 , a1 = 5, b1 = 4, a2 = 1.1 π , b2 = 1, and φ = 1 .
knmCensoring Scheme α ^ GELF β ^ GELF C L X ^ GELF
EVMSEEVMSEEVMSE
5030(10,0*28,10)1.26500.00863.50130.26750.45420.0073
(1*20,0*10)1.26190.00963.50380.22300.45210.0075
(1*10,0*10,1*10)1.26440.00853.53040.24730.45720.0065
40(10,0*39)1.25530.00683.51030.17610.46320.0065
(1*10,0*30)1.25740.00773.47750.17400.45870.0067
(0*39,10)1.26180.00643.50010.21530.46300.0058
7035(35,0*34)1.25930.00823.50160.19500.45980.0070
2 (1*35)1.26020.00813.51870.20080.45400.0052
(0*34,35)1.27390.00953.50540.24960.45340.0054
50((0,1)*20,1*10)1.25960.00553.49220.15180.46490.0039
(1*20,0*30)1.25740.00593.48040.12260.46360.0043
(0*30,1*20)1.25870.00553.49520.15880.46390.0041
10050(25,0*48,25)1.25390.00493.51560.17290.46010.0039
(1*50)1.26100.00573.46820.13790.46030.0037
(0*49,50)1.26160.00713.50320.19180.45460.0038
5030(10,0*28,10)1.26540.01023.54050.27590.44910.0067
(1*20,0*10)1.26900.01043.51340.21230.45380.0064
(1*10,0*10,1*10)1.26420.01043.50860.23100.44590.0066
40(10,0*39)1.25510.00683.51440.17020.45870.0050
(1*10,0*30)1.25690.00663.50130.18360.45720.0051
(0*39,10)1.26200.00683.49720.20240.45580.0045
7035(35,0*34)1.26240.00813.49150.18460.45830.0057
3 (1*35)1.26730.01043.50760.21200.44940.0052
(0*34,35)1.27740.01233.50150.24660.44280.0055
50((0,1)*20,1*10)1.25820.00593.48490.14670.45860.0036
(1*20,0*30)1.25850.00553.51610.13150.46640.0036
(0*30,1*20)1.26000.00673.50500.18510.45700.0036
10050(25,0*48,25)1.26440.00683.49090.14820.45910.0033
(1*50)1.26230.00703.50240.16580.45750.0034
(0*49,50)1.26630.00823.51590.17800.45340.0036
Table A4. Bayes estimates of α , β , and C L X using the Lindley approximation method under GELF when L = 1 , N = 1000 , α = 1.25 , β = 1.1 π , C L X = 0.4761017 , a1 = 5, b1 = 4, a2 = 1.1 π , b2 = 1, and φ = 0.8 .
Table A4. Bayes estimates of α , β , and C L X using the Lindley approximation method under GELF when L = 1 , N = 1000 , α = 1.25 , β = 1.1 π , C L X = 0.4761017 , a1 = 5, b1 = 4, a2 = 1.1 π , b2 = 1, and φ = 0.8 .
knmCensoring Scheme α ^ GELF β ^ GELF C L X ^ GELF
EVMSEEVMSEEVMSE
5030(10,0*28,10)1.20970.00652.67480.68930.52730.0083
(1*20,0*10)1.20860.00712.70040.64710.52910.0091
(1*10,0*10,1*10)1.20980.00692.68630.66610.52810.0089
40(10,0*39)1.20060.00602.69510.63880.53510.0086
(1*10,0*30)1.20240.00622.70560.62570.53700.0088
(0*39,10)1.20610.00542.69080.65710.53760.0085
7035(35,0*34)1.20410.00652.68540.65560.53240.0087
2 (1*35)1.20970.00622.69920.64820.53100.0076
(0*34,35)1.21380.00642.69120.66370.52570.0073
50((0,1)*20,1*10)1.20490.00522.69730.62280.54100.0076
(1*20,0*30)1.20230.00562.69070.63290.53700.0073
(0*30,1*20)1.20150.00542.70520.62130.53740.0073
10050(25,0*48,25)1.20440.00502.68790.64470.53580.0067
(1*50)1.20280.00552.70090.62400.53420.0063
(0*49,50)1.20420.00592.70250.62820.52950.0060
5030(10,0*28,10)1.21790.00642.68920.66420.52940.0077
(1*20,0*10)1.20830.00752.70180.63830.52310.0077
(1*10,0*10,1*10)1.21430.00742.68120.67760.52100.0069
40(10,0*39)1.20340.00622.69220.64790.53100.0073
(1*10,0*30)1.20860.00572.69300.64120.53560.0074
(0*39,10)1.20730.00632.68060.67280.52610.0061
7035(35,0*34)1.20300.00632.69580.63960.52890.0074
3 (1*35)1.21200.00712.69650.64380.52430.0062
(0*34,35)1.21940.00752.68950.66330.51710.0062
50((0,1)*20,1*10)1.20460.00532.70110.61610.53740.0066
(1*20,0*30)1.20420.00542.69850.61840.53760.0066
(0*30,1*20)1.20770.00512.69200.63610.53510.0061
10050(25,0*48,25)1.20550.00552.70530.62350.53200.0059
(1*50)1.20980.00532.68850.63870.53420.0060
(0*49,50)1.21390.00612.68110.66280.52470.0052
Table A5. Bayes estimates of α , β , and C L X using the Metropolis–Hastings method when L = 1 , N = 1000 , α = 1.25 , β = 1.1 π , C L = 0.4761017 , a1 = 5, b1 = 4, a2 = 1.1 π , and b2 = 1.
Table A5. Bayes estimates of α , β , and C L X using the Metropolis–Hastings method when L = 1 , N = 1000 , α = 1.25 , β = 1.1 π , C L = 0.4761017 , a1 = 5, b1 = 4, a2 = 1.1 π , and b2 = 1.
knmCensoring Scheme α ^ MH β ^ MH C L X ^ MH
EVMSEEVMSEEVMSE
5030(10,0*28,10)1.26540.01133.58990.38770.47150.0089
(1*20,0*10)1.27170.01233.57460.29590.47500.0083
(1*10,0*10,1*10)1.25960.01333.60230.32870.46680.0101
40(10,0*39)1.26660.01143.55910.29930.47610.0091
(1*10,0*30)1.25230.00933.61250.31010.47140.0079
(0*39,10)1.26680.01003.58130.27860.47830.0063
7035(35,0*34)1.25780.01233.56660.27940.46810.0102
2 (1*35)1.26060.01033.58860.30600.46690.0062
(0*34,35)1.27720.01363.56380.36360.46720.0063
50((0,1)*20,1*10)1.25450.00813.57430.21660.47300.0062
(1*20,0*30)1.26160.00753.56890.20040.47930.0057
(0*30,1*20)1.25690.00753.57070.24470.47330.0056
10050(25,0*48,25)1.26880.00843.51090.20820.47420.0054
(1*50)1.25840.00773.59340.24050.47340.0044
(0*49,50)1.26740.00903.55660.23050.47230.0039
5030(10,0*28,10)1.27880.01393.57770.34620.47310.0066
(1*20,0*10)1.27470.01503.58180.28700.47250.0072
(1*10,0*10,1*10)1.27370.01463.56940.33540.46510.0069
40(10,0*39)1.26360.01043.57970.27530.47250.0064
(1*10,0*30)1.25810.00953.62850.30610.47420.0072
(0*39,10)1.27050.01123.55690.28950.47150.0060
7035(35,0*34)1.26840.01043.59950.27980.48070.0073
3 (1*35)1.27390.01473.57130.26520.46780.0060
(0*34,35)1.29990.02063.53050.34390.46900.0057
50((0,1)*20,1*10)1.25750.00833.59330.23020.47230.0046
(1*20,0*30)1.25510.00853.60300.20460.47310.0052
(0*30,1*20)1.26900.00973.57330.25350.47540.0039
10050(25,0*48,25)1.27290.01043.57490.23370.47730.0037
(1*50)1.26270.00903.61190.21650.47710.0044
(0*49,50)1.27230.01253.62930.29230.47330.0038
Table A6. AL and CP of 95% asymptotic confidence/HPD credible intervals for the lifetime performance index C L X when α = 1.25 , β = 1.1 π , and M = 1000.
Table A6. AL and CP of 95% asymptotic confidence/HPD credible intervals for the lifetime performance index C L X when α = 1.25 , β = 1.1 π , and M = 1000.
knmCensoring Scheme C L X ^ MLE C L X ^ log . MLE C L X ^ MH
ALCPALCPALCP
5030(10,0*28,10)0.32590.9500.34220.9660.33460.950
(1*20,0*10)0.32710.9560.33640.9620.33370.950
(1*10,0*10,1*10)0.32100.9800.33030.9780.32530.974
40(10,0*39)0.31080.9420.31710.9660.31380.940
(1*10,0*30)0.30370.9460.30970.9500.30530.924
(0*39,10)0.28590.9600.29080.9700.29200.960
7035(35,0*34)0.32820.9600.33590.9680.33180.944
2 (1*35)0.28520.9760.29110.9780.28970.960
(0*34,35)0.28320.9720.29240.9880.29090.934
50((0,1)*20,1*10)0.25050.9520.25370.9640.25320.936
(1*20,0*30)0.25880.9620.26240.9640.26190.960
(0*30,1*20)0.24260.9640.24560.9760.24650.950
10050(25,0*48,25)0.23390.9540.23660.9740.23750.944
(1*50)0.22910.9680.23210.9840.23290.950
(0*49,50)0.22660.9580.22990.9640.23390.946
5030(10,0*28,10)0.27500.9720.27960.9800.27900.952
(1*20,0*10)0.27130.9480.27800.9500.27540.934
(1*10,0*10,1*10)0.25590.9540.26010.9640.26480.940
40(10,0*39)0.27390.9600.27850.9700.27770.950
(1*10,0*30)0.27080.9520.27570.9700.27430.934
(0*39,10)0.26160.9400.26660.9640.26760.928
7035(35,0*34)0.29210.9560.29820.9600.29670.932
3 (1*35)0.27790.9700.28570.9740.28160.942
(0*34,35)0.29420.9920.30980.9900.30040.948
50((0,1)*20,1*10)0.23150.9580.23450.9760.23300.948
(1*20,0*30)0.23500.9620.23790.9640.23590.950
(0*30,1*20)0.22590.9600.22900.9840.22930.948
10050(25,0*48,25)0.22330.9820.22620.9800.22740.962
(1*50)0.22500.9620.23010.9880.22590.946
(0*49,50)0.23640.9680.24810.9820.23650.938

References

  1. Cooper, T. Longer Lasting Products: Alternatives to the Throwaway Society; CRC Press: Boca Raton, FL, USA, 2016. [Google Scholar]
  2. Ertz, M.; Leblanc-Proulx, S.; Sarigllü, E.; Morin, V. Advancing quantitative rigor in the circular economy literature: New methodology for product lifetime extension business models. Resour. Conserv. Recycl. 2019, 150, 1–12. [Google Scholar] [CrossRef]
  3. Montgomery, D.C. Introduction to Statistical Quality Control; John Wiley & Sons: Hoboken, NJ, USA, 1991. [Google Scholar]
  4. Wu, J.W.; Lee, H.M.; Lei, C.L. Computational testing algorithmic procedure of assessment for lifetime performance index of products with two-parameter exponential distribution. Appl. Math. Comput. 2007, 190, 116–125. [Google Scholar] [CrossRef]
  5. Lee, W.C.; Wu, J.W.; Hong, C.W. Assessing the Lifetime Performance Index of Products with the Exponential Distribution under Progressively Type II Right Censored Samples; Elsevier Science: Amsterdam, The Netherlands, 2009. [Google Scholar]
  6. Lee, H.M.; Wu, J.W.; Lei, C.L.; Hung, W.L. Implementing lifetime performance index of products with two-parameter exponential distribution. Int. J. Syst. Sci. 2011, 42, 1305–1321. [Google Scholar] [CrossRef]
  7. Sultan, K.; Alsadat, N.; Kundu, D. Bayesian and maximum likelihood estimations of the inverse Weibull parameters under progressive type-II censoring. J. Stat. Comput. Simul. 2014, 84, 2248–2265. [Google Scholar] [CrossRef]
  8. Lee, K.; Cho, Y. Bayesian and maximum likelihood estimations of the inverted exponentiated half logistic distribution under progressive Type II censoring. J. Appl. Stat. 2016, 44, 811–832. [Google Scholar] [CrossRef]
  9. Cohen, A.C. Progressively Censored Samples in Life Testing. Technometrics 1963, 5, 327–339. [Google Scholar] [CrossRef]
  10. Mohammed, H.S. Statistical inferences based on an adaptive progressive type-II censoring from exponentiated exponential distribution. J. Egypt. Math. Soc. 2017, 25, 393–399. [Google Scholar]
  11. Balakrishnan, N.; Aggarwala, R. Progressive Censoring: Theory, Methods, and Applications; Birkhäuser: Boston, MA, USA, 2000. [Google Scholar]
  12. Johnson, L.G. Theory And Technique Of Variation Research; Elsevier Pub. Co.: Amsterdam, The Netherlands, 1964. [Google Scholar]
  13. Wu, S.J.; Kuş, C. On estimation based on progressive first-failure-censored sampling. Comput. Stat. Data Anal. 2009, 53, 3659–3670. [Google Scholar] [CrossRef]
  14. Ahmed, E.A. Estimation and prediction for the generalized inverted exponential distribution based on progressively first-failure-censored data with application. J. Appl. Stat. 2017, 44, 1576–1608. [Google Scholar] [CrossRef]
  15. Madhulika, D.; Renu, G.; Hare, K. On progressively first failure censored Lindley distribution. Comput. Stat. 2016, 31, 139–163. [Google Scholar]
  16. Soliman, A.A.; Abd-Ellah, A.H.; Abou-Elheggag, N.A.; Abd-Elmougod, G.A. Estimation of the parameters of life for Gompertz distribution using progressive first-failure censored data. Comput. Stat. Data Anal. 2012, 56, 2471–2485. [Google Scholar] [CrossRef]
  17. Ahmadi, M.V.; Doostparast, M.; Ahmadi, J. Estimating the lifetime performance index with Weibull distribution based on progressive first-failure censoring scheme. J. Comput. Appl. Math. 2013, 239, 93–102. [Google Scholar] [CrossRef]
  18. Madhulika, D.; Hare, K.; Renu, G. Generalized inverted exponential distribution under progressive first-failure censoring. J. Stat. Comput. Simul. 2016, 86, 1095–1114. [Google Scholar]
  19. Ahmed, A.; Soliman, M.M.A.S. Bayesian MCMC inference for the Gompertz distribution based on progressive first-failure censoring data. AIP Conf. Proc. 2015, 1643, 125–134. [Google Scholar]
  20. Ahmadi, M.V.; Doostparast, M. Pareto analysis for the lifetime performance index of products on the basis of progressively first-failure-censored batches under balanced symmetric and asymmetric loss functions. J. Appl. Stat. 2019, 46, 1196–1227. [Google Scholar] [CrossRef]
  21. Akhtar, M.T.; Khan, A.A.; Akhtar, M.T.; Khan, A.A. Log-logistic Distribution as a Reliability Model: A Bayesian Analysis. Am. J. Math. Stat. 2014, 4, 162–170. [Google Scholar]
  22. Al-Shomrani, A.A.; Shawky, A.I.; Arif, O.H.; Aslam, M. Log-logistic distribution for survival data analysis using MCMC. Springerplus 2016, 5, 1774. [Google Scholar] [CrossRef] [Green Version]
  23. Lesitha, G.P.Y.T. Estimation of the scale parameter of a log-logistic distribution. Metrika 2013, 76, 427–448. [Google Scholar] [CrossRef]
  24. William, Q.; Meeker; Luis, A. Escobar Statistical Methods for Reliability Data. Technometrics 1998, 40, 254–256. [Google Scholar]
  25. Lindley, D.V. Approximate Bayesian methods. Trab. Estad. Y Investig. Oper. 1980, 31, 223–245. [Google Scholar] [CrossRef]
  26. Nassar, M.; Abo-Kasem, O.; Zhang, C.; Dey, S. Analysis of Weibull Distribution Under Adaptive Type-II Progressive Hybrid Censoring Scheme. J. Ind. Soc. Probab. Stat. 2018, 19, 25–65. [Google Scholar] [CrossRef]
  27. Albert, J.; Chopin, N. Bayesian computation with R. Stat. Comput. 2009, 19, 111–112. [Google Scholar]
  28. Balakrishnan, N.; Sandhu, R.A. A Simple Simulational Algorithm for Generating Progressive Type-II Censored Samples. Am. Stat. 1995, 49, 229–230. [Google Scholar]
  29. Nichols, M.D.; Padgett, W.J. A Bootstrap Control Chart for Weibull Percentiles. Qual. Reliab. Eng. 2006, 22, 141–151. [Google Scholar] [CrossRef]
  30. Mohammed, H.S.; Ateya, S.F.; AL-Hussaini, E.K. Estimation based on progressive first-failure censoring from exponentiated exponential distribution. J. Appl. Stat. 2017, 44, 1479–1494. [Google Scholar] [CrossRef]
  31. Pradhan, B.; Kundu, D. On progressively censored generalized exponential distribution. Test 2009, 18, 497–515. [Google Scholar] [CrossRef]
  32. Den Hollander, M.C.; Bakker, C.A.; Hultink, E.J. Product Design in a Circular Economy: Development of a Typology of Key Concepts and Terms. J. Ind. Ecol. 2017, 21, 517–525. [Google Scholar] [CrossRef]
  33. Ertz, M.; Leblanc-Proulx, S.; Sarigollu, E.; Morin, V. Made to break? A taxonomy of business models on product lifetime extension. J. Clean. Prod. 2019, 234, 867–880. [Google Scholar] [CrossRef]
Figure 1. The hazard rate function.
Figure 1. The hazard rate function.
Symmetry 12 00937 g001
Figure 2. MSEs of C L X in Table 1 when k = 2.
Figure 2. MSEs of C L X in Table 1 when k = 2.
Symmetry 12 00937 g002
Figure 3. Q-Q plots.
Figure 3. Q-Q plots.
Symmetry 12 00937 g003
Table 1. Maximum Likelihood Estimations (MLEs) of α , β , and C L when L = 1 , N = 1000 , α = 1.25 , β = 1.1 π , and C L = 0.4761017 .
Table 1. Maximum Likelihood Estimations (MLEs) of α , β , and C L when L = 1 , N = 1000 , α = 1.25 , β = 1.1 π , and C L = 0.4761017 .
knmCensoring Scheme α ^ ML β ^ ML C L ^ ML
EV 1 MSE 2 EVMSEEVMSE
5030(10,0*28,10)1.24400.00913.62030.35790.46560.0079
(1*20,0*10)1.24140.00983.60270.30140.46200.0076
(1*10,0*10,1*10)1.23690.00873.61180.33050.45930.0072
40(10,0*39)1.24760.00683.55850.21270.47300.0062
(1*10,0*30)1.24800.00733.54540.21450.47070.0064
(0*39,10)1.24400.00653.60120.28830.47040.0057
7035(35,0*34)1.24480.00813.55080.25030.46590.0072
2 (1*35)1.24530.00833.58790.26410.46540.0059
(0*34,35)1.24480.00893.60550.36150.46060.0057
50((0,1)*20,1*10)1.24770.00563.53540.16250.47160.0045
(1*20,0*30)1.24720.00623.53100.15310.47050.0048
(0*30,1*20)1.24430.00573.55730.19980.46840.0042
10050(25,0*48,25)1.24720.00583.54710.20070.46850.0036
(1*50)1.24520.00533.55790.18290.46900.0034
(0*49,50)1.23950.00653.59430.23950.46360.0036
5030(10,0*28,10)1.23600.00983.64290.37700.45580.0066
(1*20,0*10)1.24420.00953.58690.26680.46320.0063
(1*10,0*10,1*10)1.23980.01043.61820.34410.45650.0066
40(10,0*39)1.24230.00703.55800.22060.46480.0054
(1*10,0*30)1.24580.00693.54820.18080.46790.0048
(0*39,10)1.24230.00733.57720.26330.46300.0047
7035(35,0*34)1.24280.00773.56700.24480.46470.0057
3 (1*35)1.23850.00963.60740.27440.45660.0055
(0*34,35)1.23670.01333.62840.36160.44570.0071
50((0,1)*20,1*10)1.24210.00613.54980.16400.46510.0037
(1*20,0*30)1.24940.00633.53040.15490.47050.0041
(0*30,1*20)1.23840.00593.58760.21180.46350.0034
10050(25,0*48,25)1.24050.00693.56500.21840.45960.0038
(1*50)1.24020.00703.54600.17380.45900.0039
(0*49,50)1.24120.00803.56780.22860.45720.0037
1 EV means the expected values; 2 MSE means the mean square error.
Table 2. Bayes estimates of α , β , and C L X using the Lindley approximation method under squared error loss function (SELF) when L = 1 , N = 1000 , α = 1.25 , β = 1.1 π , C L X = 0.4761017 , a1 = 5, b1 = 4, a2 = 1.1 π , and b2 = 1.
Table 2. Bayes estimates of α , β , and C L X using the Lindley approximation method under squared error loss function (SELF) when L = 1 , N = 1000 , α = 1.25 , β = 1.1 π , C L X = 0.4761017 , a1 = 5, b1 = 4, a2 = 1.1 π , and b2 = 1.
knmCensoring Scheme α ^ SELF β ^ SELF C L X ^ SELF
EVMSEEVMSEEVMSE
5030(10,0*28,10)1.26510.00893.49240.24120.57150.0200
(1*20,0*10)1.25950.00983.52470.23800.55950.0172
(1*10,0*10,1*10)1.26250.00953.50650.24210.56530.0185
40(10,0*39)1.25340.00693.51710.17540.53690.0117
(1*10,0*30)1.26060.00783.50590.20480.53790.0118
(0*39,10)1.26160.00663.50340.20060.55030.0132
7035(35,0*34)1.26430.00793.50230.18410.54880.0147
2 (1*35)1.26200.00873.51250.20790.55310.0126
(0*34,35)1.26430.00903.52260.24640.58020.0183
50((0,1)*20,1*10)1.25480.00563.50190.14640.52640.0081
(1*20,0*30)1.25580.00513.49500.12970.52360.0070
(0*30,1*20)1.25720.00523.50590.16230.53430.0083
10050(25,0*48,25)1.25640.00493.49980.16550.53260.0076
(1*50)1.25710.00593.50920.14940.52880.0070
(0*49,50)1.26230.00613.50180.17990.54700.0088
5030(10,0*28,10)1.26580.01023.51510.27100.57650.0182
(1*20,0*10)1.26290.00993.50830.22720.55780.0145
(1*10,0*10,1*10)1.26680.01073.52540.26230.57350.0179
40(10,0*39)1.25830.00693.50510.17900.53900.0103
(1*10,0*30)1.2580.00683.4880.16710.53500.0097
(0*39,10)1.25860.00683.52190.19440.55300.0120
7035(35,0*34)1.26100.00823.50650.20210.54270.0117
3 (1*35)1.26760.01013.50500.21410.55750.0124
(0*34,35)1.27520.01353.51420.25240.58910.0186
50((0,1)*20,1*10)1.26300.00613.47800.14490.52830.0069
(1*20,0*30)1.25880.00573.50380.12330.52570.0064
(0*30,1*20)1.26390.00623.48990.15930.53770.0075
10050(25,0*48,25)1.26320.00653.49920.14430.54120.0080
(1*50)1.26280.00653.48400.15160.53020.0063
(0*49,50)1.26670.00813.49910.18520.55210.0091
Table 3. Bayes estimates of α , β , and C L X using the Lindley approximation method under linex loss function (LF) when L = 1 , N = 1000 , α = 1.2 , β = 1.1 π , C L X = 0.4761017 , a1 = 5, b1 = 4, a2 = 1.1 π , b2 = 1, and ψ = 1 .
Table 3. Bayes estimates of α , β , and C L X using the Lindley approximation method under linex loss function (LF) when L = 1 , N = 1000 , α = 1.2 , β = 1.1 π , C L X = 0.4761017 , a1 = 5, b1 = 4, a2 = 1.1 π , b2 = 1, and ψ = 1 .
knmCensoring Scheme α ^ LF β ^ LF C L X ^ LF
EVMSEEVMSEEVMSE
5030(10,0*28,10)1.26980.00953.64390.32850.46500.0072
(1*20,0*10)1.26740.01043.62520.27080.46350.0072
(1*10,0*10,1*10)1.26380.00993.65530.32770.46020.0073
40(10,0*39)1.26260.00703.60850.21830.47250.0058
(1*10,0*30)1.26050.00753.61450.21650.47090.0061
(0*39,10)1.26550.00753.61110.25270.47020.0058
7035(35,0*34)1.26370.00743.62800.24800.47400.0067
2 (1*35)1.26070.00823.64660.26400.46210.0055
(0*34,35)1.26610.00973.68380.33800.45760.0055
50((0,1)*20,1*10)1.25720.00563.55810.17040.46510.0039
(1*20,0*30)1.26290.00643.54980.14460.47010.0041
(0*30,1*20)1.26320.00553.58330.19000.47170.0042
10050(25,0*48,25)1.26230.00533.59180.19520.47060.0039
(1*50)1.26590.00633.58570.18170.47200.0033
(0*49,50)1.26400.00633.61340.22930.46590.0031
Table 4. Bayes estimates of α , β , and C L X using the Lindley approximation method under LF when L = 1 , N = 1000 , α = 1.25 , β = 1.1 π , C L X = 0.4761017 , a1 = 5, b1 = 4, a2 = 1.1 π , b2 = 1, and ψ = 1.
Table 4. Bayes estimates of α , β , and C L X using the Lindley approximation method under LF when L = 1 , N = 1000 , α = 1.25 , β = 1.1 π , C L X = 0.4761017 , a1 = 5, b1 = 4, a2 = 1.1 π , b2 = 1, and ψ = 1.
knmCensoring Scheme α ^ LF β ^ LF C L X ^ LF
EVMSEEVMSEEVMSE
5030(10,0*28,10)1.26100.00813.37620.24310.45630.0067
(1*20,0*10)1.25550.00853.42660.18800.45950.0063
(1*10,0*10,1*10)1.25260.00833.40540.22550.45230.0066
40(10,0*39)1.25390.00703.39970.16260.46400.0064
(1*10,0*30)1.25860.00723.40480.17380.46560.0057
(0*39,10)1.25480.00623.41680.19600.46250.0053
7035(35,0*34)1.25450.00783.40260.17400.46280.0070
2 (1*35)1.25810.00813.41220.18880.45630.0051
(0*34,35)1.25720.00843.40700.23000.44650.0064
50((0,1)*20,1*10)1.25270.00553.41330.13010.46290.0042
(1*20,0*30)1.25880.00543.42350.13130.47020.0040
(0*30,1*20)1.25360.00563.43170.14670.46380.0039
10050(25,0*48,25)1.25750.00513.41570.14790.46450.0033
(1*50)1.25750.00563.42570.13150.46420.0032
(0*49,50)1.25570.00563.43710.15460.45930.0032
Table 5. Bayes estimates of α , β , and C L X using the Lindley approximation method under general entropy loss function (GELF) when L = 1 , N = 1000 , α = 1.25 , β = 1.1 π , C L X = 0.4761017 , a1 = 5, b1 = 4, a2 = 1.1 π , b2 = 1, and φ = 1 .
Table 5. Bayes estimates of α , β , and C L X using the Lindley approximation method under general entropy loss function (GELF) when L = 1 , N = 1000 , α = 1.25 , β = 1.1 π , C L X = 0.4761017 , a1 = 5, b1 = 4, a2 = 1.1 π , b2 = 1, and φ = 1 .
knmCensoring Scheme α ^ GELF β ^ GELF C L X ^ GELF
EVMSEEVMSEEVMSE
5030(10,0*28,10)1.26500.00863.50130.26750.45420.0073
(1*20,0*10)1.26190.00963.50380.22300.45210.0075
(1*10,0*10,1*10)1.26440.00853.53040.24730.45720.0065
40(10,0*39)1.25530.00683.51030.17610.46320.0065
(1*10,0*30)1.25740.00773.47750.17400.45870.0067
(0*39,10)1.26180.00643.50010.21530.46300.0058
7035(35,0*34)1.25930.00823.50160.19500.45980.0070
2 (1*35)1.26020.00813.51870.20080.45400.0052
(0*34,35)1.27390.00953.50540.24960.45340.0054
50((0,1)*20,1*10)1.25960.00553.49220.15180.46490.0039
(1*20,0*30)1.25740.00593.48040.12260.46360.0043
(0*30,1*20)1.25870.00553.49520.15880.46390.0041
10050(25,0*48,25)1.25390.00493.51560.17290.46010.0039
(1*50)1.26100.00573.46820.13790.46030.0037
(0*49,50)1.26160.00713.50320.19180.45460.0038
Table 6. Bayes estimates of α , β , and C L X using the Lindley approximation method under GELF when L = 1 , N = 1000 , α = 1.25 , β = 1.1 π , C L X = 0.4761017 , a1 = 5, b1 = 4, a2 = 1.1 π , b2 = 1, and φ = 0.8 .
Table 6. Bayes estimates of α , β , and C L X using the Lindley approximation method under GELF when L = 1 , N = 1000 , α = 1.25 , β = 1.1 π , C L X = 0.4761017 , a1 = 5, b1 = 4, a2 = 1.1 π , b2 = 1, and φ = 0.8 .
knmCensoring Scheme α ^ GELF β ^ GELF C L X ^ GELF
EVMSEEVMSEEVMSE
5030(10,0*28,10)1.20970.00652.67480.68930.52730.0083
(1*20,0*10)1.20860.00712.70040.64710.52910.0091
(1*10,0*10,1*10)1.20980.00692.68630.66610.52810.0089
40(10,0*39)1.20060.00602.69510.63880.53510.0086
(1*10,0*30)1.20240.00622.70560.62570.53700.0088
(0*39,10)1.20610.00542.69080.65710.53760.0085
7035(35,0*34)1.20410.00652.68540.65560.53240.0087
2 (1*35)1.20970.00622.69920.64820.53100.0076
(0*34,35)1.21380.00642.69120.66370.52570.0073
50((0,1)*20,1*10)1.20490.00522.69730.62280.54100.0076
(1*20,0*30)1.20230.00562.69070.63290.53700.0073
(0*30,1*20)1.20150.00542.70520.62130.53740.0073
10050(25,0*48,25)1.20440.00502.68790.64470.53580.0067
(1*50)1.20280.00552.70090.62400.53420.0063
(0*49,50)1.20420.00592.70250.62820.52950.0060
Table 7. Bayes estimates of α , β , and C L X using the Metropolis–Hastings method when L = 1 , N = 1000 , α = 1.25 , β = 1.1 π , C L = 0.4761017 , a1 = 5, b1 = 4, a2 = 1.1 π , and b2 = 1.
Table 7. Bayes estimates of α , β , and C L X using the Metropolis–Hastings method when L = 1 , N = 1000 , α = 1.25 , β = 1.1 π , C L = 0.4761017 , a1 = 5, b1 = 4, a2 = 1.1 π , and b2 = 1.
knmCensoring Scheme α ^ MH β ^ MH C L X ^ MH
EVMSEEVMSEEVMSE
5030(10,0*28,10)1.26540.01133.58990.38770.47150.0089
(1*20,0*10)1.27170.01233.57460.29590.47500.0083
(1*10,0*10,1*10)1.25960.01333.60230.32870.46680.0101
40(10,0*39)1.26660.01143.55910.29930.47610.0091
(1*10,0*30)1.25230.00933.61250.31010.47140.0079
(0*39,10)1.26680.01003.58130.27860.47830.0063
7035(35,0*34)1.25780.01233.56660.27940.46810.0102
2 (1*35)1.26060.01033.58860.30600.46690.0062
(0*34,35)1.27720.01363.56380.36360.46720.0063
50((0,1)*20,1*10)1.25450.00813.57430.21660.47300.0062
(1*20,0*30)1.26160.00753.56890.20040.47930.0057
(0*30,1*20)1.25690.00753.57070.24470.47330.0056
10050(25,0*48,25)1.26880.00843.51090.20820.47420.0054
(1*50)1.25840.00773.59340.24050.47340.0044
(0*49,50)1.26740.00903.55660.23050.47230.0039
Table 8. Average length (AL) and coverage probability (CP) of 95% asymptotic confidence/Higher Posterior Density (HPD) credible intervals for the lifetime performance index C L X when α = 1.25 , β = 1.1 π , and M = 1000.
Table 8. Average length (AL) and coverage probability (CP) of 95% asymptotic confidence/Higher Posterior Density (HPD) credible intervals for the lifetime performance index C L X when α = 1.25 , β = 1.1 π , and M = 1000.
knmCensoring Scheme C L X ^ MLE C L X ^ log . MLE C L X ^ MH
ALCPALCPALCP
5030(10,0*28,10)0.32590.9500.34220.9660.33460.950
(1*20,0*10)0.32710.9560.33640.9620.33370.950
(1*10,0*10,1*10)0.32100.9800.33030.9780.32530.974
40(10,0*39)0.31080.9420.31710.9660.31380.940
(1*10,0*30)0.30370.9460.30970.9500.30530.924
(0*39,10)0.28590.9600.29080.9700.29200.960
7035(35,0*34)0.32820.9600.33590.9680.33180.944
2 (1*35)0.28520.9760.29110.9780.28970.960
(0*34,35)0.28320.9720.29240.9880.29090.934
50((0,1)*20,1*10)0.25050.9520.25370.9640.25320.936
(1*20,0*30)0.25880.9620.26240.9640.26190.960
(0*30,1*20)0.24260.9640.24560.9760.24650.950
10050(25,0*48,25)0.23390.9540.23660.9740.23750.944
(1*50)0.22910.9680.23210.9840.23290.950
(0*49,50)0.22660.9580.22990.9640.23390.946
Table 9. Real data set of breaking stress of carbon fibers (GPa).
Table 9. Real data set of breaking stress of carbon fibers (GPa).
3.703.114.423.283.752.963.393.313.152.811.412.763.191.592.173.51
1.841.611.571.892.743.272.413.092.432.532.813.312.352.772.684.91
1.572.001.172.170.392.791.082.882.732.873.191.872.952.674.202.85
2.552.172.973.680.811.225.081.693.684.702.032.822.501.473.223.15
2.972.933.332.562.592.831.361.845.561.122.481.252.482.031.612.05
3.603.111.694.903.393.222.553.562.381.920.981.591.731.711.184.38
0.851.802.123.65
Table 10. Fitting result.
Table 10. Fitting result.
DistributionMLEs-lnLAICBICK-Sp-Value
Rayleigh θ ^ = 7.8258 149.0086300.0172302.62240.14020.039263
Inverse Weibull α ^ = 1.7738 172.4966348.9931354.20350.17610.004038
β ^ = 3.0856
GIED α ^ = 9.1967 150.4161304.8322310.04260.13300.058198
β ^ = 6.2141
Log-logistic α ^ = 2.490 145.3980294.7960300.00640.08600.449972
β ^ = 4.1455
Table 11. Progressive first-failure-censored data of breaking stress of carbon fibers (GPa).
Table 11. Progressive first-failure-censored data of breaking stress of carbon fibers (GPa).
0.390.810.850.981.081.121.171.181.251.361.411.471.571.571.591.59
1.611.691.691.711.731.801.841.841.891.922.002.032.052.172.352.41
2.482.502.532.552.592.742.822.882.952.972.973.193.193.273.283.31
3.603.75
Table 12. The MLEs and Bayes estimates of α , β , and C L X of a real data set.
Table 12. The MLEs and Bayes estimates of α , β , and C L X of a real data set.
Censoring Scheme R 1 R 2 R 3
α ^ M L 3.0026 ( 2.7037,3.3014)2.8616 (2.4917,3.2315)2.5402 (2.1406,2.9398)
β ^ M L 5.1557 (3.6353,6.6761)3.9363 (2.7578,5.1148)3.3795 (2.31100,4.4480)
C L X ^ M L 1.80211.28540.9945
α ^ S E L F 3.02412.90382.5987
β ^ S E L F 5.04123.84033.2878
C L X ^ S E L F 2.35271.50381.1405
α ^ M H 2.9774 (2.1088,3.1307)2.9453 (2.1960,3.1280)2.4499 (2.0829,2.6401)
β ^ M H 4.6815 (3.6730,5.7100)3.6493 (3.1578,4.9303)3.7345 (3.2811,4.5882)
C L X ^ M H 1.60241.17781.1097
Table 13. Different progressive first-failure censored samples of various censored scheme when k = 2 , n = 50 , and m = 30 .
Table 13. Different progressive first-failure censored samples of various censored scheme when k = 2 , n = 50 , and m = 30 .
Censoring SchemeSample
R 1 = ( 20 , ( 0 * 29 ) ) 0.39, 1.80, 1.84, 1.84, 1.89, 1.92, 2.00, 2.03, 2.05, 2.17, 2.35, 2.41, 2.48, 2.50, 2.53, 2.55, 2.59, 2.74
2.82, 2.88, 2.95, 2.97, 2.97, 3.19, 3.19, 3.27, 3.28, 3.31, 3.60, 3.75
R 2 = ( 10 , ( 0 * 28 ) , 10 ) 0.39, 1.47, 1.57, 1.57, 1.59, 1.59, 1.61, 1.69, 1.69, 1.71, 1.73, 1.80, 1.84, 1.84, 1.89, 1.92, 2.00, 2.03
2.05, 2.17, 2.35, 2.41, 2.48, 2.50, 2.53, 2.55, 2.59, 2.74, 2.82, 2.88
R 3 = ( ( 0 * 29 ) , 20 ) 0.39, 0.81, 0.85, 0.98, 1.08, 1.12, 1.17, 1.18, 1.25, 1.36, 1.41, 1.47, 1.57, 1.57, 1.59, 1.59, 1.61, 1.69
1.69, 1.71, 1.73, 1.80, 1.84, 1.84, 1.89, 1.92, 2.00, 2.03, 2.05, 2.17
Table 14. Comparison of censoring schemes when k = 2 , n = 50 , and m = 30 .
Table 14. Comparison of censoring schemes when k = 2 , n = 50 , and m = 30 .
Censoring Scheme Criterion
det ( I 1 ( θ ^ ) ) trace ( I 1 ( θ ^ ) ) Var [ ln T ^ 0.05 ] Var [ ln T ^ 0.95 ] 0 1 Var [ ln T ^ p ] dp
R 1 = ( 20 , ( 0 * 29 ) ) 0.01300.6250 0.0238 0.0320 0.0266
R 2 = ( 10 , ( 0 * 28 ) , 10 ) 0.01020.39720.02590.04280.0317
R 3 = ( ( 0 * 29 ) , 20 ) 0.0080 0.3388 0.03030.06110.0407

Share and Cite

MDPI and ACS Style

Xie, Y.; Gui, W. Statistical Inference of the Lifetime Performance Index with the Log-Logistic Distribution Based on Progressive First-Failure-Censored Data. Symmetry 2020, 12, 937. https://doi.org/10.3390/sym12060937

AMA Style

Xie Y, Gui W. Statistical Inference of the Lifetime Performance Index with the Log-Logistic Distribution Based on Progressive First-Failure-Censored Data. Symmetry. 2020; 12(6):937. https://doi.org/10.3390/sym12060937

Chicago/Turabian Style

Xie, Ying, and Wenhao Gui. 2020. "Statistical Inference of the Lifetime Performance Index with the Log-Logistic Distribution Based on Progressive First-Failure-Censored Data" Symmetry 12, no. 6: 937. https://doi.org/10.3390/sym12060937

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop