Next Article in Journal
Exponential Stability of Swelling Soils with Thermodiffusion Effects
Previous Article in Journal
Inverse Inference of Component Reliability for k-Out-of-n Systems Based on Maximum Entropy and Hazard-Rate Matrix Representation
Previous Article in Special Issue
Simultaneous Confidence Intervals for Pairwise Differences of Means in Zero-Inflated Rayleigh Distributions with an Application to Road Accident Fatalities Data
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A New Exponential-Type Model Under Unified Progressive Hybrid Censoring: Computational Inference and Its Applications

1
Department of Mathematical Sciences, College of Science, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
2
Faculty of Technology and Development, Zagazig University, Zagazig 44519, Egypt
*
Author to whom correspondence should be addressed.
Mathematics 2026, 14(7), 1182; https://doi.org/10.3390/math14071182
Submission received: 4 March 2026 / Revised: 21 March 2026 / Accepted: 25 March 2026 / Published: 1 April 2026
(This article belongs to the Special Issue Statistical Inference: Methods and Applications)

Abstract

A new odd exponential-type (NOT-Exp) distribution provides a flexible and analytically tractable framework for modeling lifetime data exhibiting non-constant hazard behaviors, including increasing, decreasing, bathtub-shaped, and unimodal forms, which are commonly observed in real-world reliability and survival studies. In this work, a comprehensive inferential methodology is developed for the NOT-Exp model under a unified progressive Type-II hybrid censoring, allowing several traditional censoring designs to be treated as special cases within a single unified structure. The main advantages of the proposed model lie in its ability to capture complex risk dynamics while maintaining mathematical simplicity, making it particularly suitable for censored lifetime data. Classical inference is conducted via maximum likelihood estimation, along with two asymptotic confidence interval constructions based on normal and log-normal approximations for both model parameters and reliability characteristics. In addition, a Bayesian estimation framework is introduced using independent gamma priors and Markov chain Monte Carlo techniques to obtain posterior estimates, credible intervals, and highest posterior density regions. Extensive simulations demonstrate the accuracy, stability, and robustness of the proposed estimators under varying sample sizes, censoring intensities, and prior specifications. Applications to airborne toxicological variation data and bank customer waiting times highlight the practical importance of the methodology, where the NOT-Exp model consistently outperforms twelve competing lifetime distributions according to standard goodness-of-fit criteria. These results confirm that the suggested design gives a strong and versatile tool for analyzing complex censored lifetime data across environmental and service-system applications.

1. Introduction

Recently, Sapkota et al. [1] introduced a new family of exponential-based distributions that are meant to make it easier to model lifetime and survival data in various practical fields. The proposed family extends the classical exponential distribution and can attract a wide range of hazard rate (HR) behaviors, including increasing, decreasing, bathtub-shaped, and unimodal patterns. One of the main strengths of this new family lies in its balance between flexibility and analytical tractability, called the new odd-exponential (NOT-Exp) distribution, which represents a meaningful advance in the modeling of positive continuous data, particularly for lifetime, reliability, and survival analysis. In contrast to the classical exponential distribution, which is limited to a constant HR, the NOT-Exp model incorporates additional shape parameters, enabling it to capture a broad spectrum of failure patterns, including decreasing, increasing, reverse-J, S-shaped, and bathtub forms. In empirical comparisons using real engineering and medical datasets, Sapkota et al. [1] stated that the NOT-Exp model consistently outperforms several well-known competing models based on standard fit criteria, indicating a clear advantage of the NOT-Exp distribution is its adaptability across different application domains.
This flexibility makes the model capable of representing diverse real-world phenomena that standard distributions often cannot capture. They also derived both classical and Bayesian NOT-Exp estimations with complete datasets. Simulation results show that these estimators are stable and efficient, exhibiting decreasing bias and mean square error as sample size increases, which makes the model reliable even for small or complex datasets. In Section 2, we provided the main NOT-Exp distribution functions and investigated their density and failure rate behaviors.
In reliability studies, censoring commonly occurs when only a subset of the sample lifetimes is observable. The statistical literature offers comprehensive treatments of different censoring schemes, including Type-I (time-based), Type-II (failure-based), and hybrid plans, the latter of which integrate elements of both time and failure schemes. A new modified sampling strategy of the traditional hybrid and Type-II progressive censoring (T2-P) plans, by G’orny and Cramer [2], is called a unified progressively Type-II hybrid (UT2-PH) censoring. In practical experiments, examiners often face constraints related to limited testing time and experimental cost. The plan proposed addresses these challenges by allowing the experiment to terminate either after observing a pre-specified number of failures or when a predetermined time limit is reached, while also permitting the progressive removal of surviving units during the experiment. This flexibility makes the scheme more practical and realistic for modern reliability studies, as it enables efficient data collection while controlling experimental duration and resource consumption. Consequently, the UT2–PH censoring scheme provides a more comprehensive and adaptable framework for modeling lifetime data under practical experimental constraints. Within this censoring framework, a random sample of size n is subjected to a life-testing experiment beginning at time zero, with failure times (say, m i for i = 1 , 2 ) recorded continuously throughout the study period. Let q i { 1 , , n } , i = 1 , 2 (where q 1 < q 2 ) denote the predetermined numbers of failures, and let ȷ i ( 0 , ) , i = 1 , 2 (with ȷ 1 < ȷ 2 ) represent the corresponding time thresholds. Consider a T2-P censoring scheme S = ( S 1 , , S q 2 ) that satisfies q 2 + i = 1 q 2 S i = n . Following Górny and Cramer [2], it is important to note that, under the UT2-PH censoring design, the removal procedure mirrors that of the standard T2-P scheme in such a way that after the occurrence of the ith failure, a random number S i of surviving items are withdrawn from the experiment.
Suppose that Y represents a UT2-PH sample taken from a NOT-Exp population with a lifetime characterized by a probability density function (PDF, g ( · ) ) and a cumulative distribution function (CDF, G ( · ) ); then, the corresponding likelihood function (LF, L ( · ) ) is
L ξ | x i = 1 g ( y i ; ξ ) [ 1 G ( y i ; ξ ) ] S i [ 1 G ( T ; ξ ) ] S ,
where y i represents y i : m 2 : n for simplicity, d i denotes the number of failures up to ȷ i (for i = 1 , 2 ), and
, T , S = q 2 , y q 2 , n q 2 i = 1 q 2 1 S i ) i f Y q 2 < ȷ 1 ; d 1 , ȷ 1 , n d 1 i = 1 d 1 S i ) i f Y q 1 < ȷ 1 < Y q 2 ( o r Y q 1 < ȷ 1 < ȷ 2 ) ; q 1 , y q 1 , n q 1 i = 1 q 1 1 S i ) i f ȷ 1 < Y q 1 < ȷ 2 ( o r ȷ 1 < Y q 1 < Y q 2 ) ; d 2 , ȷ 2 , n d 2 i = 1 d 2 S i ) i f ȷ 2 < Y q 1 .
It is worth noticing here that the control mechanism in UT2-PH combines several stopping rules, including a predefined number of failures, progressive removals, and time-based termination. In practice, certain edge cases may arise during sample generation, particularly when the remaining number of test units at the i-th failure (symbolized by S i ) becomes smaller than the preassigned number of removals ( S i ) or when termination occurs earlier due to the time constraint T . Specifically, Algorithm 1 verifies that the number of remaining units is always sufficient to accommodate the specified progressive removals. If we denote by S i the planned number of removals at the i-th observed failure and by N i the number of units still under observation just before the i-th failure, then the feasibility condition requires S i N i 1 . If S i > N i 1 , the removal number is adjusted to S i = min ( S i , N i 1 ) , ensuring that the total number of withdrawn units does not exceed the number of surviving items.
Algorithm 1 The MCMC iterative procedure of α , γ , θ , R ( x ) , and h ( x )
  1:
Inputs: True values α , γ , θ , total iterations , burn-in , remaining size = .
  2:
Initialization:
  3:
Set α ( 0 ) = α ^ , γ ( 0 ) = γ ^ , θ ( 0 ) = θ ^ .
  4:
for  j = 1 to  do
  5:
    Generate candidate value:
  6:
     α N ( α ^ , Var ^ ( α ^ ) )
  7:
    Compute
  8:
     α = P α ( α | γ ( j 1 ) , θ ( j 1 ) , x ) P α ( α ( j 1 ) | γ ( j 1 ) , θ ( j 1 ) , x )
  9:
    Draw u U ( 0 , 1 )
10:
    if  u min ( 1 , α )  then
11:
         α ( j ) = α
12:
    else
13:
         α ( j ) = α ( j 1 )
14:
    end if
15:
    Repeat for γ ( j ) and θ ( j )
16:
    Compute R ( j ) ( x ) and h ( j ) ( x ) for x > 0
17:
end for
18:
Bayes estimate:
19:
α ˜ = 1 j = + 1 α ( j )
20:
Construction of 100 ( 1 σ ) % BCIs:
21:
Sort { α ( j ) } for j = + 1 , ,
22:
BCI 95 % ( α ) = α ( 0.5 σ ) , α ( ( 1 0.5 σ ) )
23:
Construction of 100 ( 1 σ ) % HPD intervals:
24:
HPD 95 % ( α ) = α ( j ) , α ( j + ( 1 σ ) )
25:
where j minimizes
26:
α ( j + ( 1 σ ) ) α ( j )
27:
Repeat for γ , θ , R ( x ) , and h ( x )
From (1), numerous inferential studies have been conducted. For example, Lone et al. [3] investigated the gamma-mixed Rayleigh model, Anwar et al. [4] considered the inverted exponentiated Rayleigh, Bayoud et al. [5] studied the Topp–Leone, Dutta et al. [6] focused on the Burr-III, Mohammed et al. [7] examined the inverse Nadarajah–Haghighi, and Prakash et al. [8] proposed related methodological extensions, among other contributions.
In modern reliability, survival, and risk-analysis studies, real-world lifetime data are rarely observed completely due to cost, ethical, or operational constraints, leading to increasingly complex censoring mechanisms. At the same time, classical lifetime models, most notably the exponential distribution, often fail to adequately capture the diverse HR behaviors encountered in applied fields such as toxicology and banking management. Although the recently proposed NOT-Exp distribution offers remarkable flexibility in modeling increasing, decreasing, bathtub-shaped, and unimodal HRs, its inferential development has so far been limited primarily to complete data settings. Moreover, existing studies have not yet explored the performance of the NOT-Exp model under unified progressive hybrid censoring schemes, nor have they provided a comprehensive comparison between classical and Bayesian inference for both model parameters and reliability measures. Motivated by these gaps, the present study aims to extend the theoretical and inferential framework of the NOT-Exp distribution to more realistic censoring environments, while delivering robust estimation procedures and practical insights through simulation and real data applications in toxicology and banking systems. The key methodological and inferential contributions of this study can be summarized in six main points as follows:
  • Various inference frameworks for the NOT-Exp distribution using diverse datasets generated from the UT2-PH plan are proposed.
  • Two asymptotic confidence interval approaches, including normal-based and log-normal-based, are systematically developed and compared for both parameters and reliability time functions, addressing positivity and finite-sample limitations.
  • A comprehensive Bayesian estimation procedure is proposed using independent gamma priors and Metropolis–Hastings MCMC algorithms, allowing for the estimation of parameters, reliability function (RF), and HR function (HRF) along with credible and HPD intervals.
  • An extensive simulation study evaluates estimator accuracy based on different metrics of precision under varying sample sizes, censoring designs, and prior specifications, providing practical guidance on optimal censoring designs.
  • The study demonstrates the superior stability and efficiency of Bayesian estimators—particularly HPD intervals—over classical counterparts in heavily censored scenarios.
  • Airborne variation and bank waiting time datasets represent two challenging real-world lifetime settings marked by heterogeneity, skewness, non-constant hazard behavior, and realistic censoring, making them ideal benchmarks for advanced reliability modeling.
  • Empirical analyses clearly demonstrate the superiority of the NOT-Exp model over twelve competitive lifetime distributions—alpha-power exponential, Weibull exponential, Nadarajah and Haghighi, generalized exponential, and Weibull distributions, among others—consistently yielding better fit and inferential performance across both environmental and banking applications.
It is important to remember here that the proposed analysis is developed under the UT2–PH censoring framework and focuses on the NOT-Exp distribution, and therefore, the results may depend on the assumed model structure and censoring mechanism. In addition, the computational procedures required for maximum likelihood and Bayesian estimation may become more demanding for larger datasets or more complex censoring schemes. Furthermore, although four interval estimation methodologies are considered in this study, they may be extended in future work using resampling-based iterative procedures. These aspects represent potential limitations of the current work and also indicate several promising directions for future research.
The remainder of this article is structured as follows. Section 2 introduces the NOT-Exp model and examines its principal properties. Frequentist and Bayesian inference procedures are described in Section 3 and Section 4, respectively. Section 5 presents an extensive simulation study evaluating the performance of the proposed theoretical methods. Section 6 is devoted to applications involving toxicological and banking management data sets. In Section 7, four optimal methods are also examined. Finally, conclusions are summarized in Section 8.

2. The NOT-Exp Model

A lifetime random variable Y follows the NOT-Exp( ξ ) distribution, where ξ = ( α , γ , θ ) with α > 0 and γ > 0 are the shape parameters and θ is the scale parameter, if its CDF and PDF are given, respectively, as
G ( y ; ξ ) = ( 1 + α ) γ ϑ ( y ) α + ϑ ( y ) γ , y > 0 ,
and
g ( y ; ξ ) = α γ θ ( 1 + α ) γ e θ y ϑ ( y ) γ 1 α + ϑ ( y ) γ + 1 ,
where ϑ ( y ) = 1 e θ y .
Setting α and γ = 1 into (2), the standard exponential distribution with scale parameter θ is introduced. In addition to analyzing the model parameters, investigating the RF R ( · ) , and HRF h ( · ) , is crucial as it reveals risk and hazard patterns over time, helping to improve prediction, prevention strategies, and overall system safety. From (2) and (3), the corresponding R ( · ) and h ( · ) of the NOT-Exp distribution (for x > 0 ), respectively, are
R ( x ; ξ ) = 1 ( 1 + α ) γ ϑ ( x ) α + ϑ ( x ) γ , x > 0 ,
and
h ( x ; ξ ) = α γ θ ( 1 + α ) γ e θ x ϑ ( x ) γ 1 ( α + ϑ ( x ) ) ( α + ϑ ( x ) ) γ ( 1 + α ) γ ϑ ( x ) γ .
Figure 1a displays the PDFs, demonstrating the model’s capability to capture diverse lifetime behaviors through different shapes, ranging from right-skewed to more symmetric distributions. Figure 1b shows the corresponding hazard rate functions, which exhibit multiple characteristic failure rate behaviors common in reliability analysis. For instance, an increasing hazard rate (IHR) is observed when α = 0.1 , γ = 0.1 , and θ = 0.1 , reflecting aging or wear-out effects where the risk of failure grows over time. Conversely, a decreasing hazard rate (DHR) occurs when α = 2.8 , γ = 4.5 , and θ = 1.5 , which model early-life failures or infant mortality phenomena. A bathtub-shaped (BTS) hazard appears when α = 1.5 , γ = 2.8 , and θ = 1.5 , indicating an initial decline in failure rate followed by a period of constant or increasing risk. Additionally, the model captures an upside-down bathtub-shaped (UBTS) hazard when α = 2.5 , γ = 0.9 , and θ = 3.2 , representing systems that experience a peak failure period before stabilization. Overall, the different shapes of the PDF and HRF highlight the versatility of the NOT-Exp model in explaining various phenomena and failure mechanisms observed in practice.
In general, when the sample size is small or when the data are subject to heavy censoring, the available information about the distribution tail may be limited. In such situations, the Fisher information matrix can become nearly singular for some parameter combinations, resulting in relatively flat likelihood regions and increased variability of the parameter estimates. From a structural perspective, the parameter θ primarily governs the scale of the lifetime distribution, while the parameters α and γ control the shape and curvature of the density and failure rate functions. This separation of roles allows the model to generate a wide spectrum of hazard behaviors while maintaining interpretability of the parameters. Similar identifiability considerations have been reported for other flexible lifetime models, including the Weibull, gamma, and generalized exponential distributions when the available data provide limited information about the failure-time distribution. Consequently, while the NOT-Exp model provides considerable flexibility for modeling complex hazard rate patterns, its most reliable performance is expected under moderate sample sizes or realistic censoring schemes where sufficient information is available to distinguish the effects of the model parameters.

3. Likelihood Inference

We derive, in this section, the maximum likelihood estimators (MLEs) of the parameter vector ξ and the associated R ( x ) and h ( x ) for the NOT-Exp distribution based on UT2-PH censored data. In addition, two different approaches are employed to construct two-sided ( 1 σ ) 100 % asymptotic confidence intervals (ACIs) for the same unknown quantities.

3.1. Maximum Likelihood Estimators

Let y = { Y i } , i = 1 , 2 , , , denote a UT2-PH censored sample drawn from the NOT-Exp distribution with parameter vector ξ under a fixed T2-P censoring scheme S . Using (1), (3), and (2), the joint-LF of ξ can be expressed as
L ξ y α γ θ 1 + α γ e θ i = 1 y i × i = 1 ϑ y i γ 1 α + ϑ y i γ + 1 1 η y i ; α , θ γ S i 1 η T ; α , θ γ S ,
where η y i ; α , θ = 1 + α ϑ y i α + ϑ y i for i = 1 , 2 , , .
The corresponding log-LF ( L ( · ) log L ( · ) ) becomes
L ξ y log α γ θ + γ log 1 + α θ i = 1 y i + γ 1 i = 1 log ϑ y i γ + 1 i = 1 log α + ϑ y i + i = 1 S i log 1 η y i ; α , θ γ + S log 1 η T ; α , θ γ .
Differentiating (7) with respect to α , ϑ , and θ yields the following likelihood equations:
α + γ 1 + α γ + 1 i = 1 α + ϑ y i 1 i = 1 S i A i S A T ξ = ξ ^ ,
γ + log 1 + α + i = 1 log ϑ y i i = 1 log α + ϑ y i i = 1 S i B i S B T ξ = ξ ^ = 0 ,
and
θ i = 1 y i + γ 1 i = 1 ϑ y i ϑ y i γ + 1 i = 1 ϑ y i α + ϑ y i i = 1 S i C i S C T ξ = ξ ^ = 0 ,
respectively, where
  • η i = η y i ; α , θ , η T = η T ; α , θ , ϑ y i = y i e θ y i , A i = γ η i γ 1 η i 1 η i γ , B i = γ η i γ log η i 1 η i γ , C i = γ η i γ 1 η i 1 η i γ , η i = ϑ y i ϑ y i 1 α + ϑ y i 2 , η i = α 1 + α ϑ y i α + ϑ y i 2 .
It is evident from (8) and (9) that the MLEs ξ ^ of ξ are obtained by solving iteratively. Consequently, an appropriate iterative numerical procedure, such as the Newton–Raphson (NR) algorithm, is required to compute these estimates. In Section 5 and Section 7, where UT2-PH censored samples { Y i , S i } , i = 1 , 2 , , , are considered, the maxLik package in R (version 4.4.2), developed by Henningsen and Toomet [9], is employed to obtain the MLEs. Once the estimates α ^ , γ ^ , and θ ^ are available, the corresponding MLEs of the RF R ^ ( x ) and HRF h ^ ( x ) are obtained by replacing α , γ , and θ with their respective frequentist estimates.
To highlight that the acquired MLEs α ^ , γ ^ , and θ ^ covered both existence and uniqueness features, Figure 2 presents log-likelihood contour plots of α , ϑ , and θ based on two UT2–PH censored samples generated from NOT-Exp ( 0.8 , 0.5 , 0.2 ) and NOT-Exp ( 1.8 , 1.5 , 1.2 ) models when ( q 1 , q , n ) = ( 20 , 50 , 100 ) , ( ȷ 1 , ȷ 2 ) = ( 1 , 2 ) , and S i = 1 for ( i = 1 , , q 2 ). In both scenarios, the contours display a single, well-defined minimum, indicating good parameter identifiability and a stable estimation problem. Overall, the close alignment of the minima with the true parameter values confirms that the MLEs α ^ , γ ^ , and θ ^ existed and are unique.

3.2. Asymptotic Interval Bounds

The ACI[Norm] method constructs two bounds directly from the normal approximation of the MLE, providing a straightforward and computationally efficient approach for quantifying parameter uncertainty in large samples. In contrast, the ACI[Log-Norm] method applies the normal approximation to a logarithmic transformation of the parameter, improving interval accuracy and ensuring positivity when parameters are inherently non-negative, which is particularly important in reliability and survival analysis. To construct the 100 ( 1 σ ) % ACI[Norm] estimators for α , γ , θ , R ( x ) , and h ( x ) , we make use of the asymptotic properties of their MLEs.
Under the regularity conditions established by Lawless [10], the estimator vector ξ ^ is approximately multivariate normally distributed with mean ξ and covariance structure given by the inverse Fisher information (IFI) matrix I 1 ( · ) , where
I 1 ( ξ ^ ) = 11 12 13 22 23 33 ξ = ξ ^ 1 = V a r ^ ( α ^ ) C o v ^ ( α ^ , γ ^ ) C o v ^ ( α ^ , θ ^ ) V a r ^ ( γ ^ ) C o v ^ ( γ ^ , θ ^ ) V a r ^ ( θ ^ ) ,
where the components i j for i , j = 1 , 2 , 3 are presented in the Supplementary File.
For a UT2-PH sample with q 2 observed failures, the MLE ξ ^ satisfies
q 2 ( ξ ^ ξ 0 ) 1 q 2 2 L ξ ξ 1 1 q 2 L ξ ,
where ξ 0 is the true parameter vector.
Under regularity conditions,
1 q 2 2 L ξ ξ p I ( ξ 0 ) .
Consequently, from (12) and (13), it follows that
q 2 ( ξ ^ ξ 0 ) d N 0 , I 1 ( ξ 0 ) ,
or equivalently,
ξ ^ N ξ 0 , 1 q 2 I 1 ( ξ 0 ) ,
where I 1 ( ξ 0 ) is the asymptotic covariance matrix of ξ ^ .
Now, the 100 ( 1 σ ) % ACI[Norm] bounds of α , γ , and θ are
α ^ z 0.5 σ V a r ^ ( α ^ ) , γ ^ z 0.5 σ V a r ^ ( γ ^ ) , a n d θ ^ z 0.5 σ V a r ^ ( θ ^ ) ,
receptively, where z 0.5 σ is the 0.5 σ th standard Gaussian point.
Alternatively, the 100 ( 1 σ ) % asymptotic confidence intervals [Norm] for R ( x ) and h ( x ) are obtained by approximating the variances of R ^ ( x ) and h ^ ( x ) using the delta method (see Greene [11]). The estimated variances, denoted by Var ^ ( R ^ ( x ) ) and Var ^ ( h ^ ( x ) ) , are then approximated as
V a r ^ ( R ^ ( x ) ) = G R I 1 ( ξ ^ ) G R a n d V a r ^ ( h ^ ( x ) ) = G h I 1 ( ξ ^ ) G h ,
receptively, where
  • G R = G R α G R γ G R θ and G h = G h α G h γ G h θ ,
  • G R α = γ ( 1 + α ) 1 ( η ( x ; α , θ ) ) γ 1 + 1 + α α + ϑ ( x ) ,
  • G R γ = ( η ( x ; α , θ ) ) γ log ( η ( x ; α , θ ) ) ,
  • G R θ = γ ( η ( x ; α , θ ) ) γ 1 η i ( x ; α , θ ) ,
  • G h α = h ( x ; ξ ) 1 α + γ 1 + α 1 ω γ ω γ 1 γ ( 1 + α ) γ 1 ϑ ( x ) γ ω γ ( 1 + α ) γ ϑ ( x ) γ ,
  • G h α = h ( x ; ξ ) 1 γ + log ( 1 + α ) + log ( ϑ ( x ) ) ω γ log ω ( 1 + α ) γ ϑ ( x ) γ log ( 1 + α ) + log ( ϑ ( x ) ) ω γ ( 1 + α ) γ ϑ ( x ) γ ,
  • and
  • G h θ = h ( x ; ξ ) 1 θ x + ( γ 1 ) x e θ x ϑ ( x ) x e θ x ω γ x e θ x [ ω γ 1 ( 1 + α ) γ ϑ ( x ) γ 1 ] ω γ ( 1 + α ) γ ϑ ( x ) γ ,
  • with ω = ( α + ϑ ( x ) ) .
A popular limitation of ACI[Norm] is that it may yield negative lower bounds for parameters that are strictly positive. To address this issue, Meeker and Escobar [12] proposed a modification in which the MLEs are first log-transformed before constructing the ACIs. This procedure, known as ACI[Log-Norm], ensures that all confidence limits are positive. While the ACI[Norm] approach can occasionally provide slightly higher coverage probabilities, the ACI[Log-Norm] generally delivers more reliable and interpretable intervals, particularly for moderate or small sample sizes. The enhanced performance arises from the Log-Norm, which reduces skewness in the sampling distribution of the MLEs. Accordingly, the two-sided 100 ( 1 σ ) % ACI[Log-Norm] for α is given by
α ^ exp z 0.5 σ α ^ V a r ^ ( α ^ ) ,
and in the same way, the 100 ( 1 σ ) % ACI[Log-Norm] for γ , θ , R ( x ) , or h ( x ) can be constructed.

4. Bayesian Estimation

This section outlines the Bayesian estimation framework for α , γ , θ , R ( x ) , and h ( x ) , including the corresponding Bayesian credible intervals (BCIs) and highest posterior density (HPD) estimators. The derivation is based on the assumption that the parameters ξ are a priori stochastically independent, with prior knowledge incorporated through their respective prior distributions.
Among the various prior choices, the gamma conjugate prior is often preferred due to its flexibility, solution convenience, and interpretability (see Kundu [13]). Its analytical simplicity and ability to accommodate diverse forms of prior beliefs make it particularly suitable for modeling positive-valued parameters. In this study, we assume that α , γ , and θ are a priori independent and follow gamma distributions, such as α Gamma ( a 1 , b 1 ) , γ Gamma ( a 2 , b 2 ) , θ Gamma ( a 3 , b 3 ) .
Accordingly, the joint prior density of ξ with hyperparameters a i > 0 and b i > 0 (for i = 1 , 2 , 3 ), denoted by P ( · ) , can be expressed as
P ξ α a 1 1 γ a 2 1 θ a 3 1 e ( b 1 α + b 2 γ + b 3 θ ) , α , γ , θ > 0 .
In Bayes’ continuous theorem, the joint posterior PDF of ξ (say, P ( · ) ) is given by
P ξ x = 1 L ξ x P ξ ,
where = α γ θ L ξ x P ξ d α d γ d θ .
The joint posterior PDF (15) for the NOT-Exp parameters α , γ , and θ , from (6) and (14), becomes
P ξ x α + a 1 1 γ + a 2 1 θ + a 3 1 1 + α γ e b 1 α + b 2 γ + b 3 θ × i = 1 ϑ y i γ 1 α + ϑ y i γ + 1 1 η y i ; α , θ γ S i 1 η T ; α , θ γ S ,
where b 3 = b 3 + i = 1 y i .
Under the squared error loss (SEL) criterion, the Bayes estimator of any function β ( ξ ) is defined as its posterior mean. Let Ξ represent the SEL function; then the corresponding Bayes estimator β ˜ ( ξ ) can be expressed as
β ˜ ( ξ ) = 0 0 0 β ( ξ ) L ξ x P ( ξ ) d α d γ d θ .
Due to the nonlinear and analytically intractable structure of the posterior distribution given in (16), closed-form expressions for the Bayes estimators of α , γ , and θ , R ( x ) , and h ( x ) are not attainable. Consequently, Markov chain Monte Carlo (MCMC) techniques are adopted to obtain approximate Bayes estimates as well as to construct BCI/HPD intervals.
To implement this procedure, the full conditional posterior probability density functions of the NOT-Exp model parameters α , γ , and θ are first derived and are presented as follows:
P α α | γ , θ , x α + a 1 1 1 + α γ e b 1 α i = 1 α + ϑ y i γ + 1 Ψ i S i Ψ T S ,
P γ γ | α , θ , x γ + a 2 1 1 + α γ e b 2 γ i = 1 ϑ y i γ 1 α + ϑ y i γ + 1 Ψ i S i Ψ T S ,
and
P θ θ | α , γ , x θ + a 3 1 e b 3 θ i = 1 ϑ y i γ 1 α + ϑ y i γ + 1 Ψ i S i Ψ T S ,
respectively, where Ψ i = 1 η y i ; α , θ γ and Ψ T = 1 η T ; α , θ γ .
It can be observed that the full conditional PDFs P ϵ , P γ , and P θ of α , γ , and θ , given in (17)–(19), respectively, do not correspond to any known standard distributions and lack closed-form representations. Nevertheless, the diagnostic plots displayed in Figure 3 suggest that these conditional posterior distributions are well approximated by normal densities. Accordingly, parameter estimation and the construction of BCI/HPD intervals are carried out using the Metropolis–Hastings (MH) algorithm. The MH procedure, outlined in Algorithm 1, is employed as an effective MCMC sampling method.

5. Monte Carlo Comparisons

This section presents a detailed simulation study designed to evaluate the finite-sample performance of the proposed theoretical estimators for α , γ , and θ , along with R ( x ) and h ( x ) discussed earlier.

5.1. Simulation Framework

An extensive simulation framework is implemented to examine the empirical behavior of the estimators under a range of UT2-PH censoring scenarios. Key design factors are systematically varied, including the censoring thresholds ȷ i ( i = 1 , 2 ) , the overall sample size n, the corresponding effective sample sizes q i ( i = 1 , 2 ) , and the progressive design S . In each setting, 1000 Monte Carlo samples are generated from two NOT-Exp lifetime distributions: Set-1 with parameters NOT-Exp ( 0.8 , 0.5 , 0.2 ) and Set-2 with NOT-Exp ( 1.8 , 1.5 , 1.2 ) . For a fixed time point x = 0.1 , from Set-i for i = 1 , 2 , the true values of the RF R ( x ) are 0.7915 and 0.9327, and those of the HRF are 1.2725 and 0.9589, respectively, which serve as reference values for performance evaluation.
For clarification, the performance of all estimators of the parameters α , γ , and θ , as well as the reliability measures R ( x ) and h ( x ) , is evaluated by assuming that their true parameter values lie within the theoretical parameter space of the NOT-Exp distribution without loss of generality. The parameter configurations were not chosen arbitrarily; instead, they were selected to represent distinct lifetime behaviors commonly encountered in reliability analysis. To illustrate the characteristics of the selected parameter sets, Figure 4 presents the PDF and HRF shapes of the NOT-Exp population for Set-i  ( i = 1 , 2 ) . The resulting PDF shapes exhibit decreasing and unimodal behaviors, while the associated HRFs display distinct patterns. In particular, Set–1 exhibits a decreasing HRF, which is typically associated with early-life failures or infant mortality. In contrast, Set–2 generates an upside-down (unimodal) HRF shape, representing situations in which the failure rate initially increases, reaches a peak, and then gradually declines over time. All density and failure rate shapes depicted in Figure 4 match the original theoretical shapes shown in Figure 1. By considering these contrasting hazard behaviors, the simulation design provides a realistic and informative framework for assessing the finite-sample performance of the proposed estimators under different reliability environments.
Taking n { 30 , 50 , 80 } with ȷ 1 { 0.2 , 0.5 } for Set-1, and (1, 1.5) for Set-2, and ȷ 2 { 0.5 , 0.8 } for Set-1, and (1.5, 2.5) for Set-2. Additional variation is introduced through different effective sample sizes q i ( i = 1 , 2 ) and censoring patterns S . For instance, the censoring scheme S : ( 0 , 0 , 1 , 1 , 1 ) is denoted compactly as ( 0 [ 2 ] , 1 [ 3 ] ) (see Table 1). Collectively, these configurations are intended to investigate the impact of censoring intensity and sampling design on estimator accuracy, precision, and numerical stability. A detailed description of the simulation and estimation procedures is provided in Algorithm 2.
Algorithm 2 Simulate UT2-PH censored datasets from NOT-Exp ( ξ )
  1:
Input: Parameter vector ξ of the NOT-Exp distribution, sample size n, censoring scheme S
  2:
Input: Generate q 2 independent random variables W 1 , W 2 , , W q 2 U ( 0 , 1 )
  3:
for  i = 1 , 2 , , q 2  do
  4:
    Input: Compute i = W i i + d = q 2 i + 1 q 2 S d 1
  5:
end for
  6:
for  i = 1 , 2 , , q 2  do
  7:
    Input: Set U i = 1 d = q 2 i + 1 q 2 d
  8:
end for
  9:
Output: Obtain failure times Y i = G 1 ( U i ; ξ )
10:
Input: Identify q i at ȷ i (for i = 1 , 2 )
11:
Output: Calculate S :
12:
if  y q 1 < y q 2 < ȷ 1 < ȷ 2  then
13:
    Set S = n q 2 i = 1 q 2 1 S i
14:
end if
15:
if  y q 1 < ȷ 1 < y q 2 < ȷ 2 (or y q 1 < ȷ 1 < ȷ 2 < y q 2 then
16:
    Set S = n q 1 i = 1 q 1 S i
17:
end if
18:
if  ȷ 1 < y q 1 < y q 2 < ȷ 2 (or ȷ 1 < y q 1 < ȷ 2 < y q 2 then
19:
    Set S = n q 1 i = 1 q 1 1 S i
20:
end if
21:
if  ȷ 1 < ȷ 2 < y q 1 < y q 2  then
22:
    Set S = n q 2 i = 1 q 2 S i
23:
end if
24:
Output: Stop and get a UT2-PH censored dataset:
25:
if  y q 1 < y q 2 < ȷ 1 < ȷ 2  then
26:
    Stop the test at y q 2
27:
end if
28:
if  y q 1 < ȷ 1 < y q 2 < ȷ 2 (or y q 1 < ȷ 1 < ȷ 2 < y q 2 then
29:
    Stop the test at ȷ 1
30:
end if
31:
if  ȷ 1 < y q 1 < y q 2 < ȷ 2 (or ȷ 1 < y q 1 < ȷ 2 < y q 2 then
32:
    Stop the test at y q 1
33:
end if
34:
if  ȷ 1 < ȷ 2 < y q 1 < y q 2  then
35:
    Stop the test at ȷ 2
36:
end if
For α , γ , θ , R ( x ) , or h ( x ) , the Bayesian point estimates are obtained together with their associated BCI and HPD estimates using an MCMC approach. Beyond setting = 12,000 and = 2000 , the objective Bayesian analysis is then based on = 10 , 000 posterior samples to estimate α , γ , θ , R ( x ) , and h ( x ) . All numerical analyses are conducted using R (v4.2.2). The MLEs and 95% ACIs, obtained via both Norm and Log-Norm approaches, are computed using the ‘maxLik’ package (v1.5-2.2) (Henningsen and Toomet [9]). Subsequently, all Bayesian point estimates and the associated 95% BCI and HPD intervals are derived using the ‘coda’ package (v0.19-4.1) (Plummer et al. [14]). Two sets of informative gamma priors are assumed for the parameter vector ξ . The corresponding hyperparameters υ i and v i (for i = 1 , 2 , 3 ) are selected according to the hyperparameter elicitation idea proposed by Kundu [13]. Accordingly, the hyperparameter values of υ i and v i (for i = 1 , 2 , 3 ) are specified as follows:
  • Set-1 [Prior-A]: ( ν 1 , ν 2 , ν 3 ) = ( 4 , 2.5 , 1 ) and v i = 5 , i = 1 , 2 , 3 ;
  • Set-1 [Prior-B]: ( ν 1 , ν 2 , ν 3 ) = ( 8 , 5 , 2 ) and v i = 10 , i = 1 , 2 , 3 ,
  • Set-2 [Prior-A]: ( ν 1 , ν 2 , ν 3 ) = ( 9 , 7.5 , 6 ) and v i = 5 , i = 1 , 2 , 3 ;
  • Set-2 [Prior-B]: ( ν 1 , ν 2 , ν 3 ) = ( 18 , 15 , 12 ) and v i = 10 , i = 1 , 2 , 3 .
To investigate the robustness of the Bayesian estimation procedure with respect to prior assumptions, a sensitivity analysis was conducted using several alternative prior specifications. This analysis is particularly relevant in censored lifetime models, where the posterior inference may depend on the degree of prior information. For illustration, from 1000 UT2-PH censored samples generated from the NOT-Exp ( 0.8 , 0.5 , 0.2 ) distribution (as an example) when ( ȷ 1 , ȷ 2 ) = ( 0.2 , 0.5 ) and the removal design D [ 11 ] , the posterior distributions of the parameters α , γ , and θ were then examined under four different prior settings:
(i)
Informative (Prior-A): α Gamma ( 4 , 5 ) , γ Gamma ( 2.5 , 5 ) , and θ Gamma ( 1 , 5 ) ;
(ii)
Overdispersed: α Gamma ( 0.8 , 1 ) , γ Gamma ( 0.5 , 1 ) , and θ Gamma ( 0.2 , 1 ) ;
(iii)
Weakly informative: α Gamma ( 0.4 , 0.5 ) , γ Gamma ( 0.25 , 0.5 ) , and θ Gamma ( 0.1 , 0.5 ) ;
(iv)
Improper: α , γ , θ Uniform ( 0.01 , 10 ) .
Figure 5 presents the resulting posterior summaries under these prior specifications. The results indicate that the posterior means remain relatively stable across different priors, suggesting that the data provide sufficient information for reliable inference. As expected, the informative prior yields the narrowest BCIs and the smallest posterior standard deviations, reflecting increased estimation precision. In contrast, the weakly informative and nearly noninformative priors lead to slightly wider credible intervals, while the overdispersed prior produces the most diffuse posterior distributions.
Now, for computational implementation, let ζ ς denote a generic parameter, with ζ 1 = α , ζ 2 = γ , ζ 3 = θ , ζ 4 = R ( x ) , and ζ 5 = h ( x ) . For ς = 1 , 2 , , 5 , (number of parameters) and i = 1 , 2 , , 1000 (number of replications), the average point estimate (APE) is given by
APE ( ζ ¨ ς ) = 1 1000 i = 1 1000 ζ ¨ ς ( i ) ,
where ζ ¨ ς ( i ) denotes the estimated value of ζ ς from the ith replicate. The performance of the point estimators is evaluated using two widely adopted precision metrics: the root mean squared error (RMSE) and the mean relative absolute bias (MRAB), defined as follows:
RMSE ( ζ ¨ ς ) = 1 1000 i = 1 1000 ζ ¨ ς ( i ) ζ ς 2 ,
and
MRAB ( ζ ¨ ς ) = 1 1000 i = 1 1000 1 ζ ς ζ ¨ ς ( i ) ζ ς ,
respectively, where ζ ¨ ς ( i ) is the estimate obtained from the ith replication.
For interval evaluations, the performance is evaluated using the average interval length (AIL) and the coverage probability (CP). Denoting the lower and upper bounds of the ith interval as L ζ ¨ ς ( i ) and U ζ ¨ ς ( i ) , respectively, the AIL is computed as
AIL 95 % ( ζ ς ) = 1 1000 i = 1 1000 U ζ ¨ ς ( i ) L ζ ¨ ς ( i ) ,
and the CP is
CP 95 % ( ζ ς ) = 1 1000 i = 1 1000 L ζ ¨ ς ( i ) , U ζ ¨ ς ( i ) ( ζ ς ) ,
where ( · ) is the indicator function, equal to one if ζ ς lies within the interval and zero otherwise.

5.2. Simulation Results and Interpretations

Table A1, Table A2, Table A3, Table A4, Table A5, Table A6, Table A7, Table A8, Table A9 and Table A10 summarize the outcomes of the proposed simulation experiments, highlighting the behavior of α , γ , θ , R ( x ) , and h ( x ) . The main observations can be outlined as follows:
  • Across all simulated scenarios, the proposed estimation procedures demonstrate stable performance. This is reflected in consistently low values of RMSE, MRAB, and AIL, alongside CPs that remain close to the nominal 95% level.
  • Increasing n or q i ( i = 1 , 2 ) generally improves estimation accuracy. Similarly, reducing the number of censored observations contributes to more precise estimates. Additionally, longer censoring times ȷ i ( i = 1 , 2 ) tend to enhance the reliability and precision of estimates for all coefficients.
  • Under Prior-B, the Bayesian estimates outperform those based on Prior-A. Overall, both Bayesian approaches produce more efficient and less biased estimates compared to their frequentist counterparts. This behavior can be explained by the fact that the hyperparameters of Prior-B provide prior distributions that are more compatible with the true parameter values used in the simulation design, leading to posterior distributions with reduced variability and improved estimation precision.
  • Comparisons of the 95% interval methods reveal that:
    Intervals constructed via the HPD (for either prior) generally provide superior coverage and shorter interval lengths than those obtained with the BCI approach. Both types of credible intervals tend to outperform the asymptotic intervals (ACI-NA and ACI-NL) in terms of reliability and precision.
    For γ and R ( x ) , the ACI[Log-Norm] results are slightly narrower and more accurate than the corresponding ACI-[Norm] intervals.
    For α , θ , and h ( x ) , the ACI[Norm] approach shows marginally better performance than ACI[Log-Norm].
    The CPs for both Bayesian (BCI/HPD) and classical (ACI-NA/ACI-NL) intervals generally achieve or exceed the nominal 95% across most scenarios.
    The HPD intervals consistently outperform the two approaches of ACIs in terms of AIL and CP behaviors. This result is expected because HPD intervals are constructed directly from the posterior distribution and therefore fully incorporate the uncertainty arising from both the observed data and the prior information.
    In contrast, both ACIs are based on asymptotic normal and log-normal approximations to the likelihood function, which may be less accurate for moderate sample sizes or in the presence of censoring. Consequently, HPD intervals tend to produce more efficient interval estimates in censored lifetime models.
  • When the true values in NOT-Exp ( ϑ , θ ) are increased, it can be noted that all point and interval estimation findings of α , γ , θ , R ( x ) , and h ( x ) become satisfactory in terms of lowest RMSE, lowest MRAB, AIL results, and highest CP values.
  • Evaluating the performance of the proposed censoring designs listed in Table 1:
    The right schemes [ i 3 ] and [ i 6 ] provide the most efficient estimates for α and θ .
    The left schemes [ i 1 ] and [ i 4 ] provide the most efficient estimates for R ( x ) and h ( x ) .
    The middle schemes [ i 2 ] and [ i 5 ] provide the most efficient estimates for γ .
  • Overall, once the UT2-PH dataset is generated, the Bayesian point and credible interval methodologies demonstrate clear advantages over other methods. We finally recommend the MCMC framework, which delivers more efficient, stable, and reliable inference for the NOT-Exp parameters and associated reliability functions.

6. Real-World Applications

This section examines two genuine datasets from the toxicology and banking sectors, aiming to: (i) assess the flexibility, accuracy, and practical relevance of the NOT-Exp model; (ii) demonstrate how the model’s inferential outcomes can support real-world decision-making; and (iii) benchmark its performance against twelve existing lifespan distributions. Table 2 provides a summary of the datasets employed in this comparative analysis, detailed as follows:
  • Toxicological Application: Variations in airborne exposure and their influence on urinary metabolite concentrations are a central focus in toxicology and environmental health research. Airborne chemicals, once inhaled, undergo absorption, distribution, metabolism, and excretion, leading to the formation of measurable metabolites in biological matrices such as urine. Understanding how fluctuations in airborne exposure translate into changes in urinary metabolite concentrations is crucial for accurately assessing human exposure, validating toxicokinetic and physiologically based pharmacokinetic (PBPK) models, and identifying dose–response relationships (see Valavanidis et al. [15] for more details). This application (say, App.1) investigates the impact of varying airborne exposure on urinary metabolite concentrations for thirty individual human subjects exposed to acetone under controlled conditions. Airborne exposure was expressed in mg/m3 (milligrams per cubic meter of air), while urinary metabolite concentrations were expressed in mg/g creatinine. This dataset was first provided by Kumagai and Matsunaga [16] and reanalyzed by Peter et al. [17].
  • Banking Management Application: Banking systems are designed to manage customer flow and provide financial services efficiently, but they often involve queues that lead to long waiting times before customers receive service. Bank waiting times refer to the duration customers spend from arrival until being attended by a teller or service agent, and they represent a fundamental performance indicator for evaluating service efficiency, improving customer satisfaction, and optimizing the allocation of human and operational resources; Cowdrey et al. [18]. This application (say, App.2) examines one hundred recorded waiting times (in minutes) representing the duration customers spend in a bank before being served. This dataset was presented by Ghitany et al. [19] and later reanalyzed by Alsubie [20].
Table 2. The datasets of airborne variations and banking service systems.
Table 2. The datasets of airborne variations and banking service systems.
Airborne Variations
1.51.72.12.22.42.52.63.83.84.24.3
5.66.07.07.59.39.910.210.612.312.913.7
14.117.827.631.042.045.651.991.3131.8
Bank Waiting Times
0.80.81.31.51.81.91.92.12.62.72.9
3.13.23.33.53.64.04.14.24.24.34.3
4.44.44.64.74.74.84.94.95.05.35.5
5.75.76.16.26.26.26.36.76.97.17.1
7.17.17.47.67.78.08.28.68.68.68.8
8.88.98.99.59.69.79.810.710.911.011.0
11.111.211.211.511.912.412.512.913.013.113.3
13.613.713.9 14.115.415.417.317.318.118.2
18.418.919.019.920.621.321.421.923.027.031.6
33.138.5
Briefly, Table 3 presents a comparative summary of the two datasets in App.i (for i = 1 , 2 ) through key descriptive statistics including measures of central tendency (mean, mode), quartiles ( Q i for i = 1 , 2 , 3 ), variability (standard deviation (St.D)), and distribution shape (skewness). These statistics provide an initial understanding of the underlying data distributions, essential for guiding subsequent analyses or interpretations. Overall, App.1 demonstrates a higher average value and greater variability with a more pronounced right skew, suggesting a dataset with some extremely high values influencing the mean, while App.2 is still positively skewed, appears more concentrated around its mode and median with less dispersion.
Using total time on test (TTT) plots and violin within boxplot (VB) diagnostics, Figure 6 provides a graphical analysis of two datasets from App.i (for i = 1 , 2 ). The subplots in Figure 6a reveal that the two datasets from App.i (for i = 1 , 2 ) provide decreasing and increasing failure rates, respectively, which both align with the same NOT-Exp failure rates depicted in Figure 1b. In contrast, the violin plots support these observations, showing App.1 has a right-skewed distribution with several outliers, while App.2’s data are more symmetric and concentrated.
To assess the suitability and flexibility of the proposed NOT-Exp model, it was fitted to two complete real datasets and its performance was compared against twelve alternative lifetime models, each representing diverse HR behaviors (see Table 4). Model optimum was conducted using eight widely recognized goodness-of-fit and information criteria: (i) negative log-likelihood ( NLL ), (ii) Akaike ( A ), (iii) Bayesian ( B ), (iv) consistent Akaike ( CA ), (v) Hannan–Quinn criterion ( HQ ), (vi) Anderson–Darling ( AD ), (vii) Cramér–von Mises ( CvM ), and (viii) the Kolmogorov–Smirnov statistic ( KS ) along with its associated p-value.
All computations were performed using the AdequacyModel package (v2.0.0) (Marinho et al. [21]) (see Table 5). For each candidate model, parameters along with their standard errors (St.Es) were estimated via maximum likelihood. Additionally, various goodness-of-fit measures were computed and are reported in the same table. The preferred model is determined as the one minimizing the information-based criteria (i)–(v) while simultaneously maximizing the p-value associated with the KS statistic. From Table 5, the NOT-Exp model provides the best overall fit to the datasets in App.i (for i = 1 , 2 ), outperforming all alternative lifetime models considered.
Table 4. Twelve competitive models of the NOT-Exp distribution.
Table 4. Twelve competitive models of the NOT-Exp distribution.
Author(s)SymbolModel
Bagdonavicius and Nikulin [22]PGW ( α , γ , θ ) Power Generalized Weibull
Peng and Yan [23]NEW ( α , γ , θ ) New Extended Weibull
Mahdavi and Kundu [24]APE ( γ , θ ) Alpha-Power Exponential
Pinho et al. [25]HEE ( α , γ , θ ) Harris-Extended Exponential
Alotaibi et al. [26]EP ( α , γ , θ ) Exponentiated-Pham
Mudholkar and Srivastava [27]EW ( α , γ , θ ) Exponentiated Weibull
Oguntunde et al. [28]WE ( α , γ , θ ) Weibull Exponential
Nadarajah and Haghighi [29]NH ( γ , θ ) Nadarajah–Haghighi
Gupta and Kundu [30]GE ( γ , θ ) Generalized Exponential
Birnbaum and Saunders [31]BS ( γ , θ ) Birnbaum–Saunders
Weibull [32]W ( γ , θ ) Weibull
Johnson et al. [33]G ( γ , θ ) Gamma
Table 5. The NOT-Exp fitting and its competitors from App.i (for i = 1 , 2 ).
Table 5. The NOT-Exp fitting and its competitors from App.i (for i = 1 , 2 ).
Model α γ θ NLL A CA B HQ AD CvM KS p-Value
Est.St.EEst.St.EEst.St.E
App.1
NOT-Exp0.01210.01458.25718.39080.01620.0110115.96237.92238.81242.23239.330.21520.02870.09350.9493
PGW0.00300.005913.6357.57390.02550.0155116.50239.09240.00243.46240.520.23660.03130.09850.9244
NEW4.05761.53840.44880.15200.45450.2743116.90239.86240.76244.20241.270.21600.02940.09470.9451
APE--0.04400.08420.02420.0133119.47242.94243.37245.81243.880.68760.10390.12030.7609
HEE0.01360.05611.14754.569915.25360.316119.98245.95246.84250.26247.360.67480.10020.12550.7129
EP0.10310.03133.89990.971462.60467.090117.08240.16241.05244.46241.560.33420.04460.09390.9483
EW8.999441.50921.26042.8620.28280.1620117.02240.05240.94244.35241.450.32130.04250.09570.9373
WE7.42023.90300.76530.09910.00400.0020121.55249.09249.98253.39250.491.03550.16610.17170.3205
NH--0.53190.12680.18080.0958119.51243.02243.45245.89243.960.62890.09380.12730.6968
GE--0.81100.19010.04540.0117121.87247.75248.18250.62248.681.11820.18150.19700.1801
BS--1.33700.168410.3011.9825116.68239.26239.69242.35240.200.35330.05040.14880.4990
W--0.82020.10630.09950.0403120.98245.96246.39248.82246.890.94320.14990.16030.4031
G--0.80120.17550.04220.0125121.74247.49247.91250.35248.421.09690.17770.19040.2112
App.2
NOT-Exp2.61626.95012.57011.06430.14970.0270317.00640.00640.25647.81643.160.12700.01700.03680.9993
PGW0.03220.01272.01690.38810.45710.1626317.07640.14640.39647.96643.300.12750.01740.03790.9988
NEW1.78801.10601.22480.17260.06620.0361317.02640.04640.29647.86643.210.17610.02380.04650.9820
APE--20.98213.96610.18290.0197319.04642.07642.20647.98644.180.41750.06660.05260.9452
HEE6.29723.35100.13680.017710.9698.1686317.52641.05641.30648.86644.210.13610.01910.04150.9953
EP0.34050.10251.83530.41457.62345.0187317.15640.30640.55648.12643.190.12720.01730.03760.9987
EW0.19050.10652.67471.64300.90570.2570317.03640.07640.32647.88643.230.12710.01750.03840.9984
WE18.63414.8421.36360.10700.01000.0047319.50645.00645.25652.82648.160.50100.07960.06290.8233
NH--3.33671.84240.02120.0139323.45650.90651.02656.11653.010.69690.11130.10760.1976
GE--2.18340.33430.15920.0175317.10642.02642.14647.93644.140.14280.02070.04020.9969
BS--0.84620.05977.20780.5562320.33644.66644.78649.87646.770.59870.08080.08010.5426
W--1.45810.10890.03050.0095318.73641.46641.59647.97643.570.39600.06290.05760.8941
G--2.00910.26390.20340.0303317.30642.43642.56647.94644.550.18230.02760.04250.9935
To facilitate interpretation of the comparative results and complement the numerical goodness-of-fit statistics reported in Table 5, a set of graphical diagnostics is provided in Figure 7. All candidate distributions were fitted to the datasets under identical sampling conditions to ensure a fair comparison. Figure 7 presents several graphical tools commonly used for model assessment, including the empirical and fitted PDF/RF curves, probability–probability (P–P) plots, and quantile–quantile (Q–Q) plots for the datasets in App.i  ( i = 1 , 2 ) . These plots provide a visual comparison between the empirical distribution of the data and the fitted theoretical models. The subplots in Figure 7 consistently indicate that the NOT-Exp distribution provides the closest agreement with the empirical patterns of the data compared with the competing models. In particular, the fitted curves closely follow the empirical density and reliability behavior, while the P–P and Q–Q plots exhibit points lying near the reference line. These graphical diagnostics further support the superiority of the NOT-Exp model for the considered datasets arising from toxicological and banking management applications. Figure 8 indicates that the log-likelihood contours for α , γ , and θ from App.i (for i = 1 , 2 ), existed and are unique.
Based on the complete datasets for App.i ( i = 1 , 2 ) reported in Table 2, multiple UT2-PH censored samples are generated under different combinations of ( q 1 , q 2 ) , where ( q 1 , q 2 ) = ( 10 , 19 ) for App.1 and ( 20 , 40 ) for App.2. These samples are constructed using various configurations of ȷ i ( i = 1 , 2 ) and progressive censoring schemes S , as detailed in Table 6. Following Algorithm 1, and assuming the absence of prior information about the parameter vector ξ , Bayesian inference for the NOT-Exp model parameters α , γ , and θ , along with the associated reliability measures R ( x ) and h ( x ) evaluated at x = 0.1 , is carried out using non-informative gamma priors for all parameters. The MCMC procedure is implemented with = 40 , 000 iterations, of which = 30 , 000 are retained for posterior inference. Table 7 reports the resulting interval estimates, including the 95% ACIs (normal and log-normal) and the corresponding 95% credible intervals (BCI and HPD), together with their associated interval widths (IWs), for α , γ , θ , R ( x ) , and h ( x ) . The results indicate that the Bayesian MCMC-based estimators consistently outperform their frequentist counterparts, as reflected by smaller St.Es and narrower IWs. Moreover, when comparing classical asymptotic intervals with credible intervals in terms of minimum IW, both 95% credible intervals (BCI and HPD) generally provide more precise inference, further highlighting their practical advantage.
To assess the existence and uniqueness of the frequentist estimation results using the gathered samples S [ i 1 ] (for i = 1 , 2 ) listed in Table 6, contour diagrams for the parameters α , γ , and θ are displayed in Figure 9. The graphical evidence in Figure 9 is consistent with the numerical MLEs reported in Table 7, thereby supporting their validity.
Ensuring convergence of the Markov chains is a critical step in the implementation of the MCMC procedure. To this end, based on the same S [ 11 ] and S [ 21 ] samples, Figure 10 illustrates the corresponding trace diagnostics and posterior density estimates for all model parameters. For each parameter, including α , γ , θ , R ( x ) , and h ( x ) , the posterior mean is indicated by a solid blue line, while the limits of the 95% BCI are marked by dashed blue lines. The traces exhibit good mixing behavior and stable trajectories, providing clear evidence that the NH sampler has achieved satisfactory convergence. From App.2, the posterior densities of all NOT-Exp parameters are approximately symmetric. In contrast, from App.1, those of ( α , h ( x ) ) and R ( x ) are highly positive and negative skewed, respectively, and those of γ and θ are approximately symmetric.
The visualization of interval limits for the NOT-Exp lifespan metrics R ( x ) and h ( x ) is crucial, as it plays a fundamental role in lifetime data analysis by providing time-dependent quantification of uncertainty beyond point estimation. In this context, comparing asymptotic and credible intervals enables a comprehensive assessment of inferential robustness across different methodological frameworks. Such comparisons are particularly informative for moderate sample sizes, where departures from asymptotic assumptions may affect inferential accuracy. Using S [ i 1 ] (for i = 1 , 2 ), Figure 11 displays the 95 % interval bounds for R ( x ) and h ( x ) obtained using the ACI[Norm], ACI[Log-Norm], BCI, and HPD methods. The results show that the interval estimates for R ( x ) exhibit smooth monotonic decay over time, while the corresponding bounds for h ( x ) follow the characteristic pattern implied by the NOT-Exp model, confirming the internal coherence of the fitted model.
It is observed that the ACI[Log-Norm] intervals are generally tighter and more stable than their ACI[Norm] counterparts, highlighting the advantage of logarithmic transformation in accommodating skewness and enforcing positivity. Moreover, the Bayesian HPD intervals tend to be narrower than the BCI intervals, indicating more efficient uncertainty quantification, while remaining in close agreement with the frequentist intervals across the time domain.

7. Optimal Plans

Choosing an optimal progressive censoring pattern (OPCP) from a set of competing designs is an important issue in reliability and lifetime analysis. For fixed values of the total sample size n, the observed failure sizes q i , i = 1 , 2 , and the two pre-specified thresholds ȷ i , i = 1 , 2 , a progressive censoring scheme S is said to be preferable to another scheme if it provides greater information about the unknown model parameters contained in the lifespan distribution under examination. This section introduces four accuracy-based criteria, denoted collectively by ψ i , i = 1 , 2 , 3 , 4 , which are used to assess and compare alternative progressive censoring designs and to identify the most suitable pattern for application to the real data sets analyzed in the previous section. For comprehensive discussions on optimal schemes, the reader is referred to Ng et al. [34], Pradhan and Kundu [35], Sen et al. [36,37], Lin et al. [38], Nassar and Elshahhat [39], and the references cited therein. In the present study, four optimality criteria are employed and summarized in Table 8.
The criteria listed in Table 8 operate as follows: ψ 1 maximizes the trace of the observed FI matrix I ( ξ ^ ) , thereby favoring designs with higher overall information content; ψ 2 minimizes the trace of the IFI matrix I 1 ( ξ ^ ) , which is associated with minimizing the total variance of the parameter estimates; ψ 3 minimizes the determinant of the same IFI matrix, and ψ 4 minimizes the estimated variance of the log-MLE of the uth NOT-Exp quantile (say, Q u ), emphasizing precision in quantile estimation. We re-recommend utilizing the delta approach here to develop the variance of Q u . All fitted results of ψ i , i = 1 , 2 , 3 , 4 , using all UT2-PH censored datasets S [ i j ] from App.i (for i = 1 , 2 and j = 1 , 2 , 3 , 4 ) listed in Table 6, are provided in Table 9. In this table, for clarity, 5.73E-01 means 5.73 × 10 1 .
To provide more specific information, the four optimality criteria ( ψ i , i = 1 , 2 , , 4 ) serve as complementary measures for evaluating candidate censoring plans in reliability experiments. In general, criteria such as ψ 1 and ψ 2 emphasize estimation efficiency by reducing estimator variability, thereby yielding more precise parameter and reliability estimates. In contrast, ψ 3 and ψ 4 offer more balanced alternatives when practical constraints such as testing time, cost, or early termination of the experiment are important considerations. Consequently, the choice of an optimal censoring plan should depend on the primary objective of the study: plans optimizing ψ 1 or ψ 2 are preferable when precise statistical inference is the main goal, whereas ψ 3 or ψ 4 may be more suitable when experimental resources are limited and a compromise between estimation accuracy and experimental efficiency is required.
Based on the real-world datasets arising from toxicological and banking management applications in Table A6, denoted as App.i  ( i = 1 , 2 ) , the fitted OPCP results summarized in Table 9 reveal that the middle T2-P scheme implemented in S [ i 2 ] and the right T2-P scheme implemented in S [ i 4 ] consistently outperform the remaining censoring plans. These results demonstrate superior inferential efficiency under the proposed optimality criteria and are in full agreement with the conclusions drawn from the Monte Carlo study in Section 5.

8. Conclusions, Recommendations, and Future Research

This study has developed a comprehensive reliability and inferential framework for the NOT-Exp distribution under the UT2-PH plan, addressing both methodological and applied challenges commonly encountered in modern lifetime data analysis. By integrating the flexibility of the NOT-Exp model with a unified censoring structure, the proposed approach successfully accommodates complex hazard rate behaviors and realistic data incompleteness within a single coherent framework. The derived likelihood-based and Bayesian inferential procedures provide reliable estimation of model parameters as well as key reliability measures, including the survival and hazard rate functions, under diverse censoring scenarios. From an inferential perspective, the combination of likelihood estimation, asymptotic confidence interval constructions, and Bayesian MCMC-based inference offers a balanced toolkit for practitioners. The comparative results demonstrate that Bayesian estimators, particularly those based on HPD intervals, exhibit superior stability and efficiency in heavily censored settings, while the log-normal asymptotic intervals effectively address positivity constraints inherent to reliability parameters. The extensive Monte Carlo investigation further confirms that estimator accuracy improves with increasing effective sample size and reduced censoring intensity, and that the proposed methodology remains robust across a wide range of censoring designs and prior specifications. The real-data applications to airborne toxicological variations and bank customer waiting times highlight the practical relevance of the proposed framework. These two datasets represent contrasting application domains with distinct data-generating mechanisms, yet both exhibit non-constant hazard structures and partial observability. The consistent superiority of the NOT-Exp model over twelve competing lifetime distributions across goodness-of-fit measures underscores its adaptability and modeling strength. Importantly, the reliability and hazard-based interpretations obtained from these applications provide actionable insights for environmental risk assessment and service system management, reinforcing the applied value of the proposed methods.

8.1. Recommendations

From the theoretical findings and empirical evidence, the following recommendations can be made:
  • Based on the theoretical findings and empirical evidence, the following recommendations can be made:
  • The NOT-Exp distribution is strongly recommended for lifetime data exhibiting complex hazard shapes that cannot be adequately captured by classical exponential-type models.
  • The UT2-PH censoring scheme should be favored in practical life-testing experiments where multiple termination criteria and progressive withdrawals are present, as it provides flexibility without sacrificing inferential tractability.
  • Bayesian MCMC-based inference is recommended in moderate-to-small samples or heavily censored settings, where classical asymptotic approximations may be less reliable.
  • Practitioners in toxicology, environmental monitoring, and service operations should consider reliability-based modeling to better quantify persistence, risk, and system performance.

8.2. Future Directions

Several promising extensions naturally arise from this work, as follows:
  • First, the proposed framework may be extended to other members of the odd-family or exponential-generated distributions under UT2-PH or adaptive censoring schemes, for example, odd Weibull, odd gamma, odd log-logistic, and odd Lomax, among others.
  • Second, incorporating covariates through accelerated failure time or proportional hazard-type regressions based on the NOT-Exp baseline would significantly broaden its applicability.
  • Third, future studies may explore optimal censoring design problems that aim to minimize estimator variance or experimental costs under the NOT-Exp model, such as a cost-minimization or a meta-heuristic algorithm.
  • Fourth, multivariate and dependent lifetime extensions—such as shared frailty or copula-based NOT-Exp models—represent an important avenue for analyzing correlated failure data. Finally, machine learning–assisted Bayesian computation and approximate inference techniques could be integrated to further enhance computational efficiency in large-scale or high-dimensional reliability studies.
  • In summary, this study provides a unified, flexible, and practically relevant contribution to censored lifetime modeling, offering both theoretical advancement and applied insight. The proposed NOT-Exp using the UT2-PH-based framework lays a solid foundation for future developments in reliability theory and its multidisciplinary applications.

Supplementary Materials

The following supporting information can be downloaded at https://www.mdpi.com/article/10.3390/math14071182/s1, File S1: The Fisher information items i j for i , j = 1 , 2 , 3 , of α , ϑ , and θ .

Author Contributions

Methodology, R.A. and A.E.; funding acquisition, R.A.; software, A.E.; resources, R.A.; supervision, A.E.; writing—original draft, R.A. and A.E.; writing—review and editing, R.A. and A.E. All authors have read and agreed to the published version of the manuscript.

Funding

The authors extend their appreciation to the Deanship of Scientific Research and Libraries in Princess Nourah bint Abdulrahman University for funding this research work through the Supporting Publication in Top-Impact Journals Initiative (SPTIF-2026).

Data Availability Statement

The original contributions presented in this study are included in the article and Supplementary Material. Further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A. Numerical Results

This appendix presents all simulation results representing the values of RMSE, MRAB, AIL, and CP developed for α , γ , θ , R ( x ) , and h ( x ) .
Table A1. The APE (1st Col.), RMSE (2nd Col.), and MRAB (3rd Col.) results of α .
Table A1. The APE (1st Col.), RMSE (2nd Col.), and MRAB (3rd Col.) results of α .
DesignMLEBayes MLEBayes
Prior → AB AB
Set-1→
( ȷ 1 , ȷ 2 ) (0.2, 0.5) (0.5, 0.8)
D[11]1.27722.97412.78790.83500.15510.13960.78840.12590.1258 1.14542.88631.86900.83350.15110.13900.78890.12590.1254
D[12]1.25713.14942.92830.83320.15830.14170.78880.12760.1271 1.23503.03362.14790.83390.15230.14080.78630.12710.1268
D[13]1.36292.88632.62210.83430.15320.13660.78860.12540.1243 1.21122.80601.81400.83600.15030.13590.78830.12540.1227
D[14]1.24052.60442.31470.81800.13540.12370.80800.10020.0456 0.96912.56861.69311.83730.13310.12221.79130.09770.0452
D[15]1.55202.66202.47070.81220.13550.12390.80730.10190.0464 1.30292.57861.80821.83830.13480.12231.79050.10030.0457
D[16]0.97112.50082.21700.81880.13230.12300.80770.10010.0452 0.95222.38141.69131.83780.13030.11701.79140.09710.0450
D[21]1.07392.38091.76340.81200.12150.09890.81170.07530.0452 1.14462.25341.07500.81380.10970.07850.80890.04750.0448
D[22]0.91842.30611.63890.81550.12000.09790.80740.07320.0451 0.89862.17390.98610.81200.10530.07430.80770.04610.0446
D[23]0.88902.29811.21590.81550.11920.09700.80590.07150.0450 1.14112.11590.89670.81440.10470.07260.80620.04550.0443
D[24]0.61481.71060.70230.69710.10700.06750.77460.04530.0435 0.94331.57490.54840.70090.06950.06750.77690.04410.0434
D[25]1.00672.11430.77960.70270.10820.06770.77670.04580.0449 1.04981.95880.63540.69800.07180.06770.77710.04500.0441
D[26]0.96741.56220.56160.69750.10040.06640.77620.04490.0429 0.95621.46220.51950.69730.06850.06640.77340.04400.0427
( ȷ 1 , ȷ 2 ) (0.5, 1.0) (1.5, 2.5)
D[31]0.97441.20930.45620.69450.06950.04100.77850.03760.0334 1.08930.73670.30290.70080.04390.04070.77520.03690.0332
D[32]1.14371.55070.52900.69760.06960.04170.77770.03810.0339 1.00450.94880.46410.69480.04390.04140.77440.03710.0343
D[33]0.96581.14790.36600.69370.06850.04070.77550.03760.0312 0.92860.38700.28120.69290.04370.03940.77750.03670.0311
D[34]0.75480.88850.29840.85310.04060.03740.67810.03010.0299 1.12750.36700.22530.85310.03810.03020.67810.03000.0255
D[35]1.09280.76850.18690.85210.03970.03710.67970.02890.0282 0.87190.27710.15770.85210.03750.02910.67970.02870.0235
D[36]0.87030.62070.14030.85320.03940.03680.67910.02810.0278 0.96240.26920.13190.85320.03680.02830.67910.02790.0225
Set-2→
D[11]1.93813.31852.14121.83730.13120.12391.79130.07010.0524 1.94303.23651.78901.83980.12900.12351.79020.06760.0512
D[12]2.92283.40792.71271.83830.13380.12511.79050.07040.0548 2.35263.36701.94911.83740.13060.12431.79090.06980.0544
D[13]1.90453.21331.81661.83780.13040.12371.79140.06970.0514 1.84023.19541.73981.83820.12860.12281.79020.06590.0504
D[14]2.18873.03981.63271.81310.11100.10021.81330.05990.0421 1.92712.84201.38671.81360.11010.09771.81230.05370.0402
D[15]2.16143.08701.67521.81400.11130.11001.81280.06540.0393 2.20612.94381.67211.81200.11040.09891.81200.05400.0374
D[16]1.34172.65991.55761.81360.11010.09791.81210.05360.0401 1.83422.46961.30961.81360.10970.09281.81210.05360.0387
D[21]1.24091.98931.54921.81210.10970.05441.81130.03880.0370 2.29761.79511.21591.81270.10930.04141.81400.03710.0348
D[22]1.98051.74741.52451.81380.10970.05301.81320.03700.0326 2.44151.62951.10031.81300.10910.03831.81320.03690.0311
D[23]2.39021.64721.50971.81380.10890.05171.81250.03470.0318 1.39021.57381.07671.81380.10890.03821.81250.03470.0302
D[24]1.92081.50561.46401.70910.07390.05131.79110.03280.0290 1.97131.48740.77231.71040.07340.03801.79160.03250.0276
D[25]2.37581.53741.49081.71010.07530.05141.79160.03350.0308 2.16561.52401.05801.70940.07350.03811.79160.03270.0291
D[26]1.96081.49001.42581.70910.07240.04941.79110.03190.0276 1.99861.47900.77111.70910.07200.03791.79110.03180.0268
D[31]1.90361.41841.32981.70940.06140.03111.79200.02850.0261 1.72261.40110.70081.71020.05910.03061.79110.02780.0247
D[32]2.25241.47941.34531.70760.06530.03281.78980.02950.0270 2.12641.45880.74541.70860.06050.03111.78980.02950.0256
D[33]1.88831.40111.10961.70940.05830.03061.79110.02790.0246 1.88831.37030.57571.70940.05510.03011.79110.02630.0235
D[34]1.88041.31210.98701.85820.05570.02991.67470.02310.0189 1.86761.24160.51161.85760.05100.02831.67370.02150.0171
D[35]2.07251.36591.07931.85640.05790.03051.67430.02570.0234 2.01281.31210.53381.85620.05310.02991.67330.02270.0227
D[36]1.95831.22990.80291.85960.05270.02961.67470.02100.0171 1.96860.88060.49351.85790.05050.02791.67450.02000.0161
Table A2. The APE (1st Col.), RMSE (2nd Col.), and MRAB (3rd Col.) results of γ .
Table A2. The APE (1st Col.), RMSE (2nd Col.), and MRAB (3rd Col.) results of γ .
DesignMLEBayes MLEBayes
Prior → AB AB
Set-1→
( ȷ 1 , ȷ 2 ) (0.2, 0.5) (0.5, 0.8)
D[11]0.65411.15240.42770.50680.22320.14160.43970.11830.0864 0.63951.06840.39130.50760.22320.14060.44050.11830.0847
D[12]0.63410.85210.40290.50760.21750.14060.43860.11540.0841 0.61910.81770.36500.50680.21750.13980.43960.11540.0838
D[13]0.63461.28070.44080.50910.23440.14870.43530.12420.0881 0.62081.20980.40660.51010.23440.14830.43500.12420.0879
D[14]0.58040.79820.30880.46720.16370.13980.46120.08950.0831 0.83570.79250.23220.45890.16250.13980.43610.08890.0822
D[15]0.55120.57460.24320.47600.16010.13940.46480.08810.0819 0.84480.53750.18710.50780.16000.13790.42770.08790.0818
D[16]0.57770.78600.27050.47310.16080.13980.46360.08840.0822 0.77150.58860.21900.44940.16030.13940.44200.08790.0819
D[21]0.54660.44310.15960.48030.15740.08770.46500.08240.0798 0.54430.40300.15910.47980.15570.08670.46190.08180.0504
D[22]0.54230.41280.15730.48560.15460.08630.46450.08090.0753 0.54320.38650.15580.48500.14580.08510.46430.07790.0498
D[23]0.55120.54190.16020.46660.15960.08910.45750.08700.0819 0.53870.42420.15970.46640.15660.08790.45610.08670.0530
D[24]0.55100.38650.15090.57960.08230.07530.52610.07200.0533 0.54240.32830.14420.58040.07620.07220.52580.05910.0496
D[25]0.54420.23800.13750.58000.08130.07110.52660.06970.0508 0.53950.22170.13690.58010.07530.07040.52630.05850.0491
D[26]0.54800.30330.14760.57980.08230.07160.52560.07000.0510 0.54430.25310.14150.57870.07540.07080.52700.05860.0496
D[31]0.53190.18880.12480.58120.07500.06990.53140.05900.0483 0.52900.18100.11870.58190.07010.06900.53100.04970.0459
D[32]0.52150.15960.10680.58020.06920.06340.52470.04950.0453 0.52480.15820.10670.57730.06670.05860.52540.04850.0419
D[33]0.53720.18490.12020.57870.06990.06770.52430.05490.0478 0.53390.17340.11760.57980.06920.05880.52210.04930.0459
D[34]0.50600.15190.10150.38280.06910.04890.43240.04590.0396 0.50600.15120.10140.38280.05990.04800.43240.04410.0386
D[35]0.50800.14630.09920.39130.06780.04460.43240.04310.0327 0.50850.14620.09920.39130.05000.04320.43240.03800.0326
D[36]0.50860.15020.10090.38840.06840.04590.43200.04360.0365 0.50800.14910.10000.38840.05530.04510.43200.03860.0364
Set-2→
( ȷ 1 , ȷ 2 ) (0.5, 1.0) (1.5, 2.5)
D[11]2.12640.50350.31451.55540.13720.08511.44200.08210.0480 1.73560.48240.30131.55780.13690.08231.43750.08190.0451
D[12]1.99140.44910.30011.55650.13570.08511.44280.08090.0480 1.71060.42410.28611.55680.13410.08141.43750.08050.0446
D[13]2.20970.70590.39311.55650.13870.08701.43610.08310.0492 1.68380.59360.32711.55560.13860.08641.43580.08310.0489
D[14]1.57160.39960.19421.47950.08980.05351.48210.05040.0264 1.27680.32170.16571.47920.08770.05191.48110.05030.0263
D[15]1.61610.35890.14901.48150.08350.04971.48280.04840.0261 1.77030.28430.14011.48150.08240.04961.48280.04840.0260
D[16]1.96450.36850.17021.47990.08460.05031.48250.04990.0263 1.80310.31560.14911.48150.08240.04991.48270.04840.0261
D[21]1.62550.24410.09401.48040.08240.04671.48160.04350.0253 1.46710.22770.09211.48070.08230.04511.48160.04310.0252
D[22]1.81180.23460.09201.48230.08150.04511.48490.04320.0253 1.61560.22680.09021.48230.08130.04511.48490.04310.0251
D[23]1.89570.28450.09481.47560.08280.04681.47730.04390.0255 1.80880.22910.09451.47490.08230.04631.47830.04320.0253
D[24]1.77860.23260.08821.56950.08030.04311.50880.03940.0248 1.40470.22050.08821.57010.07950.04301.50880.03860.0247
D[25]1.88830.22510.07771.56760.06820.04171.50940.03810.0246 2.24270.19800.07771.56760.06750.04171.50940.03800.0224
D[26]1.88270.22920.08251.56760.07900.04281.50940.03880.0247 1.61230.21280.08011.57020.07770.04281.50880.03860.0246
D[31]1.42580.14280.04911.57260.03980.03971.51040.02090.0202 1.68080.11900.04681.57480.03980.03941.51010.02080.0200
D[32]1.72810.12770.04661.57260.03980.03931.51010.02080.0200 1.72810.11710.04441.57260.03980.03871.51010.02080.0200
D[33]1.43980.15770.04951.58020.04200.04051.51300.02120.0209 2.02350.15770.04911.57790.04180.04051.51300.02110.0211
D[34]1.73330.09070.03931.37580.03880.02971.46950.02080.0200 1.68710.09030.03931.37590.03860.02891.46940.02080.0181
D[35]1.73340.07940.03921.37840.03860.02951.47010.02070.0198 1.72090.07560.03921.37980.03860.02701.47010.02070.0167
D[36]1.74720.08330.03931.37710.03870.02951.46990.02080.0198 1.69620.07960.03921.37730.03860.02731.46950.02080.0175
Table A3. The APE (1st Col.), RMSE (2nd Col.), and MRAB (3rd Col.) results of θ .
Table A3. The APE (1st Col.), RMSE (2nd Col.), and MRAB (3rd Col.) results of θ .
DesignMLEBayes MLEBayes
Prior → AB AB
Set-1→
( ȷ 1 , ȷ 2 ) (0.2, 0.5) (0.5, 0.8)
D[11]0.32621.61810.86690.09860.55480.48470.14430.18550.1000 0.28411.57110.58510.10220.52440.43680.14820.11760.0923
D[12]0.28881.76090.91680.07090.64130.49730.12530.18750.1034 0.25991.72890.69460.08160.52830.47950.13120.14590.0989
D[13]0.33061.57950.76830.10070.53730.44620.14310.18360.0988 0.35431.52110.54490.09260.51190.40220.13040.11570.0920
D[14]0.24491.52300.52260.21070.42220.21370.11080.12360.0840 1.18671.35520.43511.03890.38670.20491.14790.09280.0520
D[15]0.40351.57810.52880.22380.44600.21960.12160.13520.0912 1.17591.36060.47141.04230.39160.21411.15730.09330.0528
D[16]0.20361.36940.43880.20260.36880.20810.10050.11420.0784 1.31691.13990.41611.04070.31560.20381.14840.08840.0516
D[21]0.28021.31180.39800.21950.36650.20670.11560.08240.0518 0.22621.13710.39220.21450.31350.20350.11260.07780.0507
D[22]0.22191.30320.39370.20890.32950.20350.11080.07940.0507 0.24261.12420.35000.21460.30600.19880.11960.07510.0506
D[23]0.35101.21000.32700.19710.31420.20300.10310.07860.0503 0.39241.09780.32400.19850.29180.18410.10410.07100.0500
D[24]0.22481.20260.31350.20120.26910.14380.18930.07080.0498 0.21151.05540.30900.19710.19880.13350.18430.06820.0498
D[25]0.31141.20930.31710.19280.27350.15200.17790.07100.0499 0.23341.09300.31560.19990.20290.14520.18790.07080.0498
D[26]0.22551.19410.30480.20090.25430.14280.18810.06650.0466 0.21941.01960.29180.19830.18410.13290.18540.06650.0466
D[31]0.21091.18030.28780.20470.14710.13180.18480.03480.0323 0.24410.91910.24840.19520.14010.12850.17470.03390.0319
D[32]0.27521.18240.30210.20140.14920.14250.18790.03550.0353 0.18681.01170.25090.20320.14740.13090.18910.03540.0340
D[33]0.23151.16560.27680.20740.13780.13140.18890.03380.0319 0.23520.91500.24070.20760.13660.11940.19360.03370.0319
D[34]0.25441.09100.25340.16580.13750.13000.14170.03370.0317 0.25440.60600.22610.16580.13300.05180.14170.03290.0316
D[35]0.27871.08860.25110.16130.13750.12980.13730.03370.0316 0.27710.57590.21470.16130.13300.05140.13730.03290.0313
D[36]0.26260.91960.21490.16250.13190.12390.13690.03290.0302 0.21830.51430.21280.16250.13010.04380.13690.03270.0291
Set-2→
( ȷ 1 , ȷ 2 ) (0.5, 1.0) (1.5, 2.5)
D[11]1.18671.10550.78541.03890.18550.14381.14790.11280.0876 1.09040.91680.60601.04450.18270.14191.15820.11130.0864
D[12]1.17591.14540.79241.04230.18810.14561.15730.11330.0878 0.99710.91730.62871.03850.18750.14521.15540.11150.0867
D[13]1.31691.06300.75891.04070.18360.14251.14840.11150.0867 1.03740.86690.57591.04300.18150.14071.15820.11090.0863
D[14]1.18980.78740.52581.22140.11020.08551.09460.05170.0346 1.11480.77990.51951.22540.11020.08551.09640.05150.0345
D[15]1.19360.91730.62871.22270.11090.08641.09490.05310.0353 1.10920.83770.56821.22930.11090.08611.10020.05310.0353
D[16]1.18390.76840.52541.22540.10680.08311.09730.05150.0345 1.17680.76830.51431.22540.10600.08241.09730.05100.0342
D[21]1.14910.76510.48971.22860.07840.05181.10110.05100.0345 1.19260.71310.48341.22490.07080.05151.09670.04540.0342
D[22]1.14080.69830.48341.22330.07780.05141.09600.05090.0343 1.25540.69830.47701.22250.06750.05101.09600.04320.0341
D[23]1.19270.69690.47911.22400.06820.05091.09640.04380.0341 1.19270.69230.46151.22400.06750.05091.09640.04320.0341
D[24]1.06330.63040.41161.20450.05740.03931.18250.03750.0262 1.15150.48710.33191.20160.05470.03881.17930.03630.0243
D[25]1.07210.64380.44391.20250.05740.04001.17930.03930.0269 1.14840.63680.41801.20310.05690.03991.17930.03900.0269
D[26]1.08930.55580.38031.20450.05600.03831.18250.03730.0253 1.12480.47590.32251.20450.05440.03761.18250.03570.0239
D[31]1.05500.53630.36441.20440.03970.03271.18300.02740.0221 1.16720.42460.29471.20200.03960.03271.18250.02730.0221
D[32]1.08910.54080.37191.20180.03970.03271.17920.02740.0221 1.15610.44230.30051.20120.03970.03271.17920.02740.0221
D[33]1.03090.53260.36111.20440.03960.03271.18250.02730.0221 1.03090.42130.28921.20440.03830.03261.18250.02670.0220
D[34]1.16170.43760.30571.22760.03830.03251.15490.02670.0219 1.22720.36710.24351.23060.03830.03251.15800.02670.0218
D[35]1.17540.48440.31931.23160.03830.03271.15640.02670.0221 1.22570.41510.28881.23150.03830.03261.15840.02670.0219
D[36]1.22360.43330.28491.22680.03830.03241.15500.02670.0218 1.23490.34670.22511.22910.03820.03241.15560.02660.0218
Table A4. The APE (1st Col.), RMSE (2nd Col.), and MRAB (3rd Col.) results of R ( x ) .
Table A4. The APE (1st Col.), RMSE (2nd Col.), and MRAB (3rd Col.) results of R ( x ) .
DesignMLEBayes MLEBayes
Prior → AB AB
Set-1→
( ȷ 1 , ȷ 2 ) (0.2, 0.5) (0.5, 0.8)
D[11]0.79230.88630.77070.85530.69360.68390.77690.46390.4548 0.79230.88210.77070.86130.69100.67170.78750.45480.3969
D[12]0.78771.27681.09890.88200.77570.76210.78860.59760.5253 0.78791.13200.97310.87230.76360.75020.78310.54390.4765
D[13]0.78760.97270.83390.85640.73720.71560.77690.50380.4885 0.78800.90270.77740.85410.72510.70430.77490.49030.4037
D[14]0.79030.75400.66890.77590.60490.53010.83050.45140.3945 0.93920.75400.66890.95000.60220.52230.92900.42640.3784
D[15]0.78660.77860.68900.76930.63990.53310.82170.45190.4281 0.93800.77860.68900.95000.62300.53250.92890.44070.3787
D[16]0.78380.88210.76370.75790.67920.58090.81200.45290.4422 0.93560.86900.74940.94990.67810.57690.92740.45210.3930
D[21]0.78680.53520.50700.78540.48240.45640.82810.42250.3653 0.78670.53080.49690.78410.48150.44590.82720.37970.3607
D[22]0.77890.58400.53220.75960.51850.47170.81430.42990.3930 0.78120.58020.52220.76240.51150.46080.81530.42250.3735
D[23]0.78320.53930.50900.77530.48790.46750.82250.42640.3763 0.78430.53810.49990.77170.48780.44840.81400.38440.3689
D[24]0.79130.49740.44010.82960.43090.41640.81140.36890.3520 0.79080.47640.43340.83080.41840.41270.81230.36750.3489
D[25]0.79020.51260.47790.82930.44180.43240.81010.37590.3551 0.79060.48940.44820.83100.43580.41880.81350.37130.3490
D[26]0.78950.52190.49120.83360.46030.44540.81640.41990.3626 0.79020.51670.47940.83030.44620.43880.81110.37900.3530
D[31]0.79030.41480.40150.82630.37370.35930.80970.34880.3213 0.78990.40560.39150.82460.37300.34990.80780.34210.3187
D[32]0.78620.46270.43650.83000.40850.40540.81450.36530.3503 0.78680.45380.41230.82920.40740.38910.81330.35920.3460
D[33]0.78710.43120.41250.82690.40170.37690.81170.35570.3498 0.78720.42230.41120.83250.38520.35700.81540.35360.3434
D[34]0.78920.37530.36870.73200.36370.32900.77050.19000.0556 0.78920.37000.36670.73200.33740.32730.77050.18970.0505
D[35]0.78920.39030.37270.73000.36540.33990.77000.19130.0561 0.78930.37840.37080.73000.34220.33660.77000.19080.0509
D[36]0.78810.40750.39100.72170.37170.34360.76690.19160.0671 0.78810.40180.38440.72170.35710.33720.76690.19100.0605
Set-2→
( ȷ 1 , ȷ 2 ) (0.5, 1.0) (1.5, 2.5)
D[11]0.93920.39530.34360.95000.20500.19590.92900.08940.0784 0.93770.39150.34220.94990.20480.19590.92750.08840.0775
D[12]0.93560.42030.36310.94990.21550.20550.92740.09050.0791 0.93450.41640.35710.95010.21530.20540.92750.08940.0784
D[13]0.93800.41740.35910.95000.21120.20170.92890.08990.0786 0.93700.40910.35280.94990.20860.19920.92750.08930.0782
D[14]0.93440.37880.33320.92850.19000.18970.93820.08410.0739 0.93440.37790.33240.92850.18970.18940.93820.08030.0709
D[15]0.93380.38490.33560.92860.19130.18990.93840.08770.0770 0.93390.38030.33450.92850.19080.18960.93820.08440.0740
D[16]0.93110.38560.33860.92850.19210.19140.93830.08840.0775 0.93060.38440.33740.92790.19160.19100.93780.08770.0770
D[21]0.93340.30160.26620.92870.07570.07010.93850.06730.0595 0.93340.29950.26360.92870.07470.07010.93850.06710.0523
D[22]0.92980.34360.28890.92750.08350.07950.93730.07030.0605 0.92990.33580.28210.92770.08190.07780.93780.06820.0600
D[23]0.93250.31110.27300.92860.07860.07420.93820.06960.0600 0.93300.30870.27300.92860.07700.07010.93820.06710.0528
D[24]0.93580.29600.25560.93840.07430.06610.93470.06510.0523 0.93600.29510.25560.93840.07130.06510.93470.05840.0521
D[25]0.93600.29890.26140.93840.07460.06890.93470.06510.0523 0.93600.29600.26100.93890.07340.06650.93490.05940.0521
D[26]0.93490.29930.26340.93880.07470.07010.93490.06680.0528 0.93510.29770.26120.93880.07470.06880.93490.06650.0521
D[31]0.93400.24080.20830.93900.07120.05840.93480.05340.0521 0.93400.23810.20820.93900.07090.05780.93480.05340.0505
D[32]0.93210.25910.22610.93990.07350.05940.93540.05800.0521 0.93230.25800.22570.93980.07120.05850.93540.05730.0521
D[33]0.93390.24410.21300.93900.07120.05840.93480.05590.0521 0.93410.24080.21300.93940.07100.05800.93480.05340.0509
D[34]0.93160.22780.19410.91450.07000.05780.93000.05310.0472 0.93150.22590.19280.91450.07000.05560.92990.05300.0469
D[35]0.93140.22960.19610.91420.07060.05800.92990.05340.0485 0.93140.22690.19420.91400.07000.05610.92960.05330.0470
D[36]0.93040.23650.20770.91360.07060.05800.92980.05340.0490 0.93040.23540.20280.91360.07060.05780.92960.05340.0474
Table A5. The APE (1st Col.), RMSE (2nd Col.), and MRAB (3rd Col.) results of h ( x ) .
Table A5. The APE (1st Col.), RMSE (2nd Col.), and MRAB (3rd Col.) results of h ( x ) .
DesignMLEBayes MLEBayes
Prior → AB AB
Set-1→
( ȷ 1 , ȷ 2 ) (0.2, 0.5) (0.5, 0.8)
D[11]1.41260.58990.56700.85540.44370.39531.23610.36040.2376 1.41340.57870.54810.81780.42220.38821.17470.30240.2053
D[12]1.45420.83960.67750.70150.62530.54941.16670.42410.2690 1.43490.74290.63130.75740.55060.49231.19460.37720.2526
D[13]1.48570.65740.61890.84730.51780.43131.23890.38070.2571 1.47090.64360.60140.86250.44420.40301.25310.35310.2073
D[14]1.32300.47000.32901.32720.27840.25040.93040.22280.1499 0.95660.46430.28810.73510.27710.24410.97960.20030.1445
D[15]1.40020.48170.35541.36660.30180.25230.98440.23780.1911 0.99250.46860.33020.73460.28750.24570.98010.22750.1453
D[16]1.42380.54080.38121.43340.34750.25321.04240.24500.2047 1.03540.47750.34910.73650.28920.24630.99770.22880.1491
D[21]1.38150.44530.27391.28330.23350.21530.94540.15910.1340 1.38460.39680.26061.29070.22060.17850.95110.13450.1178
D[22]1.44520.46410.32571.41960.27310.22131.02050.18450.1378 1.40140.45370.27741.39990.23390.19121.01090.14160.1263
D[23]1.40420.45060.29281.34200.26300.21810.98180.16000.1357 1.39210.44710.27001.36670.22070.18211.03110.13960.1200
D[24]1.32230.31220.19791.14400.18880.17641.17720.12030.1161 1.32050.29680.19421.13480.18650.17061.16960.11630.1059
D[25]1.33970.33040.20621.14560.20300.17931.18490.13100.1178 1.32960.29780.20481.13090.19030.17601.16240.12560.1159
D[26]1.35510.33090.21021.11220.20620.19271.14010.13400.1306 1.32700.30340.20671.13910.19700.17811.17810.13070.1175
D[31]1.30600.26570.18231.16970.17060.15841.18510.11590.1086 1.31420.25400.18231.17780.16550.15431.20000.11450.1022
D[32]1.35910.30910.19091.14270.18770.17361.16420.11760.1143 1.34020.29050.19051.14980.18610.16711.17160.11480.1057
D[33]1.35980.28610.18801.16260.18490.17271.16950.11610.1140 1.35470.28030.18681.12150.18130.16631.13830.11460.1040
D[34]1.28400.20150.16711.38690.15980.12491.24370.10080.0570 1.28220.19970.16521.38690.12740.10221.24370.09570.0479
D[35]1.28710.20610.17951.39060.16630.12691.24640.10700.0571 1.28440.20240.17621.39060.12890.11121.24640.10570.0489
D[36]1.28630.20680.18131.42620.16710.12881.26820.11380.0622 1.28620.20660.17951.42620.12900.11451.26820.10590.0537
Set-2→
( ȷ 1 , ȷ 2 ) (0.5, 1.0) (1.5, 2.5)
D[11]0.95660.45680.36730.73510.25040.24410.97960.11920.1012 0.97140.45060.36040.73680.24970.24350.99700.11760.0996
D[12]1.03540.55200.43170.73650.25400.24690.99770.12080.1019 1.03310.54080.42410.73430.25320.24630.99600.11920.1013
D[13]0.99250.49320.38760.73460.25230.24570.98010.11990.1013 0.99440.48170.38070.73690.24970.24360.99700.11890.1005
D[14]0.96770.38780.31381.00650.20000.18680.87210.11220.0949 0.96850.38500.31261.00650.19910.18570.87210.10730.0910
D[15]0.98360.40610.32851.00430.20620.19230.86940.11730.0994 0.98980.39850.32431.00650.20270.18890.87120.11320.0957
D[16]1.01180.45260.36121.00610.21050.19610.87030.11760.0996 1.02280.44970.35481.01380.21030.19590.87690.11730.0994
D[21]0.98840.33090.26711.00390.08210.06930.86840.06640.0592 0.98840.32750.26411.00390.08210.06900.86840.06560.0584
D[22]1.05130.38220.29871.01770.08810.07560.88230.07230.0600 1.04820.38160.29821.01440.08620.07410.87590.06990.0600
D[23]1.01740.33230.27861.00550.08560.07150.87180.06910.0592 1.00850.32790.27801.00450.08350.07030.87180.06710.0592
D[24]0.98590.30690.24930.90640.08160.06800.93290.06510.0584 0.98040.30460.24830.90640.08130.06710.93290.06240.0584
D[25]0.99100.30800.26300.90640.08200.06800.93290.06560.0584 0.98000.30800.26240.90030.08160.06800.93020.06510.0584
D[26]1.00490.31030.26640.90210.08210.06910.93020.06560.0584 0.99290.30930.26400.90220.08180.06880.93020.06560.0584
D[31]0.99810.25400.21160.90060.07480.06700.93210.06240.0533 0.99810.25070.21160.90060.07410.06700.93210.06200.0489
D[32]1.03760.30640.24010.88990.08130.06710.92550.06490.0539 1.02600.30070.24010.89170.08130.06710.92550.06220.0537
D[33]1.00920.25500.21580.90060.07850.06710.93200.06240.0539 0.99720.25490.21220.89560.07410.06700.93210.06210.0489
D[34]0.97490.21990.18201.13560.06950.06150.97890.06080.0484 0.97310.21610.17831.13660.06950.06080.97960.05700.0478
D[35]0.98430.22490.18711.13870.07330.06230.97900.06080.0494 0.97370.21930.18091.14190.06950.06190.98310.05710.0482
D[36]0.99590.25070.20701.14560.07410.06230.98130.06200.0499 0.98580.24200.20101.14540.07340.06220.98380.06200.0483
Table A6. The AIL (1st Col.) and CP (2nd Col.) results of α .
Table A6. The AIL (1st Col.) and CP (2nd Col.) results of α .
DesignACI[Norm]ACI[Log-Norm]BCIHPD
Prior → ABAB
Set-1
( ȷ 1 , ȷ 2 ) = ( 0.2 , 0.5 )
D[11]1.0830.9340.3960.9720.3120.9770.2780.9790.2420.9810.2180.982
D[12]1.1660.9290.4800.9680.3130.9770.2800.9790.2420.9810.2210.982
D[13]0.9430.9420.3310.9760.3100.9770.2730.9790.2420.9810.2170.982
D[14]0.7860.9500.3210.9760.2730.9790.2270.9820.2180.9820.1460.986
D[15]0.8830.9450.3290.9760.2760.9790.2270.9820.2180.9820.1470.986
D[16]0.6730.9570.2910.9780.2670.9800.2220.9820.2180.9820.1450.986
D[21]0.6370.9590.2710.9790.2280.9820.2200.9820.1470.9860.1430.987
D[22]0.6330.9590.2650.9800.2260.9820.2170.9820.1460.9860.1420.987
D[23]0.5480.9640.2530.9800.2230.9820.2160.9820.1430.9870.1400.987
D[24]0.4850.9670.2460.9810.2150.9830.1550.9860.1420.9870.1290.987
D[25]0.5000.9660.2460.9810.2160.9820.1560.9860.1430.9870.1310.987
D[26]0.4680.9680.2420.9810.2090.9830.1540.9860.1420.9870.1290.987
D[31]0.3630.9740.1880.9840.1550.9860.1290.9870.1210.9880.1110.988
D[32]0.4540.9690.2250.9820.1560.9860.1310.9870.1210.9880.1150.988
D[33]0.2830.9790.1750.9850.1540.9860.1290.9870.1200.9880.1100.988
D[34]0.2760.9790.1540.9860.1220.9880.1200.9880.1110.9880.1000.989
D[35]0.2700.9790.1420.9870.1210.9880.1190.9880.1110.9880.0990.989
D[36]0.1850.9840.1360.9870.1210.9880.1180.9880.1100.9880.0990.989
( ȷ 1 , ȷ 2 ) = ( 0.5 , 0.8 )
D[11]0.9460.9410.3690.9740.3040.9770.2720.9790.2410.9810.2160.982
D[12]1.0410.9360.3900.9730.3100.9770.2780.9790.2420.9810.2200.982
D[13]0.8990.9440.3110.9770.2820.9790.2720.9790.2240.9820.2160.982
D[14]0.6100.9600.2730.9790.2700.9790.2220.9820.2130.9830.1430.987
D[15]0.8260.9480.2770.9790.2730.9790.2250.9820.2150.9820.1430.987
D[16]0.5910.9610.2690.9790.2660.9800.2200.9820.2130.9830.1420.987
D[21]0.4960.9670.2630.9800.2210.9820.2130.9830.1440.9860.1410.987
D[22]0.4740.9680.2530.9800.2210.9820.2110.9830.1430.9870.1400.987
D[23]0.4540.9690.2440.9810.2160.9820.2110.9830.1430.9870.1400.987
D[24]0.3480.9750.2190.9820.2050.9830.1550.9860.1390.9870.1270.987
D[25]0.4120.9710.2230.9820.2150.9820.1550.9860.1390.9870.1290.987
D[26]0.3360.9760.2190.9820.1840.9840.1540.9860.1390.9870.1270.987
D[31]0.2290.9820.1580.9860.1550.9860.1270.9870.1190.9880.1010.989
D[32]0.2390.9810.1670.9850.1550.9860.1290.9870.1190.9880.1050.989
D[33]0.2050.9830.1570.9860.1540.9860.1270.9870.1180.9880.1010.989
D[34]0.1680.9850.1500.9860.1210.9880.1190.9880.1110.9880.1000.989
D[35]0.1550.9860.1370.9870.1210.9880.1180.9880.1100.9880.0990.989
D[36]0.1490.9860.1230.9880.1200.9880.1180.9880.1080.9890.0990.989
Set-2
( ȷ 1 , ȷ 2 ) = ( 1.0 , 1.5 )
D[11]0.9460.9400.4000.9730.2960.9790.2710.9800.2420.9820.2200.983
D[12]1.0940.9310.4240.9710.3110.9780.2780.9800.2410.9820.2200.983
D[13]0.8990.9430.3900.9730.2880.9790.2710.9800.2420.9820.2160.984
D[14]0.5270.9650.2630.9810.2080.9840.2040.9840.1420.9880.1390.988
D[15]0.8640.9450.3010.9780.2080.9840.2040.9840.1430.9880.1400.988
D[16]0.4540.9690.2070.9840.2040.9840.1970.9850.1420.9880.1390.988
D[21]0.4520.9690.2070.9840.2040.9840.1920.9850.1410.9880.1380.988
D[22]0.3230.9770.2070.9840.2040.9840.1880.9850.1410.9880.1380.988
D[23]0.3080.9780.2070.9840.2040.9840.1870.9850.1410.9880.1380.988
D[24]0.2830.9800.1850.9850.1600.9870.1560.9870.1320.9890.1310.989
D[25]0.3010.9780.1860.9850.1610.9870.1580.9870.1340.9880.1310.989
D[26]0.2690.9800.1810.9860.1600.9870.1550.9870.1320.9890.1300.989
D[31]0.2450.9820.1700.9860.1220.9890.1190.9890.1130.9900.1020.990
D[32]0.2460.9820.1810.9860.1220.9890.1200.9890.1130.9900.1020.990
D[33]0.2370.9820.1660.9870.1220.9890.1190.9890.1130.9900.1010.990
D[34]0.1600.9870.1270.9890.1200.9890.1180.9890.1060.9900.0940.991
D[35]0.1870.9850.1560.9870.1210.9890.1190.9890.1120.9900.1000.990
D[36]0.1510.9870.1190.9890.1170.9890.1150.9900.1050.9900.0940.991
( ȷ 1 , ȷ 2 ) = ( 1.5 , 2.5 )
D[11]0.9150.9420.3120.9780.2780.9800.2700.9800.2350.9820.2150.984
D[12]0.9650.9390.3800.9740.3030.9780.2760.9800.2410.9820.2190.983
D[13]0.8410.9460.3110.9780.2730.9800.2690.9800.2200.9830.2150.984
D[14]0.5270.9650.2470.9820.2070.9840.2040.9840.1420.9880.1390.988
D[15]0.7800.9500.2650.9810.2080.9840.2040.9840.1430.9880.1390.988
D[16]0.4520.9690.2070.9840.2040.9840.1970.9850.1410.9880.1380.988
D[21]0.3450.9760.2070.9840.2040.9840.1900.9850.1410.9880.1380.988
D[22]0.3220.9770.2070.9840.2040.9840.1860.9850.1410.9880.1380.988
D[23]0.3040.9780.2060.9840.2030.9840.1820.9860.1410.9880.1380.988
D[24]0.2730.9800.1770.9860.1600.9870.1560.9870.1310.9890.1300.989
D[25]0.2920.9790.1810.9860.1600.9870.1560.9870.1320.9890.1310.989
D[26]0.2580.9810.1750.9860.1590.9870.1540.9870.1310.9890.1300.989
D[31]0.2180.9830.1690.9860.1220.9890.1190.9890.1130.9900.1010.990
D[32]0.2370.9820.1710.9860.1220.9890.1190.9890.1130.9900.1020.990
D[33]0.2030.9840.1650.9870.1210.9890.1190.9890.1120.9900.1000.990
D[34]0.1570.9870.1220.9890.1200.9890.1150.9900.1050.9900.0940.991
D[35]0.1810.9860.1530.9870.1210.9890.1190.9890.1110.9900.0970.991
D[36]0.1420.9880.1190.9890.1170.9890.1110.9900.1020.9900.0910.991
Table A7. The AIL (1st Col.) and CP (2nd Col.) results of γ .
Table A7. The AIL (1st Col.) and CP (2nd Col.) results of γ .
DesignACI[Norm]ACI[Log-Norm]BCIHPD
Prior → ABAB
Set-1
( ȷ 1 , ȷ 2 ) = ( 0.2 , 0.5 )
D[11]1.1900.9270.8540.9440.2140.9770.2090.9770.2070.9770.1850.978
D[12]1.0150.9360.8450.9450.2130.9770.2080.9770.2040.9770.1840.978
D[13]1.3770.9181.1470.9300.2150.9770.2110.9770.2090.9770.1880.978
D[14]0.9810.9380.7530.9500.2120.9770.1830.9780.1670.9790.1590.980
D[15]0.9670.9390.6010.9570.2050.9770.1800.9790.1630.9790.1560.980
D[16]0.9690.9390.7450.9500.2090.9770.1830.9780.1650.9790.1560.980
D[21]0.7370.9500.5620.9590.1680.9790.1630.9790.1580.9800.1500.980
D[22]0.6040.9570.5260.9610.1660.9790.1600.9800.1560.9800.1480.980
D[23]0.7960.9470.5830.9580.1710.9790.1630.9790.1580.9800.1510.980
D[24]0.5100.9620.4810.9630.1650.9790.1590.9800.1550.9800.1410.981
D[25]0.4790.9630.4620.9640.1620.9790.1540.9800.1490.9800.1370.981
D[26]0.4990.9620.4720.9640.1650.9790.1590.9800.1520.9800.1370.981
D[31]0.4660.9640.4470.9650.1590.9800.1410.9810.1250.9810.1220.982
D[32]0.4230.9660.3820.9680.1560.9800.1340.9810.1230.9810.1210.982
D[33]0.4580.9640.4260.9660.1590.9800.1360.9810.1240.9810.1210.982
D[34]0.3930.9680.3590.9700.1270.9810.1260.9810.1230.9810.1200.982
D[35]0.3340.9710.3250.9710.1220.9810.1190.9820.1190.9820.0930.983
D[36]0.3530.9700.3270.9710.1240.9810.1240.9810.1220.9810.1200.982
( ȷ 1 , ȷ 2 ) = ( 0.5 , 0.8 )
D[11]1.0090.9370.8030.9470.2130.9770.2070.9770.2060.9770.1730.979
D[12]0.9370.9400.6930.9530.2120.9770.2050.9770.2010.9780.1720.979
D[13]1.2180.9260.9700.9390.2140.9770.2100.9770.2080.9770.1750.979
D[14]0.8650.9440.5940.9580.2110.9770.1750.9790.1650.9790.1510.980
D[15]0.7960.9470.5690.9590.2030.9770.1710.9790.1610.9800.1490.980
D[16]0.8210.9460.5810.9580.2090.9770.1730.9790.1630.9790.1490.980
D[21]0.6290.9560.5330.9610.1660.9790.1600.9800.1530.9800.1460.980
D[22]0.5530.9600.5020.9620.1660.9790.1600.9800.1530.9800.1450.980
D[23]0.6660.9540.5530.9600.1710.9790.1600.9800.1550.9800.1470.980
D[24]0.4810.9630.4790.9630.1640.9790.1570.9800.1480.9800.1400.981
D[25]0.4660.9640.4450.9650.1600.9800.1530.9800.1420.9800.1370.981
D[26]0.4790.9630.4640.9640.1620.9790.1570.9800.1440.9800.1370.981
D[31]0.4610.9640.4350.9660.1570.9800.1400.9810.1250.9810.1210.982
D[32]0.3930.9680.3820.9680.1540.9800.1330.9810.1210.9820.1200.982
D[33]0.4330.9660.4140.9670.1570.9800.1350.9810.1220.9810.1210.982
D[34]0.3610.9690.3500.9700.1270.9810.1260.9810.1200.9820.1190.982
D[35]0.3270.9710.3190.9720.1210.9820.1190.9820.1170.9820.0920.983
D[36]0.3450.9700.3200.9710.1240.9810.1230.9810.1200.9820.1170.982
Set-2
( ȷ 1 , ȷ 2 ) = ( 1.0 , 1.5 )
D[11]1.0210.9290.3230.9710.2130.9770.2070.9780.1910.9790.1830.979
D[12]0.8990.9360.3210.9710.2120.9770.2070.9780.1890.9790.1830.979
D[13]1.1390.9220.3870.9670.2140.9770.2100.9780.1910.9790.1850.979
D[14]0.8850.9370.3130.9710.2080.9780.1920.9790.1490.9810.1460.981
D[15]0.6480.9510.2940.9730.2050.9780.1900.9790.1470.9810.1440.982
D[16]0.8330.9400.2950.9730.2070.9780.1920.9790.1490.9810.1460.981
D[21]0.6390.9520.2470.9750.1650.9800.1590.9810.1400.9820.1390.982
D[22]0.4820.9610.2360.9760.1630.9800.1570.9810.1400.9820.1390.982
D[23]0.6470.9510.2650.9740.1680.9800.1620.9800.1400.9820.1390.982
D[24]0.4090.9660.2310.9760.1630.9800.1560.9810.1380.9820.1370.982
D[25]0.3600.9690.2030.9780.1620.9810.1530.9810.1380.9820.1340.982
D[26]0.3820.9670.2050.9780.1630.9800.1560.9810.1380.9820.1360.982
D[31]0.3220.9710.1930.9790.1290.9820.1280.9830.1260.9830.0950.984
D[32]0.2710.9740.1910.9790.1290.9820.1270.9830.1260.9830.0940.985
D[33]0.3390.9700.1940.9790.1290.9820.1280.9830.1270.9830.0980.984
D[34]0.2650.9740.1880.9790.1270.9830.1270.9830.1250.9830.0910.985
D[35]0.2450.9760.1510.9810.1120.9840.1080.9840.0870.9850.0870.985
D[36]0.2590.9750.1650.9800.1150.9830.1110.9840.0900.9850.0900.985
( ȷ 1 , ȷ 2 ) = ( 1.5 , 2.5 )
D[11]0.9670.9320.3180.9710.2100.9780.2020.9780.1870.9790.1830.979
D[12]0.8870.9370.3050.9720.2080.9780.2010.9780.1850.9790.1800.979
D[13]1.0240.9290.3230.9710.2120.9780.2040.9780.1880.9790.1830.979
D[14]0.8520.9390.2940.9730.2040.9780.1910.9790.1490.9810.1460.981
D[15]0.6290.9530.2910.9730.2020.9780.1890.9790.1470.9810.1440.982
D[16]0.7880.9430.2910.9730.2020.9780.1910.9790.1490.9810.1450.981
D[21]0.6040.9540.2330.9760.1630.9800.1570.9810.1400.9820.1390.982
D[22]0.4130.9650.2250.9770.1620.9800.1570.9810.1400.9820.1390.982
D[23]0.6100.9540.2590.9750.1660.9800.1620.9800.1400.9820.1390.982
D[24]0.3760.9680.2190.9770.1620.9810.1550.9810.1380.9820.1370.982
D[25]0.3390.9700.1940.9790.1600.9810.1530.9810.1380.9820.1330.982
D[26]0.3710.9680.2000.9780.1600.9810.1530.9810.1380.9820.1350.982
D[31]0.2850.9730.1920.9790.1290.9820.1280.9830.1260.9830.0940.985
D[32]0.2700.9740.1880.9790.1280.9830.1270.9830.1250.9830.0940.985
D[33]0.3370.9700.1930.9790.1290.9820.1280.9830.1260.9830.0970.984
D[34]0.2620.9750.1680.9800.1270.9830.1260.9830.1250.9830.0910.985
D[35]0.1550.9810.1290.9820.1110.9840.1070.9840.0870.9850.0870.985
D[36]0.2500.9750.1550.9810.1140.9830.1100.9840.0900.9850.0900.985
Table A8. The AIL (1st Col.) and CP (2nd Col.) results of θ .
Table A8. The AIL (1st Col.) and CP (2nd Col.) results of θ .
DesignACI[Norm]ACI[Log-Norm]BCIHPD
Prior → ABAB
Set-1
( ȷ 1 , ȷ 2 ) = ( 0.2 , 0.5 )
D[11]0.7200.9410.3070.9700.2690.9730.2430.9750.1930.9780.1840.979
D[12]0.8150.9340.3150.9690.2770.9720.2450.9740.2110.9770.1960.978
D[13]0.6760.9440.3030.9700.2650.9730.2330.9750.1880.9780.1830.979
D[14]0.3660.9660.2000.9780.1950.9780.1840.9790.1760.9790.1380.982
D[15]0.4300.9610.2120.9770.2010.9770.1870.9780.1830.9790.1400.982
D[16]0.3470.9670.1910.9780.1870.9790.1780.9790.1720.9800.1380.982
D[21]0.3450.9670.1900.9780.1780.9790.1540.9810.1380.9820.1370.982
Set-1
( ȷ 1 , ȷ 2 ) = ( 0.2 , 0.5 )
D[22]0.3190.9690.1820.9790.1730.9800.1530.9810.1350.9820.1350.982
D[23]0.3150.9690.1820.9790.1640.9800.1520.9810.1320.9820.1320.982
D[24]0.2790.9720.1240.9830.1220.9830.1170.9830.1150.9840.1130.984
D[25]0.3040.9700.1290.9830.1240.9830.1170.9830.1160.9840.1140.984
D[26]0.2230.9760.1230.9830.1210.9830.1170.9830.1150.9840.1130.984
D[31]0.2010.9780.1230.9830.1210.9830.1170.9830.1150.9840.1130.984
D[32]0.2180.9760.1230.9830.1210.9830.1170.9830.1150.9840.1130.984
D[33]0.1880.9780.1220.9830.1200.9830.1170.9830.1140.9840.1130.984
D[34]0.1490.9810.1220.9830.1200.9830.1060.9840.1030.9840.0980.985
D[35]0.1220.9830.1180.9830.1160.9840.1050.9840.1010.9850.0960.985
D[36]0.1180.9830.1160.9840.1060.9840.1050.9840.1010.9850.0950.985
( ȷ 1 , ȷ 2 ) = ( 0.5 , 0.8 )
D[11]0.4530.9600.3010.9700.2630.9730.1940.9780.1890.9780.1790.979
D[12]0.5650.9520.3120.9700.2740.9720.2140.9770.2070.9770.1920.978
D[13]0.3930.9640.3010.9700.2620.9730.1920.9780.1870.9790.1790.979
D[14]0.3600.9660.1950.9780.1900.9780.1800.9790.1420.9820.1380.982
D[15]0.3820.9650.2070.9770.1920.9780.1870.9790.1460.9810.1400.982
D[16]0.3420.9680.1900.9780.1810.9790.1730.9800.1410.9820.1380.982
D[21]0.3020.9700.1830.9790.1730.9800.1540.9810.1380.9820.1370.982
D[22]0.2850.9720.1770.9790.1660.9800.1530.9810.1350.9820.1350.982
D[23]0.2800.9720.1760.9790.1630.9800.1510.9810.1320.9820.1320.982
D[24]0.2210.9760.1230.9830.1210.9830.1170.9830.1150.9840.1130.984
D[25]0.2770.9720.1260.9830.1210.9830.1170.9830.1150.9840.1130.984
D[26]0.2160.9760.1220.9830.1200.9830.1170.9830.1150.9840.1130.984
D[31]0.1760.9790.1210.9830.1180.9830.1170.9830.1150.9840.1130.984
D[32]0.2010.9780.1220.9830.1200.9830.1170.9830.1150.9840.1130.984
D[33]0.1560.9810.1200.9830.1170.9830.1170.9830.1140.9840.1120.984
D[34]0.1220.9830.1200.9830.1170.9830.1060.9840.1020.9850.0970.985
D[35]0.1200.9830.1170.9840.1110.9840.1050.9840.1010.9850.0960.985
D[36]0.1180.9830.1140.9840.1050.9840.1050.9840.1010.9850.0950.985
Set-2
( ȷ 1 , ȷ 2 ) = ( 1.0 , 1.5 )
D[11]0.7200.9420.3070.9710.2430.9760.2130.9780.1980.9790.1870.980
D[12]0.7990.9360.3120.9710.2450.9760.2250.9770.2080.9780.1880.980
D[13]0.6310.9480.3030.9710.2330.9770.2080.9780.1900.9800.1720.981
D[14]0.3370.9690.1760.9810.1720.9810.1570.9820.1410.9830.1080.986
D[15]0.4670.9600.1770.9810.1730.9810.1590.9820.1430.9830.1080.985
D[16]0.3140.9710.1750.9810.1710.9810.1560.9820.1380.9830.1050.986
D[21]0.3090.9710.1730.9810.1700.9810.1410.9830.1080.9850.1040.986
D[22]0.2950.9720.1730.9810.1690.9810.1390.9830.1080.9860.1040.986
D[23]0.2710.9740.1730.9810.1690.9810.1360.9830.1050.9860.1030.986
D[24]0.2320.9770.1230.9840.1180.9850.1140.9850.1030.9860.1010.986
D[25]0.2490.9750.1230.9840.1180.9850.1150.9850.1050.9860.1020.986
D[26]0.2180.9780.1230.9840.1180.9850.1130.9850.1000.9860.0990.986
D[31]0.2170.9780.1220.9840.1170.9850.1120.9850.0980.9860.0970.986
D[32]0.2170.9780.1220.9840.1180.9850.1120.9850.0990.9860.0980.986
D[33]0.2020.9790.1220.9850.1170.9850.1110.9850.0980.9860.0970.986
D[34]0.1690.9810.1130.9850.1120.9850.1090.9850.0950.9860.0930.987
D[35]0.1740.9810.1130.9850.1120.9850.1110.9850.0960.9860.0940.987
D[36]0.1670.9810.1120.9850.1110.9850.0950.9860.0940.9860.0880.987
( ȷ 1 , ȷ 2 ) = ( 1.5 , 2.5 )
D[11]0.4530.9610.2690.9740.2310.9770.2070.9780.1890.9800.1710.981
D[12]0.4670.9600.2740.9740.2410.9760.2210.9770.1960.9790.1770.981
D[13]0.3930.9650.2650.9740.2310.9770.1980.9790.1890.9800.1710.981
D[14]0.3140.9710.1750.9810.1710.9810.1550.9820.1410.9830.1070.986
D[15]0.3600.9670.1770.9810.1720.9810.1560.9820.1420.9830.1080.986
D[16]0.3090.9710.1730.9810.1690.9810.1550.9820.1380.9830.1050.986
D[21]0.3090.9710.1730.9810.1690.9810.1410.9830.1080.9860.1040.986
D[22]0.2930.9720.1730.9810.1690.9810.1360.9840.1070.9860.1020.986
D[23]0.2460.9760.1720.9810.1680.9810.1350.9840.1050.9860.1010.986
D[24]0.1960.9790.1220.9840.1180.9850.1140.9850.1010.9860.1000.986
D[25]0.2360.9760.1220.9840.1180.9850.1150.9850.1030.9860.1000.986
D[26]0.1870.9800.1220.9840.1170.9850.1120.9850.0990.9860.0980.986
D[31]0.1660.9810.1220.9850.1170.9850.1110.9850.0970.9860.0970.986
D[32]0.1690.9810.1220.9840.1170.9850.1110.9850.0980.9860.0970.986
D[33]0.1630.9820.1220.9850.1170.9850.1100.9850.0970.9860.0950.986
D[34]0.1400.9830.1120.9850.1110.9850.1080.9860.0940.9860.0920.987
D[35]0.1610.9820.1120.9850.1120.9850.1080.9850.0950.9860.0930.987
D[36]0.1320.9840.1110.9850.1110.9850.0940.9860.0940.9870.0870.987
Table A9. The AIL (1st Col.) and CP (2nd Col.) results of R ( x ) .
Table A9. The AIL (1st Col.) and CP (2nd Col.) results of R ( x ) .
DesignACI[Norm]ACI[Log-Norm]BCIHPD
Prior → ABAB
Set-1
( ȷ 1 , ȷ 2 ) = ( 0.2 , 0.5 )
D[11]0.2510.9490.2350.9530.1480.9710.1400.9720.1370.9730.1230.976
D[12]0.2970.9400.2790.9440.2060.9590.1770.9650.1750.9650.1520.970
D[13]0.2740.9450.2470.9500.1680.9660.1480.9700.1420.9720.1310.974
D[14]0.2370.9520.1980.9600.1350.9730.1320.9740.1160.9770.1140.977
D[15]0.2400.9520.2010.9600.1350.9730.1330.9740.1180.9770.1160.977
D[16]0.2460.9500.2300.9540.1380.9730.1340.9730.1210.9760.1210.976
D[21]0.2000.9600.1820.9640.1150.9770.1100.9780.0970.9810.0900.982
D[22]0.2360.9520.1880.9620.1160.9770.1130.9780.1060.9790.0970.981
D[23]0.2150.9570.1840.9630.1160.9770.1130.9780.1020.9800.0910.982
D[24]0.1840.9630.1530.9700.1100.9780.0910.9820.0900.9830.0790.985
D[25]0.1840.9630.1580.9690.1110.9780.0960.9810.0900.9820.0810.984
D[26]0.1880.9620.1760.9650.1130.9780.0960.9810.0900.9820.0810.984
D[31]0.1540.9690.1450.9710.0900.9830.0880.9830.0800.9850.0710.986
D[32]0.1770.9650.1460.9710.0900.9820.0900.9830.0820.9840.0780.985
D[33]0.1580.9690.1460.9710.0900.9820.0890.9830.0800.9840.0780.985
D[34]0.1450.9710.1290.9750.0870.9830.0720.9860.0280.9950.0140.998
D[35]0.1450.9710.1290.9740.0880.9830.0770.9850.0280.9950.0150.998
D[36]0.1460.9710.1410.9720.0890.9830.0790.9850.0280.9950.0150.998
( ȷ 1 , ȷ 2 ) = ( 0.5 , 0.8 )
D[11]0.2490.9500.2340.9530.1430.9720.1370.9730.1340.9730.1220.976
D[12]0.2810.9430.2770.9440.1990.9600.1760.9650.1710.9660.1510.970
D[13]0.2720.9450.2460.9500.1490.9700.1450.9710.1370.9730.1260.975
D[14]0.2360.9520.1970.9600.1350.9730.1280.9750.1160.9770.1140.978
D[15]0.2390.9520.2010.9600.1350.9730.1320.9740.1160.9770.1150.977
D[16]0.2450.9510.2290.9540.1380.9730.1330.9740.1210.9760.1210.976
D[21]0.1990.9600.1810.9640.1130.9780.1100.9780.0960.9810.0900.982
D[22]0.2350.9530.1880.9620.1150.9770.1120.9780.1060.9790.0970.981
D[23]0.2130.9570.1830.9630.1150.9770.1120.9780.1010.9800.0910.982
D[24]0.1830.9630.1530.9700.1070.9790.0910.9820.0890.9830.0790.985
D[25]0.1840.9630.1580.9690.1080.9790.0950.9810.0900.9830.0800.984
D[26]0.1880.9620.1750.9650.1120.9780.0960.9810.0900.9820.0800.984
D[31]0.1540.9690.1450.9710.0890.9830.0880.9830.0790.9850.0710.986
D[32]0.1770.9650.1450.9710.0900.9820.0890.9830.0820.9840.0780.985
D[33]0.1580.9690.1450.9710.0900.9830.0890.9830.0800.9850.0780.985
D[34]0.1450.9710.1280.9750.0870.9830.0720.9860.0260.9960.0140.998
D[35]0.1450.9710.1290.9740.0880.9830.0770.9850.0260.9960.0150.998
D[36]0.1460.9710.1410.9720.0890.9830.0790.9850.0270.9950.0150.998
Set-2
( ȷ 1 , ȷ 2 ) = ( 1.0 , 1.5 )
D[11]0.1360.9510.1360.9510.0350.9900.0340.9900.0220.9950.0210.995
D[12]0.1490.9460.1480.9460.0370.9890.0360.9900.0230.9950.0210.995
D[13]0.1440.9480.1410.9490.0360.9900.0350.9900.0230.9950.0210.995
D[14]0.1300.9530.1290.9540.0280.9930.0260.9930.0200.9960.0200.996
D[15]0.1300.9530.1290.9540.0280.9930.0260.9930.0200.9960.0200.996
D[16]0.1340.9520.1340.9520.0290.9930.0270.9930.0200.9960.0200.996
D[21]0.1100.9610.1090.9610.0190.9960.0190.9960.0190.9960.0190.996
D[22]0.1230.9560.1220.9560.0200.9960.0190.9960.0190.9960.0190.996
D[23]0.1120.9600.1120.9600.0190.9960.0190.9960.0190.9960.0190.996
D[24]0.1060.9630.1050.9630.0190.9960.0180.9960.0180.9960.0180.997
D[25]0.1060.9630.1060.9630.0190.9960.0190.9960.0180.9960.0180.997
D[26]0.1090.9610.1090.9610.0190.9960.0190.9960.0180.9960.0180.997
D[31]0.0880.9690.0880.9700.0180.9970.0170.9970.0170.9970.0160.997
D[32]0.0950.9670.0940.9670.0180.9970.0180.9970.0170.9970.0160.997
D[33]0.0940.9670.0940.9670.0180.9970.0180.9970.0170.9970.0160.997
D[34]0.0860.9700.0860.9700.0170.9970.0160.9970.0150.9980.0140.998
D[35]0.0870.9700.0860.9700.0170.9970.0160.9970.0150.9980.0140.998
D[36]0.0880.9700.0880.9700.0170.9970.0160.9970.0150.9980.0150.998
( ȷ 1 , ȷ 2 ) = ( 1.5 , 2.5 )
D[11]0.1360.9510.1360.9510.0350.9900.0340.9900.0220.9950.0210.995
D[12]0.1490.9460.1480.9460.0370.9890.0360.9900.0220.9950.0210.995
D[13]0.1440.9480.1410.9490.0360.9900.0350.9900.0220.9950.0210.995
D[14]0.1300.9530.1280.9540.0280.9930.0260.9930.0200.9960.0200.996
D[15]0.1300.9530.1290.9540.0280.9930.0260.9930.0200.9960.0200.996
D[16]0.1340.9520.1340.9520.0280.9930.0270.9930.0200.9960.0200.996
D[21]0.1100.9610.1090.9610.0190.9960.0190.9960.0190.9960.0190.996
D[22]0.1230.9560.1220.9570.0200.9960.0190.9960.0190.9960.0190.996
D[23]0.1120.9600.1110.9610.0190.9960.0190.9960.0190.9960.0190.996
D[24]0.1060.9630.1050.9630.0190.9960.0180.9960.0180.9960.0180.997
D[25]0.1060.9630.1060.9630.0190.9960.0190.9960.0180.9960.0180.997
D[26]0.1090.9610.1090.9610.0190.9960.0190.9960.0180.9960.0180.997
D[31]0.0880.9690.0880.9700.0180.9970.0170.9970.0170.9970.0160.997
D[32]0.0950.9670.0940.9670.0180.9970.0180.9970.0170.9970.0160.997
D[33]0.0940.9670.0940.9670.0180.9970.0180.9970.0170.9970.0160.997
D[34]0.0860.9700.0860.9700.0170.9970.0160.9970.0150.9980.0140.998
D[35]0.0870.9700.0860.9700.0170.9970.0160.9970.0150.9980.0140.998
D[36]0.0880.9700.0880.9700.0170.9970.0160.9970.0150.9980.0150.998
Table A10. The AIL (1st Col.) and CP (2nd Col.) results of h ( x ) .
Table A10. The AIL (1st Col.) and CP (2nd Col.) results of h ( x ) .
DesignACI[Norm]ACI[Log-Norm]BCIHPD
Prior → ABAB
Set-1
( ȷ 1 , ȷ 2 ) = ( 0.2 , 0.5 )
D[11]2.1450.9201.9600.9261.3360.9441.1750.9491.0930.9510.9630.955
D[12]2.4150.9122.2160.9181.8600.9291.6270.9351.5020.9391.3240.944
D[13]2.2320.9172.1330.9201.5410.9381.2870.9461.1990.9481.0460.953
D[14]1.9680.9251.5520.9380.7230.9620.6820.9640.6310.9650.6250.965
D[15]2.0240.9241.6150.9360.7300.9620.7030.9630.6350.9650.6300.965
D[16]2.0400.9231.7940.9300.7600.9610.7500.9620.6500.9650.6410.965
D[21]1.4180.9421.3250.9440.6460.9650.5390.9680.5340.9680.5130.969
D[22]1.6560.9351.5280.9380.6900.9630.5800.9670.5550.9670.5400.968
D[23]1.5850.9371.5000.9390.6540.9640.5490.9680.5440.9680.5240.968
D[24]1.1900.9481.1250.9500.5390.9680.5160.9690.4990.9690.4900.969
D[25]1.3030.9451.2440.9470.5490.9680.5180.9680.5090.9690.5010.969
D[26]1.3530.9441.2960.9450.5550.9670.5290.9680.5150.9690.5100.969
D[31]1.0530.9530.8960.9570.5100.9690.5050.9690.4850.9690.4730.970
D[32]1.1420.9501.0970.9510.5250.9680.5130.9690.4960.9690.4850.969
D[33]1.1010.9511.0070.9540.5130.9690.5050.9690.4920.9690.4790.970
D[34]0.7790.9610.7540.9610.4960.9690.4880.9690.4000.9720.1700.979
D[35]0.8530.9580.7650.9610.4980.9690.4910.9690.4050.9720.1870.978
D[36]0.9180.9570.8270.9590.5040.9690.4940.9690.4080.9720.1880.978
( ȷ 1 , ȷ 2 ) = ( 0.5 , 0.8 )
D[11]2.0660.9221.8190.9301.2760.9461.1510.9501.0460.9530.9450.956
D[12]2.3780.9132.1930.9191.7130.9331.5040.9391.3790.9431.2080.948
D[13]2.1660.9191.8730.9281.3360.9441.2630.9461.0940.9510.9830.955
D[14]1.7710.9311.5190.9390.7220.9620.6790.9640.6310.9650.6250.965
D[15]1.8380.9291.5890.9370.7240.9620.6880.9630.6350.9650.6300.965
D[16]1.8460.9291.7110.9330.7550.9610.7410.9620.6500.9650.6410.965
D[21]1.3490.9441.2690.9460.6430.9650.5340.9680.5330.9680.5120.969
D[22]1.6140.9361.5150.9390.6890.9630.5780.9670.5500.9680.5390.968
D[23]1.5830.9371.4990.9390.6500.9650.5470.9680.5430.9680.5200.968
D[24]1.1720.9491.1130.9510.5330.9680.5130.9690.4920.9690.4840.969
D[25]1.2690.9461.2220.9480.5440.9680.5150.9690.5080.9690.4910.969
D[26]1.3180.9451.2660.9460.5500.9680.5280.9680.5110.9690.5040.969
D[31]0.9180.9570.8960.9570.5090.9690.4950.9690.4780.9700.4720.970
D[32]1.1090.9511.0440.9530.5170.9690.5130.9690.4870.9690.4830.970
D[33]1.0210.9540.9690.9550.5090.9690.4950.9690.4800.9700.4780.970
D[34]0.7660.9610.7420.9620.4880.9690.4790.9700.3640.9730.1640.979
D[35]0.8310.9590.7530.9610.4910.9690.4890.9690.3680.9730.1790.979
D[36]0.8370.9590.8120.9600.4950.9690.4920.9690.3700.9730.1800.979
Set-2
( ȷ 1 , ȷ 2 ) = ( 1.0 , 1.5 )
D[11]2.1300.9191.5950.9360.4000.9740.3640.9750.2400.9790.2360.980
D[12]2.2250.9161.9420.9250.4130.9740.3750.9750.2450.9790.2400.979
D[13]2.1400.9191.7310.9320.4050.9740.3680.9750.2430.9790.2390.979
D[14]1.7530.9311.5010.9390.3470.9760.3400.9760.2340.9800.2310.980
D[15]1.8930.9271.5510.9380.3600.9760.3520.9760.2380.9790.2340.980
D[16]2.0850.9201.5930.9360.3700.9750.3610.9760.2390.9790.2360.980
D[21]1.3540.9441.2610.9470.2260.9800.2220.9800.2170.9800.2170.980
D[22]1.6490.9341.4470.9410.2310.9800.2290.9800.2190.9800.2190.980
D[23]1.3890.9431.2880.9460.2290.9800.2270.9800.2190.9800.2180.980
D[24]1.2470.9471.1680.9500.2190.9800.2160.9800.2130.9800.2120.980
D[25]1.2500.9471.1800.9490.2200.9800.2170.9800.2160.9800.2140.980
D[26]1.2930.9461.2020.9490.2200.9800.2170.9800.2170.9800.2160.980
D[31]1.0020.9550.9630.9560.2150.9800.2120.9800.1830.9810.1800.981
D[32]1.2330.9481.1550.9500.2180.9800.2150.9800.1860.9810.1830.981
D[33]1.0330.9540.9870.9560.2180.9800.2150.9800.1830.9810.1800.981
D[34]0.9050.9580.8730.9590.1780.9810.1750.9810.1710.9820.1660.982
D[35]0.9140.9580.8820.9590.1870.9810.1790.9810.1760.9810.1730.982
D[36]0.9840.9560.9440.9570.1880.9810.1800.9810.1800.9810.1730.982
( j 1 , j 2 ) = ( 1.5 , 2.5 )
D[11]1.8460.9281.5890.9360.3980.9740.3610.9760.2390.9790.2360.980
D[12]2.1490.9181.8730.9270.4080.9740.3700.9750.2410.9790.2370.979
D[13]2.0290.9221.7080.9320.3980.9740.3620.9750.2400.9790.2360.980
D[14]1.6800.9331.4620.9400.3470.9760.3400.9760.2320.9800.2290.980
D[15]1.6910.9331.5190.9390.3550.9760.3480.9760.2350.9800.2320.980
D[16]1.7710.9301.5250.9380.3690.9750.3600.9760.2360.9790.2340.980
D[21]1.3210.9451.2300.9480.2240.9800.2210.9800.2170.9800.2170.980
D[22]1.6460.9341.4440.9410.2290.9800.2280.9800.2190.9800.2190.980
D[23]1.3300.9451.2390.9470.2280.9800.2250.9800.2190.9800.2180.980
D[24]1.2050.9491.1320.9510.2190.9800.2160.9800.2130.9800.2120.980
D[25]1.2220.9481.1450.9500.2190.9800.2160.9800.2160.9800.2140.980
D[26]1.2930.9461.2020.9490.2200.9800.2170.9800.2170.9800.2160.980
D[31]0.9840.9560.9440.9570.2150.9800.2120.9800.1800.9810.1760.981
D[32]1.1800.9491.1200.9510.2180.9800.2150.9800.1860.9810.1820.981
D[33]0.9880.9550.9470.9570.2180.9800.2150.9800.1830.9810.1800.981
D[34]0.8850.9590.8550.9600.1780.9810.1750.9810.1700.9820.1580.982
D[35]0.9030.9580.8710.9590.1800.9810.1780.9810.1750.9810.1660.982
D[36]0.9760.9560.9390.9570.1830.9810.1800.9810.1760.9810.1660.982

References

  1. Sapkota, L.P.; Bam, N.; Kumar, V. A new exponential family of distributions with applications to engineering and medical data. Sci. Rep. 2025, 15, 33649. [Google Scholar] [CrossRef] [PubMed]
  2. Górny, J.; Cramer, E. Modularization of hybrid censoring schemes and its application to unified progressive hybrid censoring. Metrika 2018, 81, 173–210. [Google Scholar]
  3. Lone, S.A.; Panahi, H.; Anwar, S.; Shahab, S. Estimations and optimal censoring schemes for the unified progressive hybrid gamma-mixed Rayleigh distribution. Electron. Res. Arch. 2023, 31, 4729–4752. [Google Scholar] [CrossRef]
  4. Anwar, S.; Lone, S.A.; Khan, A.; Almutlak, S. Stress-strength reliability estimation for the inverted exponentiated Rayleigh distribution under unified progressive hybrid censoring with application. Electron. Res. Arch. 2023, 31, 4011–4033. [Google Scholar] [CrossRef]
  5. Bayoud, H.A.; Almathkour, F.B.; Raqab, M.Z. Advanced inference techniques for two-parameter Topp-Leone models under unified progressively hybrid censoring. Commun.-Stat.-Simul. Comput. 2024, 55, 1384–1407. [Google Scholar]
  6. Dutta, S.; Kayal, S. Estimation and prediction for Burr type III distribution based on unified progressive hybrid censoring scheme. J. Appl. Stat. 2024, 51, 1–33. [Google Scholar]
  7. Mohammed, H.S.; Abo-Kasem, O.E.; Elshahhat, A. Optimum Progressive Data Analysis and Bayesian Inference for Unified Progressive Hybrid INH Censoring with Applications to Diamonds and Gold. Axioms 2025, 14, 559. [Google Scholar] [CrossRef]
  8. Prakash, A.; Maurya, A.; Maurya, R.K. Statistical and Machine Learning Approach for Progressive Stress Accelerated Life Testing Under Unified Progressive Hybrid Censoring. Qual. Reliab. Eng. Int. 2025, 41, 2463–2480. [Google Scholar] [CrossRef]
  9. Henningsen, A.; Toomet, O. maxLik: A package for maximum likelihood estimation in R. Comput. Stat. 2011, 26, 443–458. [Google Scholar]
  10. Lawless, J.F. Statistical Models and Methods for Lifetime Data, 2nd ed.; John Wiley and Sons: Hoboken, NJ, USA, 2003. [Google Scholar]
  11. Greene, W.H. Econometric Analysis, 7th ed.; Pearson Prentice-Hall: Upper Saddle River, NJ, USA, 2012. [Google Scholar]
  12. Meeker, W.Q.; Escobar, L.A. Statistical Methods for Reliability Data; John Wiley and Sons: New York, NY, USA, 1998. [Google Scholar]
  13. Kundu, D. Bayesian inference and life testing plan for the Weibull distribution in presence of progressive censoring. Technometrics 2008, 50, 144–154. [Google Scholar] [CrossRef]
  14. Plummer, M.; Best, N.; Cowles, K.; Vines, K. CODA: Convergence diagnosis and output analysis for MCMC. R News 2006, 6, 7–11. [Google Scholar]
  15. Valavanidis, A.; Fiotakis, K.; Vlachogianni, T. Airborne particulate matter and human health: Toxicological assessment and importance of size and composition of particles for oxidative damage and carcinogenic mechanisms. J. Environ. Sci. Health Part C 2008, 26, 339–362. [Google Scholar] [CrossRef] [PubMed]
  16. Kumagai, S.; Matsunaga, I. Physiologically based pharmacokinetic model for acetone. Occup. Environ. Med. 1995, 52, 344–352. [Google Scholar] [CrossRef]
  17. Peter, P.O.; Oluyede, B.; Bindele, H.F.; Ndwapi, N.; Mabikwa, O. The gamma odd Burr III-G family of distributions: Model, properties and applications. Rev. Colomb. Estadística 2021, 44, 331–368. [Google Scholar]
  18. Cowdrey, K.W.; de Lange, J.; Malekian, R.; Wanneburg, J.; Jose, A.C. Applying queueing theory for the optimization of a banking model. J. Internet Technol. 2018, 19, 381–389. [Google Scholar]
  19. Ghitany, M.E.; Atieh, B.; Nadarajah, S. Lindley distribution and its application. Math. Comput. Simul. 2008, 78, 493–506. [Google Scholar] [CrossRef]
  20. Alsubie, A. Properties and applications of the modified Kies–Lomax distribution with estimation methods. J. Math. 2021, 2021, 1944864. [Google Scholar] [CrossRef]
  21. Marinho, P.R.D.; Silva, R.B.; Bourguignon, M.; Cordeiro, G.M.; Nadarajah, S. AdequacyModel: An R package for probability distributions and general purpose optimization. PLoS ONE 2019, 14, e0221487. [Google Scholar] [CrossRef]
  22. Bagdonavicius, V.; Nikulin, M. Accelerated Life Models: Modeling and Statistical Analysis; Chapman and Hall/CRC: Boca Raton, FL, USA, 2001. [Google Scholar]
  23. Peng, X.; Yan, Z. Estimation and application for a new extended Weibull distribution. Reliab. Eng. Syst. Saf. 2014, 121, 34–42. [Google Scholar] [CrossRef]
  24. Mahdavi, A.; Kundu, D. A new method for generating distributions with an application to exponential distribution. Commun.-Stat.-Theory Methods 2017, 46, 6543–6557. [Google Scholar] [CrossRef]
  25. Pinho, L.G.B.; Cordeiro, G.M.; Nobre, J.S. The Harris extended exponential distribution. Commun.-Stat.-Theory Methods 2015, 44, 3486–3502. [Google Scholar] [CrossRef]
  26. Alotaibi, R.; Nassar, M.; Elshahhat, A. A new extended Pham distribution for modelling cancer data. J. Radiat. Res. Appl. Sci. 2024, 17, 100961. [Google Scholar] [CrossRef]
  27. Mudholkar, G.S.; Srivastava, D.K. Exponentiated Weibull family for analyzing bathtub failure-rate data. IEEE Trans. Reliab. 1993, 42, 299–302. [Google Scholar] [CrossRef]
  28. Oguntunde, P.E.; Balogun, O.S.; Okagbue, H.I.; Bishop, S.A. The Weibull-exponential distribution: Its properties and applications. J. Appl. Sci. 2015, 15, 1305–1311. [Google Scholar] [CrossRef]
  29. Nadarajah, S.; Haghighi, F. An extension of the exponential distribution. Statistics 2011, 45, 543–558. [Google Scholar] [CrossRef]
  30. Gupta, R.D.; Kundu, D. Generalized exponential distribution: Different method of estimations. J. Stat. Comput. Simul. 2001, 69, 315–337. [Google Scholar] [CrossRef]
  31. Birnbaum, Z.W.; Saunders, S.C. A probabilistic interpretation of Miner’s rule. Siam J. Appl. Math. 1968, 16, 637–652. [Google Scholar] [CrossRef]
  32. Weibull, W. A statistical distribution function of wide applicability. J. Appl. Mech. 1951, 18, 293–297. [Google Scholar] [CrossRef]
  33. Johnson, N.; Kotz, S.; Balakrishnan, N. Continuous Univariate Distributions, 2nd ed.; John Wiley & Sons: New York, NY, USA, 1994. [Google Scholar]
  34. Ng, H.K.T.; Chan, C.S.; Balakrishnan, N. Optimal progressive censoring plans for the Weibull distribution. Technometrics 2004, 46, 470–481. [Google Scholar] [CrossRef]
  35. Pradhan, B.; Kundu, D. On progressively censored generalized exponential distribution. Test 2009, 18, 497–515. [Google Scholar] [CrossRef]
  36. Sen, A.; Kannan, N.; Kundu, D. Bayesian planning and inference of a progressively censored sample from linear hazard rate distribution. Comput. Stat. Data Anal. 2013, 62, 108–121. [Google Scholar] [CrossRef]
  37. Sen, T.; Bhattacharya, R.; Tripathi, Y.M.; Pradhan, B. Inference and optimum life testing plans based on Type-II progressive hybrid censored generalized exponential data. Commun.-Stat.-Simul. Comput. 2020, 49, 3254–3282. [Google Scholar] [CrossRef]
  38. Lin, C.T.; Chen, Y.C.; Yeh, T.C.; Ng, H.K.T. Statistical inference and optimum life-testing plans with joint progressively type-II censoring scheme. Qual. Technol. Quant. Manag. 2023, 20, 279–306. [Google Scholar] [CrossRef]
  39. Nassar, M.; Elshahhat, A. Estimation procedures and optimal censoring schemes for an improved adaptive progressively type-II censored Weibull distribution. J. Appl. Stat. 2024, 51, 1664–1688. [Google Scholar] [CrossRef]
Figure 1. Several shapes of the NOT-Exp model.
Figure 1. Several shapes of the NOT-Exp model.
Mathematics 14 01182 g001
Figure 2. Contours of α , γ , and θ from two simulated UT2-PH censored samples.
Figure 2. Contours of α , γ , and θ from two simulated UT2-PH censored samples.
Mathematics 14 01182 g002
Figure 3. Posterior shapes of the NOT-Exp parameters.
Figure 3. Posterior shapes of the NOT-Exp parameters.
Mathematics 14 01182 g003
Figure 4. The PDF and HRF shapes of the NOT-Exp population from Set-i ( i = 1 , 2 ).
Figure 4. The PDF and HRF shapes of the NOT-Exp population from Set-i ( i = 1 , 2 ).
Mathematics 14 01182 g004
Figure 5. Sensitivity maps of α (top), γ (moderate), and θ (bottom) from four different priors.
Figure 5. Sensitivity maps of α (top), γ (moderate), and θ (bottom) from four different priors.
Mathematics 14 01182 g005
Figure 6. The TTT (top) and VB (bottom) diagnostics for the NOT-Exp model from App.i (for i = 1 , 2 ).
Figure 6. The TTT (top) and VB (bottom) diagnostics for the NOT-Exp model from App.i (for i = 1 , 2 ).
Mathematics 14 01182 g006
Figure 7. Fitting diagrams for the NOT-Exp and its competitors from App.1 (top) and App.2 (bottom).
Figure 7. Fitting diagrams for the NOT-Exp and its competitors from App.1 (top) and App.2 (bottom).
Mathematics 14 01182 g007
Figure 8. 3D log-likelihood contours for α , γ , and θ from App.i (for i = 1 , 2 ).
Figure 8. 3D log-likelihood contours for α , γ , and θ from App.i (for i = 1 , 2 ).
Mathematics 14 01182 g008
Figure 9. 3D log-likelihood contours for α , γ , and θ from S [ i 1 ] (for i = 1 , 2 ).
Figure 9. 3D log-likelihood contours for α , γ , and θ from S [ i 1 ] (for i = 1 , 2 ).
Mathematics 14 01182 g009
Figure 10. Gaussian density and trace diagnostics of α , γ , θ , R ( x ) , and h ( x ) from S [ i 1 ] (for i = 1 , 2 ).
Figure 10. Gaussian density and trace diagnostics of α , γ , θ , R ( x ) , and h ( x ) from S [ i 1 ] (for i = 1 , 2 ).
Mathematics 14 01182 g010
Figure 11. Plots for four 95% interval bounds of R ( x ) and h ( x ) from App.1 (a) and App.2 (b).
Figure 11. Plots for four 95% interval bounds of R ( x ) and h ( x ) from App.1 (a) and App.2 (b).
Mathematics 14 01182 g011
Table 1. Removal designs in Monte Carlo experiments.
Table 1. Removal designs in Monte Carlo experiments.
Design ( q 1 , q 2 , n ) Design ( q 1 , q 2 , n )
( 5 , 10 , 30 ) ( 15 , 20 , 30 )
D[11] 5 [ 4 ] , 0 [ 6 ] D[14] 5 [ 2 ] , 0 [ 18 ]
D[12] 0 [ 3 ] , 5 [ 4 ] , 0 [ 3 ] D[15] 0 [ 9 ] , 5 [ 2 ] , 0 [ 9 ]
D[13] 0 [ 6 ] , 5 [ 4 ] D[16] 0 [ 18 ] , 5 [ 2 ]
( 10 , 20 , 50 ) ( 20 , 40 , 50 )
D[21] 5 [ 6 ] , 0 [ 14 ] D[24] 5 [ 2 ] , 0 [ 38 ]
D[22] 0 [ 7 ] , 5 [ 6 ] , 0 [ 7 ] D[25] 0 [ 19 ] , 5 [ 2 ] , 0 [ 19 ]
D[23] 0 [ 14 ] , 5 [ 6 ] D[26] 0 [ 38 ] , 5 [ 2 ]
( 30 , 50 , 80 ) ( 40 , 60 , 80 )
D[31] 5 [ 10 ] , 0 [ 20 ] D[34] 5 [ 4 ] , 0 [ 56 ]
D[32] 0 [ 10 ] , 5 [ 10 ] , 0 [ 10 ] D[35] 0 [ 28 ] , 5 [ 4 ] , 0 [ 28 ]
D[33] 0 [ 20 ] , 5 [ 10 ] D[36] 0 [ 56 ] , 5 [ 4 ]
Table 3. Summary for the datasets in App.i (for i = 1 , 2 ).
Table 3. Summary for the datasets in App.i (for i = 1 , 2 ).
App.MeanMode Q 1 Q 2 Q 3 St.DSkew.
119.013.803.809.3015.9528.552.65
29.887.104.688.1013.037.2371.47
Table 6. Different UT2-PH censored datasets from App.i (for i = 1 , 2 ).
Table 6. Different UT2-PH censored datasets from App.i (for i = 1 , 2 ).
SampleS ȷ 1 ( d 1 ) ȷ 2 ( d 2 ) S T Data
App.1
S [ 11 ] ( 2 [ 6 ] , 0 [ 13 ] )43(19)45(19)051.91.5, 2.1, 2.2, 2.5, 2.6, 3.8, 3.8, 4.3, 6, 7, 9.3, 10.2, 10.6, 12.3, 14.1, 17.8, 27.6, 42, 51.9
S [ 12 ] ( 0 [ 6 ] , 2 [ 6 ] , 0 [ 7 ] )46(15)50(15)4461.5, 1.7, 2.1, 2.2, 2.4, 2.5, 2.6, 3.8, 6, 7.5, 10.6, 12.3, 14.1, 31, 45.6
S [ 13 ] ( 2 [ 3 ] , 0 [ 13 ] , 2 [ 3 ] )32(10)35(10)15321.5, 2.6, 3.8, 4.2, 5.6, 7.5, 9.3, 12.9, 17.8, 31
S [ 14 ] ( 0 [ 13 ] , 2 [ 6 ] )3(7)5(8)2351.5, 1.7, 2.1, 2.2, 2.4, 2.5, 2.6, 3.8
App.2
S [ 21 ] ( 5 [ 12 ] , 0 [ 28 ] )28(40)30(40)0270.8, 1.3, 1.9, 2.9, 3.2, 3.3, 4, 4.1, 4.2, 4.7, 4.9, 5, 5.5, 5.7, 6.2, 6.9, 7.1, 7.4, 7.6, 7.7,
8, 8.6, 8.8, 8.9, 9.5 10.7 11.1 11.5 12.4, 12.5, 13.3, 14.1, 15.4, 18.1, 18.4, 18.9, 19.9, 21.4, 23, 27
S [ 22 ] ( 0 [ 14 ] , 5 [ 12 ] , 0 [ 14 ] )25(30)27(30)10250.8, 0.8, 1.3, 1.5, 1.8, 1.9, 1.9, 2.1, 2.6, 2.7, 2.9, 3.1, 3.2, 3.3, 3.5, 4.1, 4.4, 4.6, 4.9, 5.5,
6.2, 8.6, 9.5, 12.4, 12.5, 13.7, 17.3, 18.2, 20.6, 23
S [ 23 ] ( 5 [ 6 ] , 0 [ 28 ] , 5 [ 6 ] )8(11)22(20)5021.40.8, 1.5, 2.7, 3.2, 4.2, 4.3, 4.7, 5.3, 6.1, 6.3, 7.6, 8.9, 9.7, 11, 12.4, 12.9, 13.3, 15.4, 19.9, 21.4
S [ 24 ] ( 0 [ 28 ] , 5 [ 12 ] )2(7)4(15)8540.8, 0.8, 1.3, 1.5, 1.8, 1.9, 1.9, 2.1, 2.6, 2.7, 2.9, 3.1, 3.2, 3.3, 3.5
Table 7. Estimates of α , γ , θ , R ( x ) , and h ( x ) from App.1 (1st Row) and App.2 (2nd Row).
Table 7. Estimates of α , γ , θ , R ( x ) , and h ( x ) from App.1 (1st Row) and App.2 (2nd Row).
SamplePar.MLEMCMCACI[Norm]BCIACI[Log-Norm]HPD
Est.St.EEst.St.ELow.Upp.IWLow.Upp.IWLow.Upp.IWLow.Upp.IW
S [ 11 ] α 0.00160.00130.00160.00020.00100.00420.00520.00110.00230.00120.00030.00800.00770.00110.00220.0012
S [ 21 ] 325.275.9316325.270.0058313.64336.8923.252325.25325.290.0394313.85337.1023.257325.25325.290.0392
γ 164.838.6903164.830.0006147.80181.8634.065164.83164.830.0040148.65182.7734.126164.83164.830.0040
3.13790.64183.13790.00581.87994.39582.51593.11823.15790.03972.10154.68542.58383.11823.15790.0397
θ 0.04340.03190.04340.00060.00910.10580.12500.04140.04530.00390.01030.18320.17290.04130.04520.0039
0.17110.02720.17070.00490.11770.22450.10680.15430.18730.03300.12520.23370.10850.15430.18730.0330
R ( x ) 0.94100.03230.94120.01760.87760.99440.12670.86740.98360.11630.87971.00650.12680.88110.98920.1081
0.94260.02000.94270.00390.90340.98190.07850.92880.95530.99790.90420.98270.07850.99180.97710.9342
h ( x ) 0.70010.03590.08860.01870.62980.77050.14070.03530.16020.12500.63320.77410.14090.03100.15290.1219
0.04870.01160.91730.00130.02590.07150.04560.86500.85790.85060.03050.07770.04730.81280.79710.7891
S [ 12 ] α 0.00060.00020.00060.00000.00030.00090.00060.00050.00080.00030.00040.00100.00070.00050.00080.0003
S [ 21 ] 52.0618.390052.0610.005835.61768.50532.88852.04252.0810.039237.96171.39933.43852.04152.0800.0391
γ 266.570.0002266.570.0006266.57266.570.0010266.57266.570.0039266.57266.570.0010266.57266.570.0039
1.36210.27931.36190.00580.81471.90951.09471.34261.38160.03900.91142.03581.12441.34261.38150.0390
θ 0.04400.00020.04400.00010.04350.04440.00090.04380.04420.00040.04350.04440.00090.04380.04420.0004
0.06670.01840.06640.00410.03070.10270.07200.05280.08050.02770.03890.11450.07560.05260.08020.0276
R ( x ) 0.83930.07440.83110.02390.69350.98520.29170.73840.89910.16070.70540.99860.29320.74900.90610.1571
0.90020.02630.90060.00750.84870.95170.10300.87450.92520.05070.85010.95320.10310.87380.92450.0507
h ( x ) 0.18220.05460.18650.01680.07530.28910.21380.13380.24750.11360.10130.32760.22630.13220.24530.1131
0.04530.00860.04510.00350.02840.06220.03380.03370.05730.02360.03120.06580.03460.03390.05750.0235
S [ 13 ] α 0.00550.00980.00550.00010.00380.02480.03860.00530.00570.00040.00020.18300.18280.00530.00570.0004
S [ 23 ] 160.168.4237160.160.0058143.65176.6733.020160.14160.170.0393144.47177.5533.079160.14160.180.0392
γ 37.84715.71837.8470.00067.039968.65561.61537.84537.8490.003916.77085.41768.64837.84537.8490.0039
2.75510.76832.75500.00571.24934.26103.01162.73582.77470.03901.59514.75893.16382.73562.77460.0389
θ 0.03210.05080.03210.00010.00670.13160.19900.03190.03230.00040.00150.71060.70910.03190.03230.0004
0.17880.04100.17840.00540.09830.25920.16080.16030.19680.03660.11400.28030.16630.15970.19620.0365
R ( x ) 0.95030.03990.95010.00150.87210.99850.15640.94470.95510.01040.87521.03180.15660.94480.95520.0104
0.91040.03640.91050.00560.83910.98170.14270.89090.92900.03810.84180.98460.14280.89150.92960.0381
h ( x ) 0.07800.04500.07810.00170.00100.16620.17640.07230.08420.01190.02510.24170.21660.07230.08410.0119
0.06810.01960.06800.00410.02970.10660.07690.05460.08230.02770.03870.11980.08100.05420.08180.0276
S [ 14 ] α 0.05670.06170.05670.00010.00030.17780.24210.05660.05690.00040.00670.47880.47210.05660.05690.0004
S [ 24 ] 206.9011.864206.900.0058183.65230.1546.506206.88206.920.0391184.91231.5146.604206.88206.920.0391
γ 233.4624.902233.460.0006184.65282.2697.614233.46233.460.0039189.41287.7498.327233.46233.460.0039
6.80153.31756.80130.00570.299313.30413.0046.78216.82110.03912.614717.69215.0786.78186.82080.0390
θ 1.17530.43811.17530.00010.31672.03391.71721.17511.17550.00040.56612.44021.87411.17511.17550.0004
1.13490.26091.13490.00580.62351.64631.02281.11531.15450.03920.72321.78101.05781.11551.15460.0391
R ( x ) 0.73210.11770.73210.00030.50150.96270.46130.73090.73330.00230.53431.00320.46900.73090.73320.0023
0.20440.08400.20450.00320.03970.36910.32930.19380.21560.02180.09130.45750.36610.19350.21530.0217
h ( x ) 0.62440.24250.62440.00050.14911.09970.95060.62270.62610.00330.29161.33681.04510.62270.62610.0033
1.02740.27081.02740.00710.49671.55811.06141.00341.05140.04800.61301.72221.10921.00411.05190.0479
Table 8. Four criteria for defining the OPCP.
Table 8. Four criteria for defining the OPCP.
CriterionGoal
ψ 1 Max t r a c e ( I ( ξ ^ ) )
ψ 2 Min t r a c e ( I 1 ( ξ ^ ) )
ψ 3 Min d e t ( I 1 ( ξ ^ ) )
ψ 4 Min [ V a r ^ ( log ( Q ^ u ) ) ] , 0 < u < 1
Table 9. Fitted four O-T2-PC plans from App.i (for i = 1 , 2 ).
Table 9. Fitted four O-T2-PC plans from App.i (for i = 1 , 2 ).
Sample ψ 1 ψ 2 ψ 3 ψ 4
u 0.30.60.9
App.1
S [ 11 ] 1.03 × 1077.55 × 1017.49 × 10−96.50 × 10−12.91 × 1007.40 × 101
S [ 12 ] 3.21 × 1081.38 × 10−71.06 × 10−235.03 × 10−12.06 × 1001.27 × 101
S [ 13 ] 4.63 × 1052.47 × 1021.42 × 10−61.48 × 1008.00 × 1003.70 × 102
S [ 14 ] 2.53 × 1036.20 × 1024.79 × 10−26.78 × 10−21.31 × 10−15.73 × 10−1
App.2
S [ 21 ] 4.11 × 1037.05 × 1013.53 × 10−33.83 × 10−11.14 × 1005.33 × 100
S [ 22 ] 1.01 × 1043.56 × 1015.48 × 10−41.40 × 1008.82 × 1006.96 × 101
S [ 23 ] 1.67 × 1037.16 × 1012.49 × 10−26.58 × 10−12.01 × 1009.71 × 100
S [ 24 ] 5.26 × 1011.52 × 1022.96 × 1014.45 × 10−28.06 × 10−22.85 × 10−1
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Alotaibi, R.; Elshahhat, A. A New Exponential-Type Model Under Unified Progressive Hybrid Censoring: Computational Inference and Its Applications. Mathematics 2026, 14, 1182. https://doi.org/10.3390/math14071182

AMA Style

Alotaibi R, Elshahhat A. A New Exponential-Type Model Under Unified Progressive Hybrid Censoring: Computational Inference and Its Applications. Mathematics. 2026; 14(7):1182. https://doi.org/10.3390/math14071182

Chicago/Turabian Style

Alotaibi, Refah, and Ahmed Elshahhat. 2026. "A New Exponential-Type Model Under Unified Progressive Hybrid Censoring: Computational Inference and Its Applications" Mathematics 14, no. 7: 1182. https://doi.org/10.3390/math14071182

APA Style

Alotaibi, R., & Elshahhat, A. (2026). A New Exponential-Type Model Under Unified Progressive Hybrid Censoring: Computational Inference and Its Applications. Mathematics, 14(7), 1182. https://doi.org/10.3390/math14071182

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop