Next Article in Journal
Effective Lagrangian for the Macroscopic Motion of Weyl Fermions in 3He-A
Previous Article in Journal
A CML-ECA Chaotic Image Encryption System Based on Multi-Source Perturbation Mechanism and Dynamic DNA Encoding
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Estimation of Inverted Weibull Competing Risks Model Using Improved Adaptive Progressive Type-II Censoring Plan with Application to Radiobiology Data

1
Department of Mathematical Sciences, College of Science, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
2
Department of Statistics, Faculty of Science, King Abdulaziz University, Jeddah 21589, Saudi Arabia
3
Department of Statistics, Faculty of Commerce, Zagazig University, Zagazig 44519, Egypt
4
Faculty of Technology and Development, Zagazig University, Zagazig 44519, Egypt
*
Author to whom correspondence should be addressed.
Symmetry 2025, 17(7), 1044; https://doi.org/10.3390/sym17071044
Submission received: 30 April 2025 / Revised: 10 June 2025 / Accepted: 12 June 2025 / Published: 2 July 2025

Abstract

This study focuses on estimating the unknown parameters and the reliability function of the inverted-Weibull distribution, using an improved adaptive progressive Type-II censoring scheme under a competing risks model. Both classical and Bayesian estimation approaches are explored to offer a thorough analysis. Under the classical approach, maximum likelihood estimators are obtained for the unknown parameters and the reliability function. Approximate confidence intervals are also constructed to assess the uncertainty in the estimates. From a Bayesian standpoint, symmetric Bayes estimates and highest posterior density credible intervals are computed using Markov Chain Monte Carlo sampling, assuming a symmetric squared error loss function. An extensive simulation study is carried out to assess how well the proposed methods perform under different experimental conditions, showing promising accuracy. To demonstrate the practical use of these methods, a real dataset is analyzed, consisting of the survival times of male mice aged 35 to 42 days after being exposed to 300 roentgens of X-ray radiation. The analysis demonstrated that the inverted Weibull distribution is well-suited for modeling the given dataset. Furthermore, the Bayesian estimation method, considering both point estimates and interval estimates, was found to be more effective than the classical approach in estimating the model parameters as well as the reliability function.

1. Introduction

Advancements in technology and manufacturing have resulted in the development of highly reliable modern products that often exhibit much longer lifespans before failure. As a result, traditional life testing methods, which rely on observing failures within a reasonable time period, have become less effective. This challenge emphasizes the need for more advanced statistical tools that can efficiently analyze lifetime data under time constraints. In such cases, researchers often use censoring schemes as an effective way to collect sufficient data without waiting for all test units to fail. The literature outlines several censoring schemes, including Type-I and Type-II censoring. In Type-I censoring, the test ends after a predetermined time, while in Type-II censoring, the test concludes once a specified number of failures have occurred. A more flexible alternative is the progressive Type-II censoring (PTIIC) scheme, which allows for the removal of surviving units at multiple stages during the experiment. For more information on the application of PTIIC, one may refer to Balakrishnan et al. [1], Balakrishnan and Hossain [2], Wu and Gui [3], and Dey et al. [4], among others.
Ng et al. [5] proposed a more flexible censoring scheme known as the adaptive progressive Type-II censoring (APTIIC) plan. This approach not only encompasses the traditional PTIIC plan as a specific case but also enhances the efficiency of statistical inference compared to the censoring plan introduced by Kundu and Joarder [6]. The APTIIC scheme has been widely applied in many studies, such as Sobhi and Soliman [7], Kohansal and Shoaee [8], Panahi and Asadi [9], Haj Ahmad et al. [10], Vardani et al. [11], and Yu et al. [12]. However, Ng et al. [5] noted that the APTIIC scheme is effective for statistical inference only when testing time is not a concern. For highly reliable units, it can lead to excessively long testing durations, making it unsuitable for ensuring reasonable test lengths. To address this, Yan et al. [13] introduced the improved APTIIC (IAPTIIC) plan. The IAPTIIC plan generalizes several existing censoring methods, including PTIIC and APTIIC schemes, among others. Additionally, it guarantees that experiments are completed within a predefined time frame, effectively addressing the challenges posed by prolonged testing durations. This advancement makes the IAPTIIC scheme a valuable tool for conducting reliability studies under time-constrained conditions. For more details on recent studies concerning the IAPTIIC strategy, see Dutta and Kayal [14], Nassar and Elshahhat [15], Dutta et al. [16], Zhang and Yan [17], and Irfan et al. [18]. The next section offers a detailed description of the IAPTIIC scheme.
In various medical and engineering studies, the failure of test units is frequently influenced by multiple risk factors or causes. These factors, which can be conceptualized as competing influences, contribute to the eventual breakdown of the unit. For instance, in medical research, a patient’s health outcome may be impacted by competing risks such as disease progression, treatment side effects, or unrelated health complications. Because these risk factors operate simultaneously and each possesses the potential to induce failure, they are considered to be in competition with one another. This phenomenon is formally recognized in the statistical literature as the competing risks model. See Crowder [19] for more competing risks examples. When analyzing competing risks data, researchers frequently focus on assessing the impact of a specific risk while considering the influence of other contributing factors. Ideally, the data set for such analysis includes the lifetime of the failed unit along with an indicator variable that specifies the cause of failure. The causes of failure can be modeled as either independent or dependent events. In this study, we adopt the latent failure time model proposed by Cox [20]. Within this framework, the competing causes of failure are assumed to follow independent distributions. The competing risks model has been widely studied due to its significant importance in fields such as survival analysis, reliability engineering, and medical research see for example, the works of Kundu et al. [21], Sarhan [22], Zhang [23], Fan et al. [24], Ren and Gui [25], and Tian et al. [26].
Elshahhat and Nassar [27] investigated the Weibull competing risks model using the IAPTIIC scheme. Their work focused on both classical and Bayesian estimation methods for the model parameters and the reliability (RF). They used the Weibull distribution due to its widespread applications. It is widely applied in reliability engineering to model time-to-failure of mechanical systems like turbines, in survival analysis for patient survival times in medical studies, in meteorology for wind speed distributions, in material science for characterizing material strength, in hydrology for extreme events like floods, and in quality control for assessing product lifetimes. While the competing risks model and the IAPTIIC scheme are highly significant, no studies have yet explored this framework for other lifetime distributions, despite the limitations of the Weibull distribution in modeling data with non-monotonic and unimodal hazard rate functions. To address this gap, this study employs the flexibility of the inverted-Weibull (IW) distribution to analyze reliability within the competing risks framework using IAPTIIC data. The IW distribution is chosen for its ability to accommodate non-monotonic hazard rates and provide a more accurate fit to empirical data; see Keller and Kanath [28]. Its versatility makes it particularly suitable for modeling diverse data types across various fields. Notable practical applications of the IW distribution include modeling the time to breakdown of insulating fluids, the degradation of mechanical components, survival and reliability data, and in extreme value analysis for modeling maximum or minimum values such as stock price fluctuations. See for more details about the IW distribution, AL-Essa et al. [29], Jana and Bera [30], and Mou et al. [31]. Under the competing risks model, several researchers have explored estimation problems for the IW distribution under different sampling schemes. For instance, El Azm et al. [32] investigated parameter estimation under APTIIC sampling. Samia et al. [33] focused on making statistical inferences using a generalized progressive hybrid Type-I censoring scheme. Additionally, Alotaibi et al. [34] examined parameter estimation by applying the expectation–maximization algorithm in the case of complete sample.
It is evident that the available studies have primarily focused on estimating the parameters of the IW competing risks model using traditional sampling plans or complete data. None of these works have explored more advanced censoring schemes such as the IAPTIIC scheme. Furthermore, while parameter estimation has been widely addressed, the estimation of the RF has generally been overlooked. Considering the advantages of the IAPTIIC scheme over conventional censoring methods, and the flexibility of the IW competing risks model in handling data with multiple failure causes, this study aims to investigate both classical and Bayesian estimation methodologies for the unknown parameters and the RF under IAPTIIC competing risks data.The estimation methods involve obtaining both point estimates and interval estimates. By integrating classical and Bayesian methodologies, this study provides a useful framework for reliability analysis in the presence of competing risks which may be of interest for practitioners in fields such as engineering, medicine, and reliability testing. The main contributions of this study can be presented as follows:
  • Derivation of maximum likelihood estimates (MLEs) and construction of approximate confidence intervals (ACIs) for the unknown parameters and RF of the IW competing risks model under the IAPTIIC scheme.
  • Development of Bayesian estimation procedures using Markov Chain Monte Carlo (MCMC) methods to obtain Bayes point estimates and highest posterior density (HPD) credible intervals.
  • Comprehensive simulation study conducted to evaluate the performance and accuracy of both classical and Bayesian estimation methods under various experimental scenarios.
  • Application of the proposed methods to real-world competing risk data set to demonstrate their practical utility and effectiveness in estimating model parameters and RF.
The remainder of this study is structured as follows: Section 2 discusses the IW distribution and the IAPTIIC scheme under the competing risks model. Section 3 derives the MLEs and constructs the ACIs for the IW parameters and the RF. Section 4 focuses on Bayesian estimation, employing the squared error (SE) loss function to estimate the parameters and the related RF. Section 5 presents the simulation study design and discusses the corresponding results, evaluating the performance of the proposed methods. Section 6 demonstrates the practical application of the methodologies by analyzing real-world data sets within the competing risks framework. Finally, Section 7 concludes this study, summarizing the key findings and their implications for reliability analysis and related fields.

2. Model Description

Suppose n identical items are put on a life test, and their lifetimes are represented by independent and identically distributed (i.i.d.) random variables, denoted as Y 1 , , Y n . For simplicity and without loss of generality, we assume that there are only two competing risks influencing the failure of these units. Under this assumption, the failure of each unit can be attributed to one of these two competing causes. Then, we have
Y i = m i n Y 1 i , Y 2 i , i = 1 , , n ,
where Y k i , for k = 1 , 2 , represents the latent failure time of the i-th testing unit under the j-th cause of failure. Additionally, it is assumed that the latent failure times Y 1 i and Y 2 i , for i = 1 , , n , are independent. When a failure occurs, the researcher records the failure time and identifies the specific cause of failure, denoted by the indicator variable δ i , with δ i ( 1 , 2 ) , where δ i = 1 if the i-th failure is attributed to the first cause, and δ i = 2 if it is due to the second cause. This indicator variable δ i , i = 1 , , n helps identify the specific risk factor responsible for each observed failure. Assume that Y k i , k = 1 , 2 , i = 1 , , n , follows the IW distribution with scale parameter μ k and shape parameter β k , and it will be referred to as I W ( μ k , β k ) . Then, the associated probability density function (PDF) and distribution function, can be written, respectively, as
g k ( y ; μ k , β k ) = μ k β k y β k 1 e μ k y β k , y > 0 , μ k , β k > 0
and
G k ( y ; μ k , β k ) = e μ k y β k .
Let Y 1 i I W ( μ 1 , β 1 ) and Y 2 i I W ( μ 2 , β 2 ) . Then, the RF at a distinct time t, defined as R ( t ; ϕ ) = G ¯ 1 ( t ; μ 1 , β 1 ) G ¯ 2 ( t ; μ 2 , β 2 ) , G ¯ k ( . ) = 1 G k ( . ) , can be expresses as follows
R ( t ; ϕ ) = k = 1 2 1 e μ k t β k ,
where ϕ = ( μ 1 , μ 2 , β 1 , β 2 ) .
The process of generating an IAPTIIC sample in the presence of competing risks can be described as follows: Let m ( < n ) represent the predefined number of failures to be observed, and let S = ( S 1 , , S m ) denote the predetermined removal pattern established before the experiment begins. Additionally, the researcher sets two threshold times, T 1 and T 2 , where T 1 , T 2 ( 0 , ) and T 1 < T 2 . These thresholds define the experimental time constraints: the experiment is allowed to continue beyond T 1 but must not exceed T 2 . This setup ensures that the experiment remains within a controlled time frame while accommodating the adaptive nature of the censoring scheme. When the i-th unit fails, with failure time represented by Y i : m : n for i = 1 , , m , the researcher randomly removes S i units from the remaining surviving items. The cause of failure δ i is recorded at each failure event. This procedure continues until the test concludes based on one of the following three scenarios:
  • Case I: If Y m : m : n < T 1 , the researcher terminates the test at Y m : m : n and discards all the remaining surviving items. This results in the conventional PTIIC sample.
  • Case II: If Y q 1 : m : n < T 1 < Y q 1 + 1 : m : n , where q 1 represents the number of failures occurring before time T 1 and ( q 1 + 1 ) < m , we set S q 1 + 1 = = S m 1 = 0 . The experiment is terminated at the time of the m-th failure, and all remaining units are removed at that time. Note that this scenario corresponds to the well-known APTIIC sample.
  • Case III: If Y m : m : n > T 2 , the experiment is terminated at T 2 . In this scenario, no items are removed once the test time exceeds the first threshold T 1 . Here, q 2 < m represents the number of failures observed before time T 2 . At T 2 , all remaining units are removed, i.e., S * = n q 2 S 1 S q 1 .
In this case, the observed IAPTIIC competing risks data will be
( y 1 , δ 1 , S 1 ) , , ( y q 1 , δ q 1 , S q 1 ) , ( y q 1 + 1 , δ q 1 + 1 , 0 ) , , ( y q 2 , δ q 2 , 0 ) , ( T 2 , S * ) ,
where y i = y i : m : n for the sake of simplicity. Let Q refers to the total number of observed failures and I ( ϵ ) denote an indicator function for the event ϵ . Using this, we define
I ( δ i = k ) = 1 , if δ i = k , 0 , otherwise .
From this, it follows that Q k = i = 1 Q I ( δ i = k ) , for k = 1 , 2 , represents the number of observed failures associated with cause k, where Q = Q 1 + Q 2 . Let y ̲ be an IAPTIIC competing risks sample drawn from a continuous population. Then, the joint likelihood function of the observed data, can be expressed as follows
L ( ϕ | y ̲ ) i = 1 Q g 1 ( y i ; μ 1 , β 1 ) G ¯ 2 ( y i ; μ 2 , β 2 ) I ( δ i = 1 ) g 2 ( y i ; μ 2 , β 2 ) G ¯ 1 ( y i ; μ 1 , β 1 ) I ( δ i = 2 ) × i = 1 D G ¯ 1 ( y i ; μ 1 , β 1 ) G ¯ 2 ( y i ; μ 2 , β 2 ) S i G ¯ 1 ( τ ; μ 1 , β 1 ) G ¯ 2 ( τ ; μ 2 , β 2 ) S ,
where the available options for Q, D, τ , and S are provided in Table 1.

3. Maximum Likelihood Estimation

In this part, we derive the MLEs and the associated ACIs for the model parameters μ k and β k , k = 1 , 2 ). Additionally, we obtain the MLE and ACI for the RF. These derivations are conducted under the framework of IAPTIIC competing risks data and based on the above-mentioned assumptions.

3.1. MLEs and ACIs for the Model Parameters

Consider an observed IAPTIIC competing risks sample y ̲ , drawn from an IW population with a PDF and distribution function given by (1) and (2), respectively. Using these, the likelihood function can be expressed based on (4) as follows
L ( ϕ | y ̲ ) = k = 1 2 ( μ k β k ) Q k exp k = 1 2 i = 1 Q k ( β k + 1 ) log ( y i ) μ k y i β k + log [ φ ( y i ; μ 3 k , β 3 k ) ] × exp k = 1 2 i = 1 D S i log [ φ ( y i ; μ k , β k ) ] + k = 1 2 S log [ φ ( τ ; μ k , β k ) ] ,
where y i = y i 1 and φ ( y i ; μ k , β k ) = 1 e μ k y i β k . The log-likelihood function corresponding to (Lik1) is
l ( ϕ | y ̲ ) = k = 1 2 Q k log ( μ k β k ) + k = 1 2 i = 1 Q k ( β k + 1 ) log ( y i ) μ k y i β k + log [ φ ( y i ; μ 3 k , β 3 k ) ] + k = 1 2 i = 1 D S i log [ φ ( y i ; μ k , β k ) ] + k = 1 2 S log [ φ ( τ ; μ k , β k ) ] .
By equating the first-order partial derivatives of (6) with respect to μ k and β k , k = 1 , 2 to zero, we obtain a system of four normal equations. These equations must be solved simultaneously to acquire the MLEs of the model parameters, denoted as μ ^ k and β ^ k , k = 1 , 2 . The normal equations to be solved are as follows
l ( ϕ | y ̲ ) μ 1 = Q 1 μ 1 i = 1 Q 1 y i β 1 + i = 1 Q 2 φ 1 ( y i ; μ 1 , β 1 ) + i = 1 D S i φ 1 ( y i ; μ 1 , β 1 ) + S φ 1 ( τ ; μ 1 , β 1 ) = 0 ,
l ( ϕ | y ̲ ) μ 2 = Q 2 μ 2 i = 1 Q 2 y i β 2 + i = 1 Q 1 φ 1 ( y i ; μ 2 , β 2 ) + i = 1 D S i φ 1 ( y i ; μ 2 , β 2 ) + S φ 1 ( τ ; μ 2 , β 2 ) = 0 ,
l ( ϕ | y ̲ ) β 1 = Q 1 β 1 + i = 1 Q 1 log ( y i ) 1 μ 1 y i β 1 + i = 1 Q 2 φ 2 ( y i ; μ 1 , β 1 ) + i = 1 D S i φ 2 ( y i ; μ 1 , β 1 ) + S φ 2 ( τ ; μ 1 , β 1 ) = 0
and
l ( ϕ | y ̲ ) β 2 = Q 2 β 2 + i = 1 Q 2 log ( y i ) 1 μ 2 y i β 2 + i = 1 Q 1 φ 2 ( y i ; μ 2 , β 2 ) + i = 1 D S i φ 2 ( y i ; μ 2 , β 2 ) + S φ 2 ( τ ; μ 2 , β 2 ) = 0 ,
where φ 1 ( y i ; μ k , β k ) = y i β k e μ k y i β k 1 1 and φ 2 ( y i ; μ k , β k ) = μ k log ( y i ) φ 1 ( y i ; μ k , β k ) .
From Equations (7)–(10), it is evident that the classical estimators cannot be expressed in closed-form solutions. As a result, obtaining the MLEs requires the use of a numerical iterative approach. One such method is the Newton–Raphson algorithm, which can be employed to solve the system of normal equations and compute the MLEs μ ^ k and β ^ k for k = 1 , 2 .
To construct interval estimates for model parameters μ k and β k , k = 1 , 2 , it is necessary to obtain the asymptotic variance–covariance matrix. This matrix is typically derived from the Fisher information matrix. However, due to the complexity of obtaining the exact closed-form expression of the Fisher information matrix, we instead utilize the observed Fisher information matrix as an approximation. This approach allows us to estimate the required variances and covariances. The estimated variance-covariance matrix can be expressed as follows
I ( ϕ ^ ) = 2 l ( ϕ | y ̲ ) μ 1 2 0 2 l ( ϕ | y ̲ ) μ 1 β 1 0 2 l ( ϕ | y ̲ ) μ 2 2 0 2 l ( ϕ | y ̲ ) μ 2 β 2 2 l ( ϕ | y ̲ ) β 1 2 0 2 l ( ϕ | y ̲ ) β 2 2 ϕ = ϕ ^ 1 = σ ^ 11 0 σ ^ 13 0 σ ^ 22 0 σ ^ 24 σ ^ 33 0 σ ^ 44 ,
where ϕ ^ is the MLE of ϕ , and
2 l ( ϕ | y ̲ ) μ 1 2 = Q 1 μ 1 2 i = 1 Q 2 φ 11 ( y i ; μ 1 , β 1 ) i = 1 D S i φ 11 ( y i ; μ 1 , β 1 ) S φ 11 ( τ ; μ 1 , β 1 ) ,
2 l ( ϕ | y ̲ ) μ 2 2 = Q 2 μ 2 2 i = 1 Q 1 φ 11 ( y i ; μ 2 , β 2 ) i = 1 D S i φ 11 ( y i ; μ 2 , β 2 ) S φ 11 ( τ ; μ 2 , β 2 ) ,
2 l ( ϕ | y ̲ ) β 1 2 = Q 1 β 1 2 μ 1 i = 1 Q 1 y i β 1 log 2 ( y i ) + i = 1 Q 2 φ 22 ( y i ; μ 1 , β 1 ) + i = 1 D S i φ 22 ( y i ; μ 1 , β 1 ) + S φ 22 ( τ ; μ 1 , β 1 ) ,
2 l ( ϕ | y ̲ ) β 2 2 = Q 2 β 2 2 μ 2 i = 1 Q 2 y i β 2 log 2 ( y i ) + i = 1 Q 1 φ 22 ( y i ; μ 2 , β 2 ) + i = 1 D S i φ 22 ( y i ; μ 2 , β 2 ) + S φ 22 ( τ ; μ 2 , β 2 ) ,
2 l ( ϕ | y ̲ ) μ 1 β 1 = i = 1 Q 1 y i β 1 log ( y i ) + i = 1 Q 2 φ 12 ( y i ; μ 1 , β 1 ) + i = 1 D S i φ 12 ( y i ; μ 1 , β 1 ) + S φ 12 ( τ ; μ 1 , β 1 )
and
2 l ( ϕ | y ̲ ) μ 2 β 2 = i = 1 Q 2 y i β 2 log ( y i ) + i = 1 Q 1 φ 12 ( y i ; μ 2 , β 2 ) + i = 1 D S i φ 12 ( y i ; μ 2 , β 2 ) + S φ 12 ( τ ; μ 2 , β 2 ) ,
where φ 11 ( y i ; μ k , β k ) = e μ k y i β k φ 1 2 ( y i ; μ k , β k ) , φ 22 ( y i ; μ k , β k ) = μ k log 2 ( y i ) φ 1 ( y i ; μ k , β k ) ω ( y i ; μ k , β k ) and φ 12 ( y i ; μ k , β k ) = log ( y i ) φ 1 ( y i ; μ k , β k ) ω ( y i ; μ k , β k ) , with ω ( y i ; μ k , β k ) = [ 1 μ k e μ k y i β k φ 1 ( y i ; μ k , β k ) ] .
By utilizing the asymptotic normality property of the MLEs, we can express the distribution of ϕ ^ as ϕ ^ N 4 ( ϕ , I ( ϕ ^ ) ) , where I ( ϕ ^ ) is the estimated variance–covariance matrix, as provided in (12). Using this asymptotic distribution, we can construct 100 ( 1 α ) % ACIs for the unknown parameters μ k and β k , where k = 1 , 2 as
μ ^ k z α / 2 σ ^ k k , μ ^ k + z α / 2 σ ^ k k , and β ^ k z α / 2 σ ^ c c , β ^ k + z α / 2 σ ^ c c , k = 1 , 2 , c = k + 2 ,
where z α / 2 is the critical value from the standard normal distribution corresponding to the significance level α , and σ ^ k k is the estimated variances, obtained from the diagonal elements of I ( ϕ ^ ) . It is important to mention here that this method relies on the large-sample properties of MLEs, ensuring that the intervals are asymptotically valid and provide reliable estimates of the parameter uncertainty. However, for small sample sizes, the accuracy of these intervals may be limited, and alternative methods such as Bayes credible could be considered for improved performance.

3.2. MLE and ACI for the RF

Using the invariance property of the MLEs, the MLE of the RF at a distinct time t, denoted as R ^ ( t ) R ^ ( t ; ϕ ) , can be obtained by substituting the MLEs of the parameters μ k and β k , where k = 1 , 2 into the expression for the RF presented in (3). This property ensures that the MLE of the RF retains the same properties as the MLEs of the parameters. Thus, the MLE of the RF can be obtained using (3) as
R ^ ( t ) = k = 1 2 1 e μ ^ k t β ^ k , t = t 1 .
On the other hand, to construct the associated ACIs for R ( t ) , we first approximate the variance of R ^ ( t ) using the delta method. The delta method utilizes the asymptotic normality of the MLEs and provides an approximation of the variance of a function of the parameters. Specifically, the variance of R ^ ( t ) is approximated as
v a r ^ ( R ^ ) R ^ μ 1 R ^ μ 2 R ^ β 1 R ^ β 1 σ ^ 11 0 σ ^ 13 0 σ ^ 22 0 σ ^ 24 σ ^ 33 0 σ ^ 44 R ^ μ 1 R ^ μ 2 R ^ β 1 R ^ β 2 ,
where
R ^ μ k = t β ^ k e μ ^ k t β ^ k 1 e μ ^ 3 k t β ^ 3 k ,
and
R ^ β k = μ k t β ^ k log ( t ) e μ ^ k t β ^ k 1 e μ ^ 3 k t β ^ 3 k , k = 1 , 2 .
Once the approximate variance of R ^ ( t ) is obtained, the 100 ( 1 α ) % ACI for R ( t ) can be computed as follows
R ^ ( t ) z α / 2 v a r ^ ( R ^ ) , R ^ ( t ) + z α / 2 v a r ^ ( R ^ ) .

4. Bayesian Estimation

In this section, we explore the Bayesian estimation approach to derive the Bayesian estimators and HPD credible intervals for the model parameters and the related RF. The Bayes estimates and the interval ranges are obtained using the MCMC technique through sampling from the posterior distribution. The Bayes point estimates are computed under the SE loss function, a commonly used symmetric loss function in Bayesian inference. In Bayesian analysis, the process begins by specifying prior distributions for the parameters. From the likelihood function given in (5), it is clear that conjugate priors are not available for μ k and β k , k = 1 , 2 . To overcome this limitation, we adopt gamma priors for these parameters. Gamma priors are particularly advantageous as they allow flexibility in adjusting the range of the unknown parameters while maintaining computational simplicity. These priors are versatile and can effectively incorporate various forms of prior knowledge. Moreover, the use of gamma priors does not complicate posterior evaluation or computational procedures, especially when employing MCMC methods.
Let μ k G a m m a ( a k , b k ) and β k G a m m a ( c k , d k ) where a k , b k , c k , d k > 0 for k = 1 , 2 are the hyper-parameters and are assumed to be known. The joint prior distribution of μ k and β k , k = 1 , 2 is then expressed as follows:
π ( ϕ ) = k = 1 2 μ k a k 1 β k c k 1 e ( b k μ k + d k β k ) .
By combining the likelihood function in (5) with the joint prior distribution in (13), the joint posterior distribution of the model parameters ϕ can be derived as follows:
P ( ϕ | y ̲ ) = 1 A k = 1 2 μ k Q k + a k 1 β k Q k + c k 1 exp k = 1 2 i = 1 Q k β k [ log ( y i ) d k ] μ k ( y i β k + b k ) × exp { k = 1 2 i = 1 Q k log [ φ ( y i ; μ 3 k , β 3 k ) ] + k = 1 2 i = 1 D S i log [ φ ( y i ; μ k , β k ) ] + k = 1 2 S log [ φ ( τ ; μ k , β k ) ] } ,
where
A = μ 1 μ 2 β 1 β 2 L ( ϕ | y ̲ ) π ( ϕ ) d μ 1 d μ 2 d β 1 d β 2 .
Let Λ ( ϕ ) represent a parametric function of the unknown parameters ϕ . The Bayes estimator of Λ ( ϕ ) is typically obtained under a chosen loss function, and one of the most commonly used loss functions is the SE loss function. The SE loss function is commonly used due to its mathematical tractability and desirable properties, such as minimizing the mean squared error. However, it is important to note that the Bayes estimator can be easily obtained under other loss functions as well. Under the SE loss function, the Bayes estimator of Λ ( ϕ ) , denoted as Λ ˜ ( ϕ ) , can be expressed as the expected value of Λ ( ϕ ) with respect to the posterior distribution of the parameters ϕ . Specifically, it is given by
Δ ˜ ( ϕ ) = E [ Δ ( ϕ ) y ̲ ] ,
where E [ · y ̲ ] represents the posterior expectation based on the observed data. Based on the posterior distribution in (14), the Bayes estimator in (15), can be obtained as
Δ ˜ ( ϕ ) = μ 1 μ 2 β 1 β 2 Λ ( ϕ ) P ( ϕ | y ̲ ) d μ 1 d μ 2 d β 1 d β 2 .
The Bayes estimator in (16) requires computing a very complex integrals, which is analytically intractable due to the complicated posterior distribution. While numerical methods like Monte Carlo integration can approximate these integrals, they are often computationally expensive, especially with many parameters or complex posteriors as in our case. To address this, we use the MCMC method, which allows direct sampling from the posterior distribution in (14). These samples are then used to approximate Bayes estimates and construct the HPD credible intervals. A key step in implementing the MCMC method is deriving the full conditional distributions of the unknown parameters. Using the joint posterior distribution provided in (14), we can express the conditional distributions for the parameters μ k and β k , k = 1 , 2 as
P ( μ 1 | ϕ μ 1 , y ̲ ) μ 1 Q 1 + a 1 1 exp μ 1 i = 1 Q 1 ( y i β 1 + b 1 ) + i = 1 Q 2 log [ φ ( y i ; μ 1 , β 1 ) ] × exp i = 1 D S i log [ φ ( y i ; μ 1 , β 1 ) ] + S log [ φ ( τ ; μ 1 , β 1 ) ] ,
P ( μ 2 | ϕ μ 2 , y ̲ ) μ 2 Q 2 + a 2 1 exp μ 2 i = 1 Q 2 ( y i β 2 + b 2 ) + i = 1 Q 1 log [ φ ( y i ; μ 2 , β 2 ) ] × exp i = 1 D S i log [ φ ( y i ; μ 2 , β 2 ) ] + S log [ φ ( τ ; μ 2 , β 2 ) ] ,
P ( β 1 | ϕ β 1 , y ̲ ) β 1 Q 1 + c 1 1 exp i = 1 Q 1 β 1 [ log ( y i ) d 1 ] μ 1 y i β 1 × exp i = 1 Q 2 log [ φ ( y i ; μ 1 , β 1 ) ] + i = 1 D S i log [ φ ( y i ; μ 1 , β 1 ) ] + S log [ φ ( τ ; μ 1 , β 1 ) ]
and
P ( β 2 | ϕ β 2 , y ̲ ) β 2 Q 2 + c 2 1 exp i = 1 Q 2 β 2 [ log ( y i ) d 2 ] μ 2 y i β 2 × exp i = 1 Q 1 log [ φ ( y i ; μ 2 , β 2 ) ] + i = 1 D S i log [ φ ( y i ; μ 2 , β 2 ) ] + S log [ φ ( τ ; μ 2 , β 2 ) ] .
Upon initial inspection, the full conditional distributions presented in (17)–(20) do not align with any standard or widely recognized probability distributions. Consequently, traditional sampling techniques, such as inverse transform sampling, are not applicable to generate random samples from these distributions. To address this limitation, we employ the Metropolis–Hastings (M–H) algorithm, a well-known MCMC method. The M–H algorithm is particularly effective for sampling from complex or non-standard distributions, as it utilizes a candidate-generating distribution, referred to as the proposal distribution, to yield potential samples. In this study, we utilize the normal distribution as the proposal distribution for all parameters. The mean and variance of this normal distribution are determined based on the MLEs of the parameters. The M–H algorithm operates by iteratively proposing new samples from the proposal distribution and accepting or rejecting these samples based on an acceptance probability that guarantees the resulting Markov chain converges to the target posterior distribution. The procedure for generating random samples using the M–H algorithm involves the following steps:
1.
Initialize the algorithm by setting the starting values as ( μ k ( 0 ) , β k ( 0 ) ) = ( μ ^ k , β ^ k ) , k = 1 , 2 , where μ ^ k and β ^ k are the MLEs of the parameters μ k and β k .
2.
Set the iteration counter j = 1 .
3.
Use the conditional distribution P ( μ 1 | ϕ μ 1 , y ̲ ) given in (17) to generate μ 1 ( j ) as follows:
Generate a candidate value μ from a normal distribution N [ μ ^ , v a r ^ ( μ ^ ) ] .
Compute the acceptance probability (AP):
ζ = min 1 , P ( μ 1 | ϕ μ 1 ( j 1 ) , y ̲ ) P ( μ 1 ( j 1 ) | ϕ μ 1 ( j 1 ) , y ̲ ) .
Draw a random number u from a uniform distribution U ( 0 , 1 ) .
If u ζ , accept μ 1 and set μ 1 ( j ) = μ 1 . Otherwise, retain the previous value μ 1 ( j ) = μ 1 ( j 1 ) .
4.
Repeat step 3 to generate the following:
μ 2 ( j ) from P ( μ 2 | ϕ μ 2 , y ̲ ) in (18).
β 1 ( j ) from P ( β 1 | ϕ β 1 , y ̲ ) in (19).
β 2 ( j ) from P ( β 2 | ϕ β 2 , y ̲ ) in (20).
5.
Using the updated values ( μ k ( j ) , β k ( j ) ) , j = 1 , 2 , compute the RF at iteration j, denoted by R ( j ) R ( j ) ( t ) , as follows:
R ( j ) = k = 1 2 1 e μ k ( j ) t β k ( j ) , t = t 1 .
6.
Increment the iteration counter by setting j = j + 1 .
7.
After repeating steps 3 through 6 multiple times, discard an initial set of iterations as the burn-in period to ensure the Markov chain has converged to its stationary distribution. The remaining iterations yield the following sequences:
μ 1 ( j ) , μ 2 ( j ) , β 1 ( j ) , β 2 ( j ) , R ( j ) , j = 1 , , M ,
where M represents the number of iterations retained after discarding the burn-in period.
Once the MCMC samples have been generated, they can be readily utilized to compute the Bayes estimates and the HPD credible intervals for the model parameters and the RF. Under the SE loss function, the Bayes estimates are obtained as the posterior means of the respective parameters. Specifically, the Bayes estimates for the parameters μ k , β k , k = 1 , 2 , and the RF are calculated as
μ ˜ k = 1 M j = 1 M μ k ( j ) , β ˜ k = 1 M j = 1 M β k ( j ) , and R ˜ = 1 M j = 1 M R ( j ) .
Additionally, the HPD credible intervals provide the shortest possible interval for a given probability level 100 ( 1 α ) % under the posterior distribution. To illustrate the computation process, we outline the steps to calculate the HPD credible interval for the RF below. The same procedure can be applied analogously to other parameters using the MCMC-generated samples.
1.
Sorting the MCMC samples R ( j ) , j = 1 , , M as R ( 1 ) < < R ( M ) .
2.
Identify the index j * within the range j * = 1 , , M that satisfies the following condition:
R ( j * + [ ( 1 α ) M ] ) R ( j * ) = min 1 j α M R ( j + [ ( 1 α ) M ] ) R ( j ) .
3.
The 100 ( 1 α ) % HPD credible interval for the RF is then given by
R ( j * ) , R ( j * + ( 1 α ) M .

5. Monte Carlo Comparisons

To show how the efficiency of the theoretical acquired findings on μ i , β i , i = 1 , 2 , and R ( t ) behave, obtained through maximum likelihood and Bayesian methodologies, we implement various Monte Carlo comparisons on the IW lifespan model from IAPTIIC competing risks.

5.1. Simulation Design

By assigning ( μ 1 , β 1 ) = ( 1.5 , 0.5 ) and ( μ 2 , β 2 ) = ( 0.5 , 1.5 ) , by varying key experimental factors, such as the total number of test units (n), the effective sample size (m), the removal scheme ( S 1 , S 2 , , S m ), and the threshold points ( T i , i = 1 , 2 ), we generate 1000 IAPTIIC competing risks from an IW distribution. Using t = 0.25 , the corresponding plausible value of R ( t ) is taken as 0.9328. Specifically, for each unknown quantity, we evaluate it using six simulation setups; see Table 2. In this table, 5 2 (for example) means that 5 is repeated 2 times, and FP% refers to the failure percentage given by m n × 100 % .
To gather an IAPTIIC competing risks data from an IW distribution, conduct the following:
Step 1.
Assign parameter values for μ j and β j , j = 1 , 2 .
Step 2.
Generate a PTIIC competing risks sample as:
a.
Collect ϱ independent observations of size m from a uniform distribution, say ϱ 1 , ϱ 2 , , ϱ m .
b.
Compute υ i = ϱ i i + j = m i + 1 m R j 1 , i = 1 , 2 , , m .
c.
Define U i = 1 υ m υ m 1 υ m i + 1 for i = 1 , 2 , , m .
d.
Set y i = G 1 ( u i ; μ j , β j ) , j = 1 , 2 , i = 1 , 2 , , m .
Step 3.
Identify q 1 at threshold time T 1 and discard observations y i , i = q 1 + 2 , , m .
Step 4.
Generate order statistics for m q 1 1 observations from a truncated distribution.
Step 5.
Assign failure causes based on indicators I ( δ i = k ) .
Step 6.
Compile an IAPTIIC competing risks sample as depicted in Table 1.
For each simulated IAPTIIC data set, the MLEs and 95% ACIs at a significance level of α = 0.05 are computed. The Newton–Raphson method, implemented via the ‘maxLik’ package (by Henningsen and Toomet [35]) in R, is employed to estimate the unknown parameters μ j and β j , j = 1 , 2 .
Bayesian estimation incorporates two informative prior sets of ( a j , b j , c j , d j ) , j = 1 , 2 , namely
  • Prior-1: ( a 1 , a 2 ) = ( 7.5 , 2.5 ) , ( c 1 , c 2 ) = ( 2.5 , 7.5 ) , and b i = d i = 5 , i = 1 , 2 ;
  • Prior-2: ( a 1 , a 2 ) = ( 15 , 5 ) , ( c 1 , c 2 ) = ( 5 , 15 ) , and b i = d i = 10 , i = 1 , 2 .
These priors are selected such that their mean values align with the expected parameter values. In cases where prior knowledge is unavailable, frequentist estimates are preferred due to computational efficiency. Bayesian estimates are obtained using the MCMC sampler discussed in Section 4, generating 12,000 MCMC samples and discarding the first 2000 as burn-in. The posterior summaries are computed from the remaining 10,000 samples using the ‘coda’ package introduced by Plummer et al. [36].
Bayesian inference inherently depends on prior beliefs. A sensitivity study assesses how posterior estimates respond to different plausible choices of priors. This is especially important when prior information is uncertain or partially subjective; one needs to justify the reliability of conclusions, or regulatory or scientific standards demand robustness checks. For this purpose, to evaluate the robustness and credibility of posterior inference, a sensitivity study is performed using four distinct types of priors, namely informative, noninformative (improper), weak, and overdispersed. Figure 1 illustrates the sensitivity of posterior estimates for parameters μ 1 , μ 2 , β 1 , and β 2 to four predefined prior types. It reveals that the informative priors yield the most concentrated (least variable) posterior distributions, while improper and overdispersed priors result in wider spreads, indicating higher uncertainty. This demonstrates that stronger prior beliefs tighten inference, whereas vague or extreme priors allow the data more influence but introduce greater variability. So, the posterior estimates through gamma priors support the robustness and credibility of Bayesian computations.
The mean point estimate (MPE) of μ i , β i , i = 1 , 2 , or R ( t ) (say, ϑ ) (for instance) is obtained as
M P E ( ϑ ¨ ) = 1 1000 j = 1 1000 ϑ ¨ [ j ] ,
where ϑ ¨ [ j ] represents the estimate of ϑ obtained at jth sample.
Point estimators are evaluated based on their root mean squared errors (RMSEs) and mean relative absolute biases (MRABs), defined as
RMSE ( ϑ ¨ ) = 1 1000 j = 1 1000 ϑ ¨ [ j ] ϑ 2 ,
and
MRAB ( ϑ ¨ ) = 1 1000 j = 1 1000 ϑ 1 ϑ ¨ [ j ] ϑ ,
respectively.
Interval estimators are assessed based on their average interval lengths (AILs) and coverage probabilities (CPs), respectively, as
AIL 95 % ( ϑ ) = 1 1000 j = 1 1000 U ϑ ¨ [ j ] L ϑ ¨ [ j ] ,
and
CP 95 % ( ϑ ) = 1 1000 j = 1 1000 I L ϑ ¨ [ j ] ; U ϑ ¨ [ j ] ϑ ,
where is the indicator, and ( L ( · ) , U ( · ) ) denotes the estimated interval bounds.

5.2. Simulation Results and Discussions

All simulation outcomes of μ i , β i , i = 1 , 2 , and R ( t ) are listed in Table A1, Table A2, Table A3, Table A4, Table A5, Table A6, Table A7, Table A8, Table A9 and Table A10. Specifically, Table A1, Table A2, Table A3, Table A4 and Table A5 summarize the MPEs, RMSEs, and MRABs in the first, second, and third columns, respectively, while AILs and CPs for 95% ACI/HPD intervals are detailed in the first and second columns, respectively, in Table A6, Table A7, Table A8, Table A9 and Table A10. For brevity and to enhance readability, while maintaining focus on the narrative flow, all simulation tables are moved to Appendix A.
From Table A1, Table A2, Table A3, Table A4, Table A5, Table A6, Table A7, Table A8, Table A9 and Table A10, in terms of the lowest RMSE, MRAB, and AIL values as well as the highest CP values, we list the following assessments:
  • The estimation outcomes for all unknown parameters, specifically μ i and β i for i = 1 , 2 , as well as the reliability function R ( t ) , demonstrate robust performance across a wide range of simulated scenarios, reflecting the stability and consistency of the proposed inferential methods.
  • An increase in the sample size n or FP% leads to improved estimation precision for all parameters, including μ i , β i , and R ( t ) . A comparable enhancement in estimation accuracy is also observed when the total number of removals, i = 1 m S i , is reduced.
  • The integration of informative gamma prior distributions within the Bayesian framework yields MCMC-based point and 95% HPD interval estimates for μ i , β i , and R ( t ) that surpass the frequentist point and 95% ACIs in terms of accuracy and interval efficiency.
  • Among the Bayesian approaches considered, estimates derived from Prior-2 exhibit superior performance relative to those based on Prior-1. This advantage is attributed to the reduced posterior variance under Prior-2, which translates into more precise inference.
  • Comparing the progressive removal designs (presented in Table 2), reveals that:
    The estimates of μ i , i = 1 , 2 , behave better based on removal designs used in [1] (when FP% = 50%) and [4] (when FP% = 75%) than others;
    The estimates of β i , i = 1 , 2 , behave better based on removal designs used in [3] (when FP% = 50%) and [6] (when FP% = 75%) than others;
    The estimates of R ( t ) behave better based on removal designs used in [2] (when FP% = 50%) and [3] (when FP% = 75%) than others.
  • Increasing the thresholds T i , i = 1 , 2 , provide the following trends:
    The RMSEs, MRABs, and AILs of β i , i = 1 , 2 and R ( t ) decrease, whereas those of μ i , i = 1 , 2 increase.
    The CPs of β i , i = 1 , 2 increase, while the CPs of μ i , i = 1 , 2 decrease.
  • Across most simulation configurations, the CPs of both ACIs and HPD intervals for λ j ( j = 1 , 2 ), R ( t ) , and π closely approximate the nominal 95% level, indicating reliable interval estimation performance.
  • As a recommendation, considering the two competing risk scenarios analyzed using the proposed IAPTIIC framework, we advocate for Bayesian estimation techniques when evaluating the parameters or reliability index of the IW model.

6. Radiobiology Application

Radiation exposure in biological organisms is crucial for understanding its effects on cellular function, genetic stability, and overall health. In radiobiology, toxicology, and medical science, it has been used frequently to explore radiation exposure risks and therapeutic interventions. This application captures the effects of 300 roentgens of radiation on male mice aged 35 to 42 days (5–6 weeks) in a controlled laboratory setting. Its precise measurements and experimental design make it a valuable resource for understanding radiation-induced biological changes; for additional details, see Kundu et al. [21], Alotaibi et al. [37], Alotaibi et al. [38], among others.
In Table 3, the radiation data set (consisting of 77 lifetimes) is distinguished as 0 (lifetime is censoring), 1 (death of life is caused by reticulum cell sarcoma), or 2 (death of life caused by otherwise). Ignoring lifetimes of male mice still alive, in this application, we only examine observations of radiation dose from causes 1 and 2. For computational requirements, each original has been divided by a hundred.
To evaluate the suitability of the IW distribution in modeling the radiation data set, Table 4 presents the results of the Kolmogorov–Smirnov (KS) test, including its respective test statistic and associated p-value at a 5% significance level. In the same table, the fitted values of μ ^ and β ^ (along with their standard-errors (St.Ers)) in addition to their 95% ACI bounds (along with their interval lengths (ILs)) are reported. The hypothesis framework for this goodness-of-fit assessment is formulated as follows:
  • H 0 : The radiation data set follows an IW distribution;
  • H 1 : The radiation data set does not follow an IW distribution.
Table 4 indicates that all estimated p-values exceed the pre-specified significance threshold, so there is insufficient evidence to reject H 0 , supporting the conclusion that the IW lifetime model adequately describes the radiation data. Furthermore, the visual assessments (including contour and probability–probability (PP)) provided in Figure 2 reinforce these findings, aligning with the numerical results in Table 4. Figure 2 also recommends that the fitted values of μ ^ and β ^ (listed in Table 4) be utilized as starting points in the next inferential calculations.
Briefly, using the complete radiation data sets (reported in Table 3), we highlight the superiority of the IW lifespan model by comparing its fitting results to five other lifetime models, namely
  • Inverted-Kumaraswamy (IK( μ , β )) by Abd AL-Fattah et al. [39];
  • Inverted-Lomax (IL( μ , β )) by Kleiber and Kotz [40];
  • Inverted-Pham (IP( μ , β )) by Alqasem et al. [41];
  • Inverted Nadarajah-Haghighi (INH( μ , β )) by Tahir et al. [42];
  • Exponentiated inverted Weibull (EIW( μ , β , θ )) by Flaih et al. [43].
In particular, this comparison is made based on clear criteria, namely (i) negative log-likelihood (NLL); (ii) Akaike information (AI); (iii) consistent AI (CAI); (iv) Bayesian information (BI); (v) Hannan–Quinn information (HQI); and (vi) KS (p-value). Thus, in Table 5, the MLEs (along with their St.Ers) of μ , β , and θ as well as the estimates criteria (i)–(vi) are listed.
Consequently, from the radiation analyzed data using both causes 1 and 2, the results summarized in Table 5 indicate that the IW distribution outperforms all other candidate models. This conclusion is substantiated by the fact that the IW model consistently yields the most favorable outcomes across nearly all criteria, demonstrating the lowest values of all suggested metrics except the highest p-value.
Utilizing Table 3, three IAPTIIC competing risk samples are generated with m = 15 under various combinations of T i , i = 1 , 2 , and S (see Table 6). The point estimation findings (along with their corresponding St.Ers) of μ i , β i , i = 1 , 2 , and R ( t ) include both likelihood and Bayesian inferences obtained; see Table 7. In the same table, 95% ACI/HPD interval limits (along with their corresponding ILs) are computed. By performing 10,000 MCMC iterations as a burn-in from M = 40 , 000 , Bayesian computations are performed. A comparative analysis in Table 7 reveals that the Bayesian MCMC estimates consistently outperform the likelihood-based results in terms of lower standard errors and narrower interval widths, indicating enhanced precision. Again, from S i for i = 1 , 2 , 3 , the estimated relative risks (ERRs) due to causes 1 and 2 using the invariance property of μ i and β i , i = 1 , 2 , are computed and reported in Table 7.
We noticed that, from Table 7, the ERR outcomes related to cause 1 increased when the removals were done in the last stages compared to the first (or middle stages), while those related to cause 2 increased when the removals were done in the first stages compared to the last (or middle) stages.
Furthermore, based on all samples listed in Table 3, Figure 3 presents the profile log-likelihood curves of μ i and β i , i = 1 , 2 . The results support the fitted values provided in Table 7, demonstrating that the fitted MLEs μ ^ i and β ^ i , i = 1 , 2 of μ i and β i , i = 1 , 2 , respectively, exist and are unique, confirming the stability and reliability of the estimation process.
To assess the convergence behavior and mixing efficiency of the acquired remaining 30,000 MCMC iterations of μ i , β i (for i = 1 , 2 ), and R ( t ) from radiation data, both density and trace plots of the estimated parameters are generated for each sampled data set listed in Table 3. These visual diagnostics are presented in Figure 4. It indicates that for all unknown parameters μ i , β i (for i = 1 , 2 ), and R ( t ) , the posterior density functions exhibit near-symmetry as their normal proposals. Additionally, the trace plots demonstrate effective mixing, confirming that the Markov chains have achieved convergence, ensuring the reliability of the Bayesian inference.

7. Concluding Remarks

This study addressed the challenge of estimating unknown parameters and the reliability function of the inverted-Weibull distribution under improved adaptive progressively Type-II censored competing risks data. By employing both classical and Bayesian estimation approaches, the research provided a robust framework for reliability analysis in the presence of competing risks. The classical framework employs maximum likelihood estimation to derive point estimates and approximate confidence intervals, while the Bayesian approach utilizes Markov Chain Monte Carlo techniques to compute Bayes estimates and the highest posterior density credible intervals. A comprehensive simulation study demonstrated the accuracy and efficiency of the proposed methods across various experimental scenarios, highlighting their practical applicability. It evaluates estimators using metrics such as RMSE, MRAB, AIL, and CP across varied scenarios involving sample sizes, censoring rates, and time thresholds. The simulations, which were repeated 1000 times for each scenario, confirm the high accuracy and reliability of Bayesian methods based on the Metropolis–Hastings algorithm compared to traditional methods. The proposed point and interval estimation methods perform well under left- and right-censoring for cases μ i , i = 1 , 2 and β i , i = 1 , 2 , respectively, while middle-censoring is the ideal for the reliability index R ( t ) . A significant radiation application is analyzed from a practical perspective to demonstrate the feasibility of the suggested approaches. In summary, the research findings using data sets from the radiobiology sector provide valuable insights into the inverted-Weibull lifetime model, particularly when an improved adaptive progressive censored competing risk data set is constructed. One limitation of the current study is the assumption of independence among latent failure times, which may not be appropriate when the causes of failure are correlated. In such cases, a dependent competing risks model would be more suitable for analyzing the data. Another limitation concerns the use of the improved adaptive progressive Type-II censoring scheme, which is most effective when the units under study have long lifespans. If the duration of the experiment is not a major constraint, traditional censoring schemes, such as the standard progressive Type-II censoring, may be more appropriate. Finally, the Bayesian estimation approach, while flexible and informative, is computationally intensive and more costly. In scenarios where prior information about the unknown parameters is unavailable, it is advisable to use classical estimation methods to reduce computational burden and save time. As a direction for future research, it would be valuable to compare the inverted Weibull model with alternative lifetime distributions or machine learning-based approaches to address situations where the true underlying distribution is unknown; see Meyer et al. [44] for additional details.

Author Contributions

Methodology, R.A., M.N. and A.E.; Funding acquisition, R.A.; Software, A.E.; Supervision M.N.; Writing—original draft, M.N. and A.E.; Writing—review & editing R.A. and M.N. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2025R50), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.

Data Availability Statement

The authors confirm that the data supporting the findings of this study are available within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A. Simulation Tables

In this part, all simulation results of μ i , β i , i = 1 , 2 , and R ( t ) are presented.
Table A1. The point estimation results of μ 1 .
Table A1. The point estimation results of μ 1 .
nRemovalsMLEBayes
Prior-1Prior-2
( T 1 , T 2 ) = ( 1.25 , 1.75 )
40[1]2.0243.9861.6932.4331.3330.8151.8180.9970.623
[2]2.0504.2501.7381.6051.4080.8491.8911.0310.645
[3]1.9954.5281.7611.5591.5620.9211.6331.1120.690
[4]1.9613.2981.5481.8901.1150.6851.3720.9150.566
[5]2.2243.6981.6881.9941.2940.7571.8590.9870.600
[6]2.2193.4671.6111.9861.2390.7001.6780.9460.581
60[1]2.2592.3381.4172.0850.9840.6111.3770.7580.457
[2]2.3692.6981.4632.1111.0300.6321.8670.8220.501
[3]2.4302.9831.5152.1291.0900.6591.8860.8770.524
[4]1.9941.9251.2392.0200.8080.5211.5320.6360.383
[5]2.5252.1411.3652.3480.8720.5801.7580.7520.449
[6]2.4971.9881.3132.3660.8380.5581.2640.6450.396
80[1]2.2391.7700.9422.2050.6350.4361.7720.5210.309
[2]2.7051.8360.9852.5330.6740.4871.5390.5720.347
[3]2.6181.8861.1592.4660.7250.5091.4300.6280.374
[4]2.3911.5740.7451.9590.5550.3131.2990.3250.162
[5]2.7141.6100.8852.2830.6010.4031.1590.4300.267
[6]2.8421.5950.7892.3730.5610.3591.3990.3840.181
( T 1 , T 2 ) = ( 1.75 , 2.50 )
40[1]2.6624.1921.8172.1661.2250.8761.4171.0260.630
[2]1.7284.3591.9822.0571.4740.9091.6221.1330.683
[3]1.9684.7032.0831.9681.5640.9691.5401.2550.762
[4]2.0643.6481.5422.0641.0600.6871.4330.9320.562
[5]2.0973.9771.6962.0971.2070.7601.8831.0060.624
[6]2.1673.7511.6412.1671.1740.7161.5950.9760.612
60[1]2.3572.9001.5132.1360.9460.6062.1110.7900.514
[2]2.3573.1801.5202.3570.9630.6261.8550.8850.547
[3]2.2683.4491.5382.2681.0220.6411.5840.9020.552
[4]2.1522.5151.4342.1520.8580.5481.3800.6530.387
[5]2.4582.7651.5032.0460.9260.5941.5500.7500.478
[6]2.4932.6451.4422.2490.8990.5572.1340.7200.428
80[1]2.3842.2331.3472.3840.6860.4241.8050.5030.292
[2]2.6372.3371.4142.6370.7280.4411.5910.5170.300
[3]2.6102.4111.4282.6100.7570.4832.4480.5700.337
[4]2.3341.8631.2052.0330.5180.3301.9480.3110.160
[5]2.8632.1291.3032.1630.6420.3902.0440.4660.290
[6]2.7682.0211.2942.0270.6110.3771.4450.3630.169
Table A2. The point estimation results of μ 2 .
Table A2. The point estimation results of μ 2 .
nRemovalsMLEBayes
Prior-1Prior-2
( T 1 , T 2 ) = ( 1.25 , 1.75 )
40[1]0.7800.6591.1740.4790.4660.8920.4700.3860.735
[2]0.7600.6861.1870.5860.4780.9860.4660.3950.757
[3]0.7400.7241.2270.5510.5261.0070.4170.4240.824
[4]0.6990.5931.1460.5120.4380.8540.4590.3640.704
[5]0.7120.6261.1630.4620.4560.8820.4170.3750.720
[6]0.7340.6061.1560.5040.4490.8780.4500.3720.711
60[1]0.7480.5761.1250.5880.3860.8220.5310.3400.646
[2]0.7480.5771.1310.5880.4050.8350.5310.3440.652
[3]0.7290.5831.1390.5310.4250.8440.4830.3570.672
[4]0.7060.5601.1020.5470.3290.7270.5250.3120.607
[5]0.7050.5701.1200.5330.3630.7920.4560.3350.635
[6]0.7260.5651.1130.5710.3360.7450.4930.3230.623
80[1]0.7540.5411.0780.6080.3050.6430.5820.2580.578
[2]0.7360.5491.0900.6110.3190.6620.5350.2850.586
[3]0.7180.5511.0980.5780.3200.6970.5030.2970.599
[4]0.6800.5221.0270.6700.2760.5660.5210.1950.501
[5]0.6920.5381.0650.6080.2980.6020.4840.2380.567
[6]0.7120.5291.0450.6060.2820.5840.4900.2190.531
( T 1 , T 2 ) = ( 1.75 , 2.50 )
40[1]0.7711.3871.2480.4680.5180.9260.4500.4040.749
[2]0.7911.6401.2490.6300.5370.9440.4930.4270.794
[3]0.8031.7651.2720.5910.5451.0380.4420.4790.830
[4]0.7490.9621.2260.5040.4550.8800.4450.3680.708
[5]0.7821.1341.2340.5270.4970.9040.4670.3810.722
[6]0.7740.9961.2300.5300.4760.8950.4660.3750.716
60[1]0.7640.8561.2110.5870.4250.8230.5180.3490.671
[2]0.7840.9181.2150.6040.4280.8390.5440.3570.689
[3]0.7910.9461.2160.5630.4320.8430.5120.3610.691
[4]0.7360.7321.1940.5390.3890.7860.5110.3170.643
[5]0.7720.8151.2080.5780.4170.8090.4880.3430.667
[6]0.7700.7861.2070.5830.3960.7990.5020.3300.653
80[1]0.7550.6391.1770.6070.3600.6900.5790.2810.578
[2]0.7750.6601.1810.6280.3710.7290.5450.2980.599
[3]0.7790.6991.1830.6090.3750.7480.5200.3080.610
[4]0.7320.5721.1300.6860.3170.5900.5220.2650.545
[5]0.7580.6091.1640.5880.3580.6760.4560.2790.567
[6]0.7570.5861.1390.6390.3310.6250.5000.2710.557
Table A3. The point estimation results of β 1 .
Table A3. The point estimation results of β 1 .
nRemovalsMLEBayes
Prior-1Prior-2
( T 1 , T 2 ) = ( 1.25 , 1.75 )
40[1]0.7651.4151.2550.4330.4070.5490.6060.3480.470
[2]0.5751.6261.6290.4850.5260.6280.8500.4220.556
[3]0.6571.3251.2060.6440.3980.5390.6040.3400.443
[4]0.5951.2141.1820.4320.3900.5280.4760.3270.428
[5]0.5721.1030.9530.3760.3800.5050.4240.3080.421
[6]0.6730.9810.9390.5290.3610.4670.4140.3050.420
60[1]0.8220.7590.8660.5160.3480.4600.5160.2940.414
[2]0.7580.8240.9130.4890.3490.4620.5380.3030.414
[3]0.7070.6680.8360.4600.3420.4520.3880.2860.406
[4]0.7650.5760.8270.3660.3370.4360.4470.2840.375
[5]0.7360.5460.8010.3730.3250.4320.4310.2710.356
[6]0.7410.4890.7110.5150.3230.4230.6170.2580.347
80[1]0.8550.4440.6310.3890.3140.4200.4520.2300.339
[2]0.8730.4670.6520.4810.3170.4220.5400.2460.346
[3]0.7280.4240.5870.5250.3010.4140.5980.2280.284
[4]0.8170.3410.5490.5110.2950.4080.4770.2190.278
[5]0.7390.3240.5570.4130.2770.3980.4070.2140.271
[6]0.7740.3080.5160.3920.2640.3370.4750.2080.259
( T 1 , T 2 ) = ( 1.75 , 2.50 )
40[1]1.2241.0241.5110.4470.3860.5230.6610.3680.502
[2]1.0691.1811.6580.5550.4480.5680.8660.4250.535
[3]1.1560.9241.3670.6820.3710.4850.7450.3580.453
[4]0.9980.8831.3670.5130.3680.4650.5350.3340.446
[5]1.0780.7831.3360.5300.3560.4530.5260.3260.439
[6]0.9330.7251.2920.5050.3540.4280.4130.3150.424
60[1]1.1720.6941.1910.6980.3360.4160.6610.2950.402
[2]1.0550.7101.2050.6800.3420.4250.6790.3010.410
[3]1.1720.6821.1830.6980.3330.4040.6610.2840.399
[4]1.0210.6721.1770.4190.3310.3890.4870.2780.387
[5]1.0910.6691.1320.5270.3230.3790.5530.2730.372
[6]0.8800.6561.1210.5980.3130.3710.6350.2670.362
80[1]1.1390.6011.0970.5370.2850.3580.5620.2590.343
[2]1.0640.6381.0990.5390.2910.3670.5680.2600.350
[3]1.0480.5671.0220.5760.2770.3510.6130.2490.330
[4]1.0040.5560.9350.4880.2570.3450.4470.2220.320
[5]1.0490.4750.8800.4650.2370.3180.4340.1880.240
[6]0.9400.4260.7630.7230.2200.2970.7000.1750.236
Table A4. The point estimation results of β 2 .
Table A4. The point estimation results of β 2 .
nRemovalsMLEBayes
Prior-1Prior-2
( T 1 , T 2 ) = ( 1.25 , 1.75 )
40[1]1.4970.7160.5190.9700.6840.4421.1960.5490.335
[2]1.4410.6160.4250.8380.5720.3860.9970.5350.325
[3]1.1880.6070.3701.6530.5440.3241.3710.4990.275
[4]1.2140.5220.3170.9990.4570.2631.0900.4240.256
[5]1.3320.5500.3351.1370.4710.2901.2030.4400.267
[6]1.2730.5110.2851.1240.4420.2261.2990.4020.215
60[1]1.4370.4800.2611.2360.4100.2251.2810.3830.214
[2]1.3590.4550.2450.9210.3950.2211.0120.3710.204
[3]1.1790.4390.2271.2060.3880.2191.2850.3570.181
[4]1.2160.4040.2091.1780.3720.1971.2560.3470.167
[5]1.3520.4220.2221.2930.3790.2181.4020.3490.170
[6]1.2470.3970.1891.0250.3670.1861.0990.3460.162
80[1]1.4260.3860.1831.4110.3560.1731.4970.3050.148
[2]1.3620.3760.1791.2920.3410.1591.3620.2960.141
[3]1.1760.3650.1761.0740.3330.1491.1170.2950.137
[4]1.1850.3520.1631.3510.3100.1381.1810.2780.125
[5]1.3130.3590.1671.5460.3280.1411.3270.2840.134
[6]1.2420.3430.1421.2440.3080.1311.3400.2640.122
( T 1 , T 2 ) = ( 1.75 , 2.50 )
40[1]1.8860.6960.3411.0980.5270.2921.2840.4680.287
[2]1.9460.6380.3321.1160.4910.2881.2340.4360.240
[3]1.6550.5790.2881.7890.4900.2731.8410.3990.205
[4]1.7720.5250.2621.1880.4680.2531.2220.3790.186
[5]1.7970.5430.2761.2630.4770.2671.3000.3880.204
[6]1.6510.5130.2561.3760.4530.2471.4510.3670.186
60[1]1.8140.5110.2521.2780.4070.2191.3210.3610.182
[2]1.8670.4720.2451.2530.3840.1971.2750.3440.179
[3]1.8670.4690.2401.2530.3750.1861.2750.3310.172
[4]1.7670.4450.2231.5710.3360.1671.5620.3180.154
[5]1.7970.4550.2311.6630.3380.1711.6760.3260.165
[6]1.5140.4210.2161.3710.3330.1671.3420.3100.138
80[1]1.7970.3810.2011.7520.3150.1621.7460.2920.128
[2]1.8370.3770.1981.5650.3090.1501.5610.2800.120
[3]1.6580.3410.1791.3810.3030.1481.3510.2600.117
[4]1.7330.3160.1531.7570.2810.1361.4780.2550.101
[5]1.7590.3290.1671.8350.2930.1421.5630.2570.110
[6]1.6320.2820.1471.5960.2600.1291.5840.1840.093
Table A5. The point estimation results of R ( t ) .
Table A5. The point estimation results of R ( t ) .
nRemovalsMLEBayes
Prior-1Prior-2
( T 1 , T 2 ) = ( 1.25 , 1.75 )
40[1]0.9730.1850.2410.9620.1270.1850.9850.1150.064
[2]0.9920.1750.1950.9810.1160.1570.9920.0930.056
[3]0.9830.1780.2290.9580.1210.1680.9580.1060.059
[4]0.9830.1600.1790.9720.1110.1250.9670.0840.056
[5]0.9910.1480.1480.9600.1050.0890.9520.0680.053
[6]0.9830.1560.1680.9620.1090.1050.9560.0750.054
60[1]0.9860.1430.1380.9840.0950.0820.9810.0620.052
[2]0.9860.1320.1220.9700.0750.0700.9600.0500.048
[3]0.9920.1370.1280.9820.0840.0780.9740.0550.050
[4]0.9810.1270.1150.9740.0660.0640.9720.0470.048
[5]0.9920.1070.1020.9610.0540.0490.9830.0390.045
[6]0.9830.1170.1080.9730.0600.0540.9710.0440.045
80[1]0.9480.0960.0960.9900.0510.0490.9820.0350.038
[2]0.9540.0820.0870.9840.0480.0460.9880.0310.035
[3]0.9580.0860.0920.9900.0500.0480.9770.0340.037
[4]0.9820.0770.0820.9860.0470.0440.9790.0280.032
[5]0.9330.0670.0720.9950.0410.0380.9620.0220.028
[6]0.9660.0710.0760.9840.0460.0410.9740.0260.031
( T 1 , T 2 ) = ( 1.75 , 2.50 )
40[1]0.9790.1520.1780.9720.0970.0950.9860.0820.063
[2]0.9580.1360.1540.9940.0730.0810.9950.0690.059
[3]0.9610.1430.1670.9640.0830.0870.9690.0760.060
[4]0.9770.1290.1430.9780.0690.0770.9690.0660.057
[5]0.9870.1140.1290.9670.0620.0650.9560.0570.051
[6]0.9880.1240.1370.9810.0650.0700.9700.0620.054
60[1]0.9890.1100.1240.9930.0610.0620.9890.0510.049
[2]0.9450.0980.1120.9940.0580.0570.9880.0430.040
[3]0.9540.1050.1170.9940.0590.0580.9880.0480.044
[4]0.9950.0870.1080.9780.0570.0560.9750.0410.037
[5]0.9820.0780.0990.9790.0530.0520.9890.0350.030
[6]0.9550.0790.1020.9870.0550.0540.9800.0380.034
80[1]0.9870.0740.0940.9870.0500.0440.9830.0320.028
[2]0.9790.0670.0830.9740.0430.0420.9910.0270.023
[3]0.9900.0710.0870.9810.0460.0430.9840.0300.025
[4]0.9910.0620.0790.9860.0410.0390.9810.0240.022
[5]0.9720.0570.0720.9720.0360.0330.9870.0190.018
[6]0.9800.0590.0750.9800.0370.0350.9800.0220.021
Table A6. The 95% interval estimation results of μ 1 .
Table A6. The 95% interval estimation results of μ 1 .
nRemovals(1.25, 1.75)(1.75, 2.50)
ACIHPDACIHPD
Prior-1Prior-2 Prior-1Prior-2
40[1]2.2680.9371.5630.9421.3350.9482.3300.9351.8440.9391.4150.944
[2]2.3260.9361.7950.9411.3840.9482.4470.9342.1990.9381.4720.944
[3]2.3790.9341.9360.9391.3970.9462.5000.9322.2450.9361.5260.942
[4]1.9430.9421.4630.9481.2990.9532.0790.9401.5830.9441.3250.949
[5]2.1800.9391.5180.9451.3250.9502.2190.9371.7890.9411.3710.946
[6]2.0450.9411.4920.9471.3060.9522.1750.9391.6560.9431.3390.948
60[1]1.5800.9461.3660.9521.2120.9571.7860.9441.3680.9481.3030.953
[2]1.6050.9441.3860.9501.2340.9551.8450.9421.4500.9461.3110.951
[3]1.8720.9421.4240.9481.2450.9531.9990.9401.5270.9441.3140.949
[4]1.4130.9501.2160.9571.1410.9611.6300.9481.2640.9541.2480.957
[5]1.5240.9471.3180.9531.1940.9581.7250.9451.3450.9491.2830.954
[6]1.4620.9491.2820.9551.1760.9601.5990.9471.3090.9511.2500.956
80[1]1.2960.9541.0190.9600.9800.9651.3480.9521.1420.9561.0250.961
[2]1.3270.9531.0860.9591.0620.9641.4220.9511.1940.9551.1750.960
[3]1.3670.9521.1860.9561.1080.9631.5440.9501.2300.9531.1840.959
[4]0.9850.9580.7280.9640.6640.9691.0130.9560.8170.9600.6710.965
[5]1.2180.9560.9900.9620.8590.9671.2810.9541.0360.9580.8700.963
[6]1.0340.9570.8130.9610.7950.9681.1270.9550.9420.9580.8420.964
Table A7. The 95% interval estimation results of μ 2 .
Table A7. The 95% interval estimation results of μ 2 .
nRemovals(1.25, 1.75)(1.75, 2.50)
ACIHPDACIHPD
Prior-1Prior-2 Prior-1Prior-2
40[1]1.5120.9471.3580.9511.1790.9521.6830.9431.5680.9471.1910.950
[2]1.6670.9421.4740.9461.2260.9482.0790.9381.7700.9421.2480.947
[3]1.5850.9441.4170.9481.1940.9491.8260.9401.7400.9441.2370.947
[4]1.3760.9501.2320.9541.1240.9541.6150.9461.3820.9501.1670.952
[5]1.4370.9491.2580.9531.1410.9531.6660.9451.4330.9491.1780.950
[6]1.4620.9471.2960.9511.1680.9521.6770.9431.5250.9471.1800.950
60[1]1.2000.9571.1770.9581.0730.9611.3320.9531.2900.9541.0830.959
[2]1.3180.9521.2170.9551.1070.9561.5460.9481.3210.9511.1470.954
[3]1.2710.9551.2090.9581.0900.9591.4660.9511.2960.9541.1070.957
[4]1.1150.9581.1080.9611.0330.9621.3070.9541.2470.9571.0220.960
[5]1.1420.9571.1290.9601.0590.9611.3190.9531.2710.9561.0550.959
[6]1.1660.9571.1540.9601.0710.9611.3280.9531.2780.9561.0600.959
80[1]1.0110.9610.8940.9630.8220.9651.1790.9571.0380.9590.8490.963
[2]1.1000.9591.0070.9620.9980.9621.2720.9551.1680.9581.0000.960
[3]1.0140.9600.9680.9620.9290.9631.2180.9561.1140.9580.9970.961
[4]0.9270.9620.8310.9660.7710.9671.0140.9580.8650.9620.7820.965
[5]0.9610.9610.8520.9640.7950.9671.1250.9570.9010.9600.7980.964
[6]0.9860.9610.8750.9630.8170.9661.1590.9571.0090.9590.8180.964
Table A8. The 95% interval estimation results of β 1 .
Table A8. The 95% interval estimation results of β 1 .
nRemovals(1.25, 1.75)(1.75, 2.50)
ACIHPDACIHPD
Prior-1Prior-2 Prior-1Prior-2
40[1]1.9640.9291.3500.9421.0500.9461.6820.9331.1070.9460.9250.947
[2]2.1880.9271.4190.9401.1370.9441.8740.9311.1340.9440.9960.945
[3]1.8960.9311.2990.9440.9680.9481.4320.9350.9970.9480.9090.949
[4]1.6810.9341.2500.9450.9440.9491.3940.9380.9870.9490.8960.951
[5]1.5930.9361.2190.9460.9200.9501.3240.9400.9720.9500.8780.952
[6]1.3470.9391.1860.9480.9060.9511.2650.9430.9670.9520.8540.953
60[1]1.1850.9420.9900.9490.8550.9521.1550.9460.9550.9530.8370.954
[2]1.2540.9411.0980.9490.8780.9521.2240.9450.9660.9530.8400.954
[3]1.1740.9430.9870.9490.8370.9521.0570.9470.9390.9530.8140.954
[4]1.1150.9430.9780.9500.8250.9531.0090.9470.9270.9540.7990.955
[5]1.0050.9440.9370.9510.8030.9540.9870.9480.9210.9550.7840.956
[6]0.9970.9450.9170.9520.7620.9550.9150.9490.8950.9560.7750.957
80[1]0.9020.9460.8870.9530.7260.9560.8320.9500.7950.9570.7320.958
[2]0.9430.9460.9070.9520.7590.9550.8920.9500.8260.9560.7450.957
[3]0.8960.9470.8460.9540.6960.9570.7940.9510.7450.9570.6940.960
[4]0.8840.9480.7790.9560.6690.9570.7630.9520.6850.9590.6780.960
[5]0.8580.9480.7460.9560.6180.9590.7130.9520.6500.9600.6480.961
[6]0.8350.9490.7100.9570.5850.9600.6750.9530.6270.9610.5730.963
Table A9. The 95% interval estimation results of β 2 .
Table A9. The 95% interval estimation results of β 2 .
nRemovals(1.25, 1.75)(1.75, 2.50)
ACIHPDACIHPD
Prior-1Prior-2 Prior-1Prior-2
40[1]1.6090.9271.4580.9321.2100.9361.6030.9261.1710.9351.1120.939
[2]1.8040.9241.5300.9291.3360.9351.7620.9231.2030.9321.1710.938
[3]1.5960.9291.4100.9321.1640.9381.5480.9281.1440.9370.9900.941
[4]1.5380.9301.3220.9341.1150.9391.4710.9291.1340.9370.9520.942
[5]1.4060.9311.2670.9361.0170.9391.3860.9301.1040.9390.9420.942
[6]1.3850.9331.2020.9370.9920.9431.3680.9311.0280.9400.9060.945
60[1]1.3190.9341.1080.9380.9290.9441.2680.9341.0120.9410.8760.946
[2]1.3480.9341.1380.9370.9690.9441.3090.9331.0240.9400.8910.946
[3]1.2870.9351.0930.9390.9080.9441.2490.9340.9750.9430.8710.946
[4]1.2390.9361.0570.9390.8730.9451.2140.9350.9280.9440.8420.948
[5]1.1150.9381.0440.9410.8260.9471.1150.9370.9040.9460.7980.950
[6]1.0960.9390.9270.9420.7890.9491.1060.9370.8830.9470.7530.951
80[1]1.0690.9400.8750.9440.7030.9501.0160.9380.8370.9470.7080.952
[2]1.0850.9390.9190.9440.7620.9491.0760.9380.8560.9470.7320.951
[3]1.0660.9400.8280.9440.6950.9500.9860.9390.8270.9480.6960.952
[4]0.9610.9410.8170.9450.6780.9510.9510.9400.7710.9500.6670.952
[5]0.9190.9410.8050.9450.6530.9510.9020.9400.7010.9510.6390.953
[6]0.8910.9420.7170.9470.6390.9520.8800.9410.6310.9520.6070.954
Table A10. The 95% interval estimation results of R ( t ) .
Table A10. The 95% interval estimation results of R ( t ) .
nRemovals(1.25, 1.75)(1.75, 2.50)
ACIHPDACIHPD
Prior-1Prior-2 Prior-1Prior-2
40[1]0.4160.9420.2170.9490.1390.9530.3750.9450.1360.9520.1020.954
[2]0.3370.9470.1590.9540.0950.9570.3000.9480.1090.9550.0840.959
[3]0.3840.9440.1900.9510.1210.9550.3530.9460.1280.9530.0850.956
[4]0.3130.9480.1290.9560.0900.9580.2690.9500.0980.9560.0790.960
[5]0.2450.9530.1110.9570.0840.9590.2150.9540.0780.9590.0740.960
[6]0.2770.9510.1180.9570.0890.9580.2400.9520.0870.9580.0760.960
60[1]0.2130.9550.1060.9570.0800.9590.1990.9560.0720.9590.0660.962
[2]0.1650.9580.0820.9600.0710.9620.1450.9590.0600.9620.0580.963
[3]0.1860.9570.0950.9580.0750.9600.1730.9570.0680.9600.0610.962
[4]0.1570.9580.0660.9620.0630.9620.1350.9590.0570.9620.0520.964
[5]0.1210.9600.0610.9630.0510.9640.1000.9610.0440.9630.0430.965
[6]0.1380.9590.0630.9620.0570.9630.1160.9610.0500.9630.0470.965
80[1]0.1110.9600.0550.9630.0450.9650.0860.9630.0400.9640.0390.966
[2]0.0930.9620.0450.9640.0350.9660.0700.9640.0340.9660.0310.967
[3]0.1010.9610.0480.9640.0410.9660.0770.9640.0370.9660.0330.967
[4]0.0820.9620.0420.9650.0320.9670.0590.9650.0300.9670.0230.968
[5]0.0590.9640.0360.9650.0210.9690.0540.9650.0210.9670.0160.969
[6]0.0680.9630.0400.9650.0260.9680.0580.9650.0250.9670.0190.968

References

  1. Balakrishnan, N.; Kannan, N.; Lin, C.T.; Wu, S.J.S. Inference for the extreme value distribution under progressive Type-II censoring. J. Stat. Comput. Simul. 2004, 74, 25–45. [Google Scholar] [CrossRef]
  2. Balakrishnan, N.; Hossain, A. Inference for the Type II generalized logistic distribution under progressive Type II censoring. J. Stat. Comput. Simul. 2007, 77, 1013–1031. [Google Scholar] [CrossRef]
  3. Wu, M.; Gui, W. Estimation and prediction for Nadarajah-Haghighi distribution under progressive type-II censoring. Symmetry 2021, 13, 999. [Google Scholar] [CrossRef]
  4. Dey, S.; Elshahhat, A.; Nassar, M. Analysis of progressive type-II censored gamma distribution. Comput. Stat. 2023, 38, 481–508. [Google Scholar] [CrossRef]
  5. Ng, H.K.T.; Kundu, D.; Chan, P.S. Statistical analysis of exponential lifetimes under an adaptive Type-II progressive censoring scheme. Nav. Res. Logist. 2009, 56, 687–698. [Google Scholar] [CrossRef]
  6. Kundu, D.; Joarder, A. Analysis of Type-II progressively hybrid censored data. Comput. Stat. Data Anal. 2006, 50, 2509–2528. [Google Scholar] [CrossRef]
  7. Sobhi, M.M.A.; Soliman, A.A. Estimation for the exponentiated Weibull model with adaptive Type-II progressive censored schemes. Appl. Math. Model. 2016, 40, 1180–1192. [Google Scholar] [CrossRef]
  8. Kohansal, A.; Shoaee, S. Bayesian and classical estimation of reliability in a multicomponent stress-strength model under adaptive hybrid progressive censored data. Stat. Pap. 2021, 62, 309–359. [Google Scholar] [CrossRef]
  9. Panahi, H.; Asadi, S. On adaptive progressive hybrid censored Burr type III distribution: Application to the nano droplet dispersion data. Qual. Technol. Quant. Manag. 2021, 18, 179–201. [Google Scholar] [CrossRef]
  10. Haj Ahmad, H.; Salah, M.M.; Eliwa, M.S.; Ali Alhussain, Z.; Almetwally, E.M.; Ahmed, E.A. Bayesian and non-Bayesian inference under adaptive type-II progressive censored sample with exponentiated power Lindley distribution. J. Appl. Stat. 2022, 49, 2981–3001. [Google Scholar] [CrossRef]
  11. Vardani, M.H.; Panahi, H.; Behzadi, M.H. Statistical inference for marshall-olkin bivariate Kumaraswamy distribution under adaptive progressive hybrid censored dependent competing risks data. Phys. Scr. 2024, 99, 085272. [Google Scholar] [CrossRef]
  12. Yu, J.; Wu, C.; Luo, P. Monitoring the inverted exponentiated half logistic quantiles under the adaptive progressive type II hybrid censoring scheme. J. Appl. Stat. 2025, 52, 59–96. [Google Scholar] [CrossRef]
  13. Yan, W.; Li, P.; Yu, Y. Statistical inference for the reliability of Burr-XII distribution under improved adaptive Type-II progressive censoring. Appl. Math. Model. 2021, 95, 38–52. [Google Scholar] [CrossRef]
  14. Dutta, S.; Kayal, S. Inference of a competing risks model with partially observed failure causes under improved adaptive type-II progressive censoring. Proc. Inst. Mech. Eng. Part O J. Risk Reliab. 2023, 237, 765–780. [Google Scholar] [CrossRef]
  15. Nassar, M.; Elshahhat, A. Estimation procedures and optimal censoring schemes for an improved adaptive progressively type-II censored Weibull distribution. J. Appl. Stat. 2024, 51, 1664–1688. [Google Scholar] [CrossRef]
  16. Dutta, S.; Alqifari, H.N.; Almohaimeed, A. Bayesian and non-bayesian inference for logistic-exponential distribution using improved adaptive type-II progressively censored data. PLoS ONE 2024, 19, e0298638. [Google Scholar] [CrossRef]
  17. Zhang, L.; Yan, R. Parameter estimation of Chen distribution under improved adaptive type-II progressive censoring. J. Stat. Comput. Simul. 2024, 94, 2830–2861. [Google Scholar] [CrossRef]
  18. Irfan, M.; Dutta, S.; Sharma, A.K. Statistical inference and optimal plans for improved adaptive type-II progressive censored data following Kumaraswamy-G family of distributions. Phys. Scr. 2025, 100, 025213. [Google Scholar] [CrossRef]
  19. Crowder, M.J. Classical Competing Risks; Chapman Hall: Boca Raton, FL, USA, 2001. [Google Scholar]
  20. Cox, D.R. The analysis of exponentially distributed life-times with two types of failure. J. R. Stat. Soc. Ser. B Stat. Methodol. 1959, 21, 411–421. [Google Scholar] [CrossRef]
  21. Kundu, D.; Kannan, N.; Balakrishnan, N. Analysis of progressively censored competing risks data. Handb. Stat. 2003, 23, 331–348. [Google Scholar]
  22. Sarhan, A.M. Analysis of incomplete, censored data in competing risks models with generalized exponential distributions. IEEE Trans. Reliab. 2007, 56, 132–138. [Google Scholar] [CrossRef]
  23. Zhang, Z. Survival analysis in the presence of competing risks. Ann. Transl. Med. 2017, 5, 47. [Google Scholar] [CrossRef] [PubMed]
  24. Fan, T.H.; Wang, Y.F.; Ju, S.K. A competing risks model with multiply censored reliability data under multivariate Weibull distributions. IEEE Trans. Reliab. 2019, 68, 462–475. [Google Scholar] [CrossRef]
  25. Ren, J.; Gui, W. Inference and optimal censoring scheme for progressively Type-II censored competing risks model for generalized Rayleigh distribution. Comput. Stat. 2021, 36, 479–513. [Google Scholar] [CrossRef]
  26. Tian, Y.; Liang, Y.; Gui, W. Inference and optimal censoring scheme for a competing-risks model with type-II progressive censoring. Math. Popul. Stud. 2024, 31, 1–39. [Google Scholar] [CrossRef]
  27. Elshahhat, A.; Nassar, M. Inference of improved adaptive progressively censored competing risks data for Weibull lifetime models. Stat. Pap. 2024, 65, 1163–1196. [Google Scholar] [CrossRef]
  28. Keller, A.Z.; Kanath, A.R.R. Alternate reliability models for mechanical systems. In Proceedings of the Third International Conference on Reliability and Maintainability, Toulouse, France, 18–22 October 1982; pp. 411–415. [Google Scholar]
  29. AL-Essa, L.A.; Al-Duais, F.S.; Aydi, W.; AL-Rezami, A.Y.; ALdosari, F.M. Statistical inference based on lower record values for the inverse Weibull distribution under the modified loss function. Alex. Eng. J. 2023, 77, 31–40. [Google Scholar] [CrossRef]
  30. Jana, N.; Bera, S. Estimation of multicomponent system reliability for inverse Weibull distribution using survival signature. Stat. Pap. 2024, 65, 5077–5108. [Google Scholar] [CrossRef]
  31. Mou, Z.; Liu, G.; Chiang, J.Y.; Chen, S. Inference on the reliability of inverse Weibull with multiply Type-I censored data. J. Stat. Comput. Simul. 2024, 94, 2189–2209. [Google Scholar] [CrossRef]
  32. El Azm, W.A.; Aldallal, R.; Aljohani, H.M.; Nassr, S.G. Estimations of competing lifetime data from inverse Weibull distribution under adaptive progressively hybrid censored. Math. Biosci. Eng. 2022, 19, 6252–6276. [Google Scholar] [CrossRef]
  33. Samia, A.S.; Osama, E.; Amarat, A.K. Statistical analysis of inverse Weibull distribution based on generalized progressive hybrid Type-I censoring with competing risks. Pak. J. Stat. 2024, 40, 53–80. [Google Scholar]
  34. Alotaibi, R.; Rezk, H.; Park, C. Parameter estimation of inverse Weibull distribution under competing risks based on the expectation–maximization algorithm. Qual. Reliab. Eng. Int. 2024, 40, 3795–3808. [Google Scholar] [CrossRef]
  35. Henningsen, A.; Toomet, O. maxLik: A package for maximum likelihood estimation in R. Comput. Stat. 2011, 26, 443–458. [Google Scholar] [CrossRef]
  36. Plummer, M.; Best, N.; Cowles, K.; Vines, K. coda: Convergence diagnosis and output analysis for MCMC. R News 2006, 6, 7–11. [Google Scholar]
  37. Alotaibi, R.; Nassar, M.; Elshahhat, A. Analysis of Xgamma distribution using adaptive Type-I progressively censored competing risks data with applications. J. Radiat. Res. Appl. Sci. 2024, 17, 101051. [Google Scholar] [CrossRef]
  38. Alotaibi, R.; Nassar, M.; Khan, Z.A.; Alajlan, W.A.; Elshahhat, A. Analysis and data modelling of electrical appliances and radiation dose from an adaptive progressive censored XGamma competing risk model. J. Radiat. Res. Appl. Sci. 2025, 18, 101188. [Google Scholar] [CrossRef]
  39. Abd AL-Fattah, A.M.; El-Helbawy, A.A.; Al-Dayian, G.R. Inverted Kumaraswamy distribution: Properties and estimation. Pak. J. Stat. 2017, 33, 37–61. [Google Scholar]
  40. Kleiber, C.; Kotz, S. Statistical Size Distributions in Economics and Actuarial Sciences; Wiley & Sons, Inc.: Hoboken, NJ, USA, 2003. [Google Scholar]
  41. Alqasem, O.A.; Nassar, M.; Abd Elwahab, M.E.; Elshahhat, A. A new inverted Pham distribution for data modeling of mechanical components and diamond in South-West Africa. Phys. Scr. 2024, 99, 115268. [Google Scholar] [CrossRef]
  42. Tahir, M.H.; Cordeiro, G.M.; Ali, S.; Dey, S.; Manzoor, A. The inverted Nadarajah–Haghighi distribution: Estimation methods and applications. J. Stat. Comput. Simul. 2018, 88, 2775–2798. [Google Scholar] [CrossRef]
  43. Flaih, A.; Elsalloukh, H.; Mendi, E.; Milanova, M. The exponentiated inverted Weibull distribution. Appl. Math. Inf. Sci. 2012, 6, 167–171. [Google Scholar]
  44. Meyer, P.G.; Cherstvy, A.G.; Seckler, H.; Hering, R.; Blaum, N.; Jeltsch, F.; Metzler, R. Directedeness, correlations, and daily cycles in springbok motion: From data via stochastic models to movement prediction. Phys. Rev. Res. 2023, 5, 043129. [Google Scholar] [CrossRef]
Figure 1. Sensitivity of posterior estimates to several prior distributions of μ i and β i for i = 1 , 2 .
Figure 1. Sensitivity of posterior estimates to several prior distributions of μ i and β i for i = 1 , 2 .
Symmetry 17 01044 g001
Figure 2. Visual fitting of the IW model from radiation data.
Figure 2. Visual fitting of the IW model from radiation data.
Symmetry 17 01044 g002
Figure 3. Profile log-likelihoods for μ i and β i (for i = 1 , 2 ) from radiation data.
Figure 3. Profile log-likelihoods for μ i and β i (for i = 1 , 2 ) from radiation data.
Symmetry 17 01044 g003
Figure 4. Two MCMC plots of μ i , β i (for i = 1 , 2 ), and R ( t ) from radiation data.
Figure 4. Two MCMC plots of μ i , β i (for i = 1 , 2 ), and R ( t ) from radiation data.
Symmetry 17 01044 g004
Table 1. Various options for for Q, D, τ , and S .
Table 1. Various options for for Q, D, τ , and S .
CaseQD S τ
Im m 1 n m i = 1 m 1 S i y m
IIm q 1 n m i = 1 q 1 S i y m
III q 2 q 1 n q 2 i = 1 q 1 S i T 2
Table 2. Different Monte Carlo simulation setups.
Table 2. Different Monte Carlo simulation setups.
nRemovalsFP% = 50%RemovalsFP% = 75%
40[1] ( 5 4 , 0 16 ) [4] ( 5 2 , 0 28 )
[2] ( 0 8 , 5 4 , 0 8 ) [5] ( 0 14 , 5 2 , 0 14 )
[3] ( 0 16 , 5 4 ) [6] ( 0 28 , 5 2 )
60[1] ( 5 6 , 0 24 ) [4] ( 5 3 , 0 42 )
[2] ( 0 12 , 5 6 , 0 12 ) [5] ( 0 21 , 5 3 , 0 21 )
[3] ( 0 24 , 5 6 ) [6] ( 0 42 , 5 3 )
80[1] ( 5 8 , 0 32 ) [4] ( 5 4 , 0 54 )
[2] ( 0 16 , 5 8 , 0 16 ) [5] ( 0 27 , 5 4 , 0 27 )
[3] ( 0 32 , 5 8 ) [6] ( 0 54 , 5 4 )
Table 3. Radiation dose for male mice.
Table 3. Radiation dose for male mice.
Observation[Cause]
3.17[0]3.18[1]3.99[0]4.95[0]5.25[1]5.36[1]5.49[0]5.52[0]5.54[0]5.57[0]
5.58[1]5.71[0]5.86[0]5.94[0]5.96[0]6.05[1]6.12[1]6.21[1]6.28[0]6.31[0]
6.36[0]6.43[0]6.47[0]6.48[0]6.49[0]6.61[0]6.63[0]6.66[0]6.70[0]6.95[0]
6.97[0]7.00[0]7.05[0]7.12[0]7.13[0]7.38[0]7.48[0]7.53[0]4.00[2]4.20[2]
5.10[0]6.20[2]1.63[2]1.79[2]2.06[2]2.22[2]2.28[2]2.52[2]2.59[2]2.82[0]
3.24[0]3.33[0]3.41[0]3.66[0]3.85[2]4.07[2]4.20[2]4.31[0]4.41[0]4.61[0]
4.62[2]4.82[0]5.17[2]5.17[2]5.24[2]5.64[0]5.67[0]5.86[0]6.19[0]6.20[2]
6.21[0]6.22[0]6.47[0]6.51[0]6.86[0]7.61[0]7.63[0]
Table 4. Fitting results of the IW models for radiation data.
Table 4. Fitting results of the IW models for radiation data.
DataPar.MLE(St.Er)95% ACIKS(p-Value)
Low.Upp.IL
Cause 1 μ 293.92(42.285)0.00001093.41093.40.3595(0.2566)
β 3.6874(0.5344)1.80895.56593.7570
Cause 2 μ 1.5577(0.3676)0.83722.27820.70400.2309(0.2924)
β 1.0727(0.1796)0.72071.42471.4410
Table 5. Fitting analysis of the IW and others from radiation data.
Table 5. Fitting analysis of the IW and others from radiation data.
Model μ β θ NLLAICAIBIHQIKS
Est.St.ErEst.St.ErEst.St.ErDistance p -Value
Cause 1
IW293.942.293.6870.534--13.46930.93733.93730.82929.6000.3600.257
IK52.9639.072.3420.453--14.79833.59636.59633.48832.2590.4060.148
IL0.1620.44131.9585.51--18.93741.87444.87441.76540.5370.5610.013
IP76.7179.771.2170.235--15.98435.96838.96835.86034.6310.4510.081
INH0.1870.42721.2247.37--16.83237.66440.66437.55636.3270.5840.008
EIW6.29995.203.6880.9580.33218.4913.69631.39339.39331.23129.8730.3790.205
Cause 2
IW1.5580.3681.0730.180--40.91285.82586.62587.60586.0700.2310.292
IK4.8901.9501.7190.362--41.16986.13882.93883.91986.3840.1910.529
IL0.2310.5227.75415.65--41.28785.97386.53287.51386.1980.2470.223
IP2.3140.3150.7150.136--42.85789.71490.51491.49589.9600.2800.120
INH2.0681.5100.8450.346--40.92085.84086.64087.62086.0850.2410.249
EIW0.40231.751.0730.1804.138350.540.91287.82589.53990.49688.1930.2310.292
Table 6. Three IAPTIIC competing risks from radiation data.
Table 6. Three IAPTIIC competing risks from radiation data.
SampleS T 1 ( q 1 ) T 2 ( q 2 ) τ Time(Cause) ( Q 1 , Q 2 ) S *
S 1 ( 2 5 , 0 10 ) 1.75(3)5.30(14)5.300.40(2)0.62(2)1.63(2)2.06(2)2.22(2)(2,12)5
2.28(2)2.52(2)3.18(1)3.85(2)4.07(2)
4.20(2)4.62(2)5.17(2)5.25(1)
S 2 ( 0 5 , 2 5 , 0 5 ) 2.25(7)4.25(13)4.250.40(2)0.42(2)0.62(2)1.63(2)1.79(2)(1,12)8
2.06(2)2.22(2)2.28(2)2.52(2)2.59(2)
3.18(1)3.85(2)4.20(2)
S 3 ( 0 10 , 2 5 ) 3.25(11)4.15(12)4.150.40(2)0.42(2)0.62(2)1.63(2)1.79(2)(1,11)11
2.06(2)2.22(2)2.28(2)2.52(2)2.59(2)
3.18(1)4.07(2)
Table 7. Estimates of μ i , β i (for i = 1 , 2 ), and R ( t ) from radiation data.
Table 7. Estimates of μ i , β i (for i = 1 , 2 ), and R ( t ) from radiation data.
SamplePar.MLEACIERR
MCMCHPD
Est.St.ErLow.Upp.ILCause 1Cause 2
S 1 μ 1 27.11710.4576.622347.61140.9890.32450.6755
27.1120.199726.72227.4990.7763
μ 2 2.33330.50941.33483.33171.9969
2.31680.18611.96392.68480.7209
β 1 1.69850.33851.03512.36201.3269
1.68790.14941.40911.98750.5784
β 2 0.82800.16430.50611.15000.6439
0.81620.12650.56711.05960.4925
R ( t ) 0.73120.07950.57540.88690.3115
0.72970.04040.65180.80840.1566
S 2 μ 1 21.1799.49572.567939.79137.2230.32560.6744
27.1125.936026.72227.4990.7763
μ 2 2.01990.41461.20742.83251.6251
2.31680.35001.96392.68480.7209
β 1 1.52980.42970.68772.37191.6842
1.68790.21721.40911.98750.5784
β 2 0.73240.15490.42881.03600.6072
0.81620.15130.56711.05960.4925
R ( t ) 0.70310.07860.54900.85720.3082
0.72970.04830.65180.80840.1566
S 3 μ 1 22.09719.0011.145459.33958.1940.36790.6321
22.0940.149821.79922.3850.5856
μ 2 2.06330.42561.22902.89751.6685
2.05130.14131.77612.32710.5510
β 1 1.51630.69960.14522.88752.7424
1.50350.12921.24711.74850.5014
β 2 0.65280.14790.36290.94270.5798
0.64200.10500.44520.85260.4074
R ( t ) 0.73050.07580.58200.87900.2970
0.72970.03450.66210.79590.1338
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Alotaibi, R.; Nassar, M.; Elshahhat, A. Estimation of Inverted Weibull Competing Risks Model Using Improved Adaptive Progressive Type-II Censoring Plan with Application to Radiobiology Data. Symmetry 2025, 17, 1044. https://doi.org/10.3390/sym17071044

AMA Style

Alotaibi R, Nassar M, Elshahhat A. Estimation of Inverted Weibull Competing Risks Model Using Improved Adaptive Progressive Type-II Censoring Plan with Application to Radiobiology Data. Symmetry. 2025; 17(7):1044. https://doi.org/10.3390/sym17071044

Chicago/Turabian Style

Alotaibi, Refah, Mazen Nassar, and Ahmed Elshahhat. 2025. "Estimation of Inverted Weibull Competing Risks Model Using Improved Adaptive Progressive Type-II Censoring Plan with Application to Radiobiology Data" Symmetry 17, no. 7: 1044. https://doi.org/10.3390/sym17071044

APA Style

Alotaibi, R., Nassar, M., & Elshahhat, A. (2025). Estimation of Inverted Weibull Competing Risks Model Using Improved Adaptive Progressive Type-II Censoring Plan with Application to Radiobiology Data. Symmetry, 17(7), 1044. https://doi.org/10.3390/sym17071044

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop