Next Article in Journal
Yoctosecond Timing Jitter Sensitivity in Tightly Synchronized Mode-Locked Ti:Sapphire Lasers
Next Article in Special Issue
Quantum Tomography of Two-Qutrit Werner States
Previous Article in Journal
Comparing the Accuracy of Four Intraocular Lens Formulas in Eyes with Two Types of Widely Used Monofocal Lens Implants
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Statistical Analysis of the Photon Loss in Fiber-Optic Communication

by
Artur Czerwinski
1,* and
Katarzyna Czerwinska
2
1
Institute of Physics, Faculty of Physics, Astronomy and Informatics, Nicolaus Copernicus University in Torun, ul. Grudziadzka 5, 87-100 Torun, Poland
2
Foundation for Responsible Education and Upbringing “Ad Veritatem”, ul. Piskorskiej 4/4, 87-100 Torun, Poland
*
Author to whom correspondence should be addressed.
Photonics 2022, 9(8), 568; https://doi.org/10.3390/photonics9080568
Submission received: 18 July 2022 / Revised: 1 August 2022 / Accepted: 11 August 2022 / Published: 12 August 2022
(This article belongs to the Special Issue Photonic State Tomography: Methods and Applications)

Abstract

:
In optical communication systems, photons are lost due to the attenuation of the transmission medium. To efficiently implement quantum information protocols, we need to be able to precisely describe such processes. In this paper, we propose statistical methods to estimate the attenuation coefficient of the fiber link. By following the Beer–Lambert law, we utilize the properties of the exponential distribution to estimate the rate parameter based on observable data. In particular, we determine the explicit forms of unbiased estimators that are suitable for censored (truncated) sets of data. Moreover, we focus on minimum-variance methods that ensure a reliable estimation of the attenuation coefficient.

1. Introduction

Optical fiber, which has emerged as the most commonly used transmission medium for long-distance communications, is a thin string of glass that guides a beam of light along its length [1]. The subfield of fibers has been developing rapidly both in terms of manufacturing and applications. Due to its flexibility and the ability to come in a bundle, optical fibers are used as a medium for telecommunication and computer networking. Through the use of wavelength-division multiplexing, each fiber can accommodate many independent communication channels, each working with a different wavelength of light [2]. However, fibers can also be used as: sensors [3,4], carriers of optical power (power-over-fiber technology) [5], light tubes [6], or components of a inspection instrument in imaging optics [7].
In quantum optics, photons are used to encode information by exploiting different degrees of freedom, including polarization, temporal, spatial, or spectral [8]. Most celebrated applications of quantum properties of light relate to quantum key distribution (QKD), which allows two parties to exchange a secret key [9]. QKD started in 1984 from a protocol that was based on polarization states of single photons [10]. Soon after, other approaches were proposed, including a protocol that employs quantum entanglement [11]. Nowadays, practical implementations of QKD protocols make the secure distribution of the secret key over optical fibers that are several hundred kilometers long [12] feasible.
Regardless of whether we operate in the quantum or classical regime, we need to take into account the photon loss that is connected with any transmission through an optical fiber. The reduction in the intensity of the light signal as it travels through the medium is called attenuation. Empirical research has demonstrated that attenuation in optical fibers is caused primarily by absorption and scattering. This phenomenon is an important factor that limits the transmission of a photonic signal across large distances. Every realization of a photon-based communication scheme requires devising an optical power budget that should comprise the acceptable attenuation [13].
In general, in quantum information theory, we discuss the quantum erasure channels (QEC) that relate to the lossy transmission of any physical particles used to encode information [14]. While photons are well-suited for the transmission of quantum information, protecting them from an external environment is very difficult due to the extreme fragility of photonic states. In particular, the photon loss is the most problematic type of error that arises in any quantum communication protocol. However, quantum error correction codes have proved to be efficient at conserving quantum information; see, for example, Refs. [15,16,17]. As for photonic states, general criteria for an error correction code that encodes qubits in bosonic states were introduced [18]. Another proposal to deal with the photon loss in quantum communication involves an error-correction scheme that encodes a two-photon state by using four photons, up to one of which can be lost in the transmission [19]. Alternatively, one can implement a three-photon code that protects one logical qubit against a photon loss [20].
In QKD, the photon loss caused by attenuation is a critical factor not only because of the reduction in the number of particles but also due to direct relations with other phenomena affecting the transmission. For instance, several scattering processes have an impact on the secure key rate in the presence of classical data signals, including Raman scattering, [21,22], guided acoustic wave Brillouin scattering [23], and double Rayleigh backscattering noise [24]. In each case, the secure key rate can be calculated only by taking into account the attenuation characteristics of the transmission medium.
In this paper, we propose approaching the problem of photon loss from the perspective of statistics. In quantum physics, estimation methods are usually implemented in the context of quantum state tomography [25,26,27] or quantum metrology [28,29]. The present paper achieves two goals—the first is that the attenuation coefficient is represented by means of a statistic that works as an estimator; the second is that optimal estimators among many possible are selected based on quantitative criteria. The key advantages of implementing the statistical treatment for the attenuation coefficient include the reliability and accuracy of estimation achieved through the minimum-variance requirement and unbiasedness, respectively.

2. Exponential Distribution and Fiber Attenuation

The methodology of the research was formulated on the grounds of the mathematical properties of the exponential distribution.
Definition 1.
We say that a random variable X has the exponential distribution with the parameter λ > 0 , which is denoted by X Exp ( λ ) if the probability density function (PDF) is given by [30]:
f λ ( x ) = λ e λ x , x > 0 , 0 , x 0
and cumulative distribution function (CDF):
F λ ( x ) = 1 e λ x , x > 0 . 0 , x 0 .
The parameter of the distribution, i.e., λ , is often called the rate parameter, whereas the inverse figure, λ 1 , is named the scale parameter. Next, one can also compute the expected value (mean) and the variance, respectively:
E [ X ] = x f λ ( x ) d x = 1 λ ,
Var [ X ] = ( x E [ X ] ) 2 f λ ( x ) d x = x 2 f λ ( x ) d x E 2 [ X ] = 1 λ 2 ,
Another key characteristics of a probability distribution of a random variable are raw moments, μ r for r N , which are defined as μ r : = E [ X r ] . These quantities can be computed from the moment generating function (MGF) [31]. For the exponential distribution, the MGF, denoted by m X ( t ) , is
m X ( t ) = E [ e t X ] = 0 e t x λ e λ x d x = λ 0 e ( t λ ) x d x = λ e ( t λ ) x t λ 0 = , t λ 0 , λ λ t t λ < 0 .
If an MGF exists, then m X ( t ) is continuously differentiable in some neighborhood of the origin. If we differentiate the MGF r times with respect to t, and let t 0 , we obtain
d r d t r m X ( 0 ) = E [ X r ] μ r ,
which, for the exponential distribution, leads to
μ r = r ! λ r .
Another important property of the exponential distribution is memorylessness, which can be formulated by means of the conditional probability.
Theorem 1.
An exponentially distributed random variable X obeys the relation
P ( X > x 1 + x 2 | X > x 1 ) = P ( X > x 2 ) , x 1 , x 2 0 .
Proof. 
P ( X > x 1 + x 2 | X > x 1 ) = P ( X > x 1 + x 2 X > x 1 ) P ( X > x 1 ) = = P ( X > x 1 + x 2 ) P ( X > x 1 ) = = e λ ( x 1 + x 2 ) e λ x 1 = = e λ x 2 P ( X > x 2 ) ,
In the proof, we used the fact that P ( X > x ) = 1 F λ ( x ) = e λ x F ¯ λ ( x ) . The function F ¯ λ ( x ) is called the complementary cumulative distribution function (CCDF) and plays a central role in the context of physical applications of the exponential distribution.
When we consider the transmission of light through an optical fiber, we encounter losses, which are caused by absorption and scattering. This phenomenon is called the attenuation of an optical fiber. To quantify the photon loss, we follow the Beer–Lambert law, which measures the amount of light lost between the input and output:
I ( L ) = I 0 10 α L ,
where I ( L ) denotes the output power after the transmission through a fiber of the length L, I 0 represents the input power, and α accounts for the attenuation. The attenuation coefficient α depends on the properties of the fiber. Recently, the Beer–Lambert law has already been implemented to study how a beam of photons is being attenuated by investigating the evolution of the Fock state representing the number of photons [32].
In physics, the exponential distribution can be applied to every process that involves an exponential decay; for example, a sample of a radionuclide that undergoes radioactive decay to a different state. Here, the Beer–Lambert law (3) can be equivalently written as I ( L ) = I 0 exp ( λ L ) , where λ ln 10 α . Furthermore, in the quantum regime, it implies that a single photon has been lost on the path L with the probability 1 exp ( λ L ) , whereas exp ( λ L ) denotes the probability that it has survived. In other words, the Beer–Lambert law provides the CCDF for this process. Therefore, in the present manuscript, the distance that a photon covers before vanishing can be treated as a variable with the exponential distribution L Exp ( λ ) .
The process of attenuation on the fundamental quantum level is in agreement with the memorylessness of the exponential distribution. If a photon travels through a fiber, one may assign time-dependent probabilities to the basis vectors in the Fock space [32]
ϱ ( L ) = 1 e λ L | 0 0 | + e λ L | 1 1 | ,
where | 0 represents the state when the photon has already vanished, and | 1 is the situation when the photon keeps traveling. However, if, at some point, we witness the presence of the photon, the state collapses to | 1 and the decay starts over again. Thus, the statistical property of memorylessness is equivalent to the quantum collapse that occurs upon measurement.

3. General Notes on Statistical Estimators

Estimators are used for calculating an estimate of a given quantity based on observed data. Let θ = ( θ 1 , , θ k ) denote the parameters that need to be determined (the estimand). Moreover, let Θ stand for the parameter space. The unknown parameters characterize the distribution of the random variable X. The sample space of all possible values of X is denoted by Ω . An estimator, denoted by θ ^ , is a function of the data that maps the observed outcomes onto the parameter space, i.e., θ ^ : Ω Θ [33].
Suppose that a sample of n observations is drawn, resulting in the values: X 1 , X 2 , , X n . To clarify the notation, we denote the mean of the sample by X ¯ . In addition, the observed values can be arranged in the non-decreasing sequence, which is denoted by: X 1 : n X 2 : n X n : n . In particular, we have X 1 : n = min { X 1 , X 2 , , X n } and X n : n = max { X 1 , X 2 , , X n } .
Henceforth, X k : n shall be called the k th order statistic [34]. In general, any measurable function S : Ω R k of the sample shall be called a statistic and denoted by S ( X 1 , X 2 , , X n ) . From this definition, we see that an estimator is a kind of statistic.
We revise several types of estimators that can be applied in the exponential model.

3.1. Estimator of Moments

Assume that, for every θ Θ , there exists a finite moment E θ [ X r ] for r = 1 , 2 , , n . In general, every moment will be a known function of the k parameters.
Definition 2.
Then, the estimators θ ^ = ( θ ^ 1 , , θ ^ k ) of the parameters θ = ( θ 1 , , θ k ) determined by the method of moments are the solutions of the system:
E θ [ X ] = X ¯ = 1 n i = 1 n X i , E θ [ ( X E θ [ X ] ) j ] = 1 n i = 1 n ( X i X ¯ ) j , j = 2 , , k
with respect to θ.
The fact that θ ^ is an estimator of moments shall be denoted by θ ^ E M [ θ ] .

3.2. Quantile Estimator

First, let us define the empirical distribution function (EDF), denoted by F ^ n ( y ) , which is associated with the empirical measure of a sample
F ^ n ( y ) : = 1 n i = 1 n 1 ( ; y ] ( X i ) ,
where the indicator function 1 A : X { 0 , 1 } is defined as
1 A ( x ) = 1 if x A , 0 if x A .
For the EDF, one can find that the p-th quantile is given by X [ n p ] + 1 : n , where [ y ] denotes the integer part of y. Then, we adopt the following definition of the quantile estimator (denoted as θ ^ Q E [ θ ] ).
Definition 3.
The estimator θ ^ = ( θ ^ 1 , , θ ^ k ) of the parameters θ = ( θ 1 , , θ k ) determined by the quantile method are the solutions of the system
F θ 1 ( p i ) = X [ n p i ] + 1 : n where i = 1 , 2 , , k ,
for some selected 0 < p 1 < < p k < 1 . The symbol F θ 1 represents the quantile function associated with the CDF of the random variable, i.e., F θ ( x ) .

3.3. Minimum-Variance Unbiased Estimator

Let us start by defining the property of unbiasedness, assuming that g ( θ ) represents some function of the parameters θ .
Definition 4.
g ( θ ^ ) is an unbiased estimator of g ( θ ) (denoted by U E [ g ( θ ) ] ) if and only if
E θ [ g ( θ ^ ) ] = g ( θ ) θ Θ .
In other words, an estimator is said to be unbiased when the estimator’s expected value and the true value of the parameter being estimated are the same. In addition to unbiasedness, an estimator can satisfy the minimum-variance property.
Definition 5.
g ( θ ^ ) is a minimum-variance unbiased estimator of g ( θ ) (denoted g ( θ ^ ) M V U E [ θ ] ) if and only if
U ^ ( X ) U E [ g ( θ ) ] θ Θ E [ ( g ( θ ^ ) g ( θ ) ) 2 ] E θ [ ( U ^ ( X ) g ( θ ) ) 2 ] .

3.4. Maximum Likelihood Estimator

The likelihood function of n random variables X 1 , X 2 , , X n is defined to be the joint density of the n random variables, say f θ ( X 1 , X 2 , , X n ) , which is considered to be a function of θ . In particular, if X 1 , X 2 , , X n is a random sample from the density f θ ( x ) , then the likelihood function is f θ ( X 1 ) f θ ( X 2 ) f θ ( X n ) . To remind ourselves that we think of the likelihood function as a function of θ (while the observed sample is fixed), we use the notation L ( θ ) : Θ R for the likelihood function [31].
Definition 6.
θ ^ is a maximum likelihood estimator ( θ ^ M L E [ θ ] ) of θ if and only if
x Ω L ( θ ^ ( x ) ) = sup θ Θ L ( θ ) .
Finally, let us note that, when θ ^ M L E [ θ ] , then g ( θ ^ ) M L E [ g ( θ ) ] .

4. Estimators for the Exponential Distribution

Having summarized general definitions of estimators, we can move on to the exponential distribution, which is the center of attention for this paper. As explained in Section 2, the exponential distribution is characterized by one parameter, λ , which is considered the estimand in our framework.

4.1. Estimator of Moments

By following the definition of the estimator of moments, Definition 2, and implementing the expected value for the exponential distribution (1), we arrive at the following equation:
E λ [ X ] = 1 λ = X ¯ ,
which can be solved straightforwardly as
λ ^ E M = 1 X ¯ .

4.2. Quantile Estimator

Let us begin with finding the quantile function, which is the inverse to the CDF of the exponential distribution. We obtain
F λ 1 ( x ) = 1 λ ln ( 1 x ) .
From Definition 3, we have
F λ 1 ( p ) = X [ n p ] + 1 : n ξ p ^
for any 0 < p < 1 . One obtains
λ ^ Q E p = ln ( 1 p ) ξ p ^ ,
which, in a particular case of p = 1 / 2 , takes the form
λ ^ Q E 0.5 = ln 1 2 ξ 1 2 ^ = ln 2 ξ 1 2 ^ .

4.3. Minimum-Variance Unbiased Estimator

To define M V U E [ θ ] for the exponential model, we need to revise several definitions and theorems.
Definition 7
(Sufficient statistic.). A statistic S ( X 1 , X 2 , , X n ) is a sufficient statistic for a family of distributions P = { P θ : θ Θ } , if, for any set of events F F n and for any value of the statistic, the conditional distribution
P θ ( ( X 1 , , X n ) F | S = s )
does not depend on θ.
Definition 8
([31], Complete family of densities). Let X 1 , X 2 , , X n denote a random sample from the density f θ ( x ) with the parameter space Θ, and let S = S ( X 1 , X 2 , , X n ) be a statistic. The family of densities P θ of S is defined to be complete if and only if E θ [ g ( S ) ] = 0 for all θ Θ implies that P θ [ g ( S ) = 0 ] = 1 for all θ Θ , where g ( S ) is a statistic. In addition, the statistic S is said to be complete if and only if its family of densities is complete.
Theorem 2
(Lehmann–Scheffe theorem). Let X 1 , X 2 , , X n be a random sample from the density f θ ( x ) . Suppose S = S ( X 1 , X 2 , , X n ) is a complete sufficient statistic for θ. If ϕ is a statistic such that E [ ϕ ( S ) ] = θ , then ϕ ( S ) M V U E [ θ ] .
Theorem 3
(Factorization theorem). A statistic S = S ( X 1 , X 2 , , X n ) is sufficient if and only if the joint density factors as
f θ ( x 1 , , x n ) = g θ ( S ( x 1 , , x n ) ) h ( x 1 , , x n ) , θ Θ ,
where the function h ( x 1 , , x n ) is non-negative and does not involve the parameter θ, and the function g θ ( S ( x 1 , , x n ) ) is non-negative and depends on X 1 , X 2 , , X n only through the function S ( X 1 , X 2 , , X n ) .
Furthermore, we utilize the concept of the exponential family, which, in general, can be extended to a vector parameter.
Definition 9.
A class of distributions is said to belong to the exponential family if the PDF can be written as
f θ ( x ) = exp i = 1 k c i ( θ ) T i ( x ) B ( θ ) h ( x ) ,
where h ( x ) , B ( θ ) , c i ( θ ) , and T i ( x ) are known functions.
The statistics { c i ( θ ) } can help to introduce a natural family of parameters. For a parameter vector θ = ( θ 1 , , θ k ) Θ , we define a set Θ ˜ to be the natural family of parameters:
Θ ˜ = { θ ˜ = ( θ ˜ 1 , , θ ˜ k ) = ( c 1 ( θ ) , , c k ( θ ) ) : θ Θ } .
The main application of the exponential family does not relate to finding sufficient statistics, but to showing that a sufficient statistic is complete since this concept is useful in obtaining the best estimators.
Theorem 4.
If P is an exponential family of densities and a natural family of parameters Θ ˜ = C ( Θ ) contain a non-empty k dimensional open interval, then the statistic ( T 1 ( x ) , , T k ( x ) ) is complete.
By following the above definitions and theorems, one can compute a sufficient and complete statistic for the exponential distribution. The joint density can be expressed as
f λ ( x 1 , , x n ) = λ n exp λ i = 1 n x i 1 R + ( x 1 : n ) = exp λ i = 1 n x i + n ln λ 1 R + ( x 1 : n ) .
Based on Theorem 3, we know that the function
T = T ( X 1 , , X n ) = i = 1 n X i
is a sufficient statistic. Furthermore, since λ ( , 0 ) , then, from Theorem 4, we have that S is a complete statistic. In addition, we know that the sum of n random variables such that X Exp ( λ ) has the distribution Γ ( n , λ ) , where n is the shape parameters and λ represents the rate parameter. The PDF for the distribution Γ ( n , λ ) is given by
f ( x ) = λ n Γ ( n ) x n 1 e λ x 1 [ 0 , ) ( x ) ,
where Γ ( n ) = 0 x n 1 e x d x . Now, we proceed to computing the expected value of n 1 T :
E λ n 1 T = ( n 1 ) 0 1 x λ n Γ ( n ) x n 1 e λ x d x = ( n 1 ) λ n 1 0 λ n 1 Γ ( n 1 ) x n 2 e λ x d x = λ ,
where we use the property of the Γ distribution
Γ ( n ) = ( n 1 ) Γ ( n 1 )
as well as the value of the integral
0 λ n 1 Γ ( n 1 ) x n 2 e λ x d x = 1 ,
which comes straightforwardly from integrating the PDF of Γ ( n 1 , λ ) . As a result, we see that λ ^ M V U E = n 1 T is an unbiased estimator of the parameter λ . In addition, by following the Lehmann–Scheffe theorem, we notice that this estimator
λ ^ M V U E = n 1 i = 1 n X i = n 1 n X ¯
is a minimum-variance estimator since it is a function of a sufficient and complete statistic, i.e., λ ^ M V U E M V U E [ λ ] .
For applications of the estimation theory, the class of MVUE is especially important due to the fact that it minimizes the statistical dispersion. The spread of the results is a key factor that limits the accuracy of the analysis. However, the estimator (6) guarantees the lowest achievable scatter. To quantify this aspect, let us compute
Var [ λ ^ M V U E ] = Var n 1 i = 1 n X i = E n 1 i = 1 n X i 2 E n 1 i = 1 n X i 2 = E n 1 i = 1 n X i 2 λ 2 ,
where the first element can be calculated based on the properties of the Γ distribution
E n 1 i = 1 n X i 2 = ( n 1 ) 2 E 1 i = 1 n X i 2 = ( n 1 ) 2 0 1 x 2 λ n Γ ( n ) x n 1 e λ x d x = ( n 1 ) 2 λ 2 ( n 1 ) ( n 2 ) 0 λ n 2 Γ ( n 2 ) x n 3 e λ x d x = n 1 n 2 λ 2 ,
which finally leads to
Var [ λ ^ M V U E ] = n 1 n 2 λ 2 λ 2 = λ 2 n 2 .

4.4. Maximum Likelihood Estimator

The likelihood function for the exponential distribution takes the form
L ( λ ) = f ( λ ; X 1 , , X n ) = λ e λ X 1 λ e λ X n = λ n e λ i = 1 n X i .
Since the natural logarithm is an increasing function, we can maximize either L ( θ ) or ln L ( θ ) . For convenience, we compute
ln L ( λ ) = n ln λ λ i = 1 n X i .
Then, we obtain
ln L ( λ ) λ = n λ i = 1 n X i .
One can easily solve ln L ( λ ) λ = 0 by finding
λ ^ M L E = n i = 1 n X i = 1 X ¯ .
Since 2 ln L ( λ ) λ 2 = n λ 2 < 0 , we know that λ ^ M L E corresponds to the maximum value of the likelihood function. One can note that the estimator λ ^ M L E is equivalent to λ ^ E M .

5. Estimators for the Type II Censored Data

In this part, we propose estimators of the exponential distribution for the type II censored data. Let X 1 , , X n be a random sample from the same distribution. We say that we perform type II censoring of the data if we observe exactly r first results (naturally, r < n ), assuming that the observations are arranged in non-decreasing order. In other words, type II censored data consist of the r consecutive order statistics: X 1 : n , , X r : n [35,36,37,38].
The focus on censored data makes the estimation theory more practicable. In real experiments, we have to deal with uncertainties and deficiencies that limit our capability to measure a sufficient set of data. Therefore, it appears relevant to search for estimators suited for censored data, which can be applied in realistic circumstances.
Before determining the exact forms of estimators, we need to revise the properties of the order statistics.
Theorem 5.
Suppose X 1 , , X n is a sample taken from a distribution characterized by the PDF denoted by f λ and CDF F λ . Then, the k-th order statistic, X k : n , has its own PDF and CDF in the forms [39]:
f k : n ( x ) = n n 1 k 1 f λ ( x ) F λ k 1 ( x ) ( 1 F λ ( x ) ) n k , F k : n ( x ) = P ( X k : n x ) = i = k n n i F λ i ( x ) ( 1 F λ ( x ) ) n i .
Furthermore, we can also find a modified formula for the joint density that fits the censoring.
Theorem 6.
The joint density for the sequence of r < n order statistics X 1 : n , , X r : n is given by
f 1 , , r ( x 1 : n , , x r : n ) = n ! ( n r ) ! f ( x 1 : n ) f ( x r : n ) ( 1 F ( x r : n ) ) n r ,
for < x 1 : n < < x r : n < + .
In particular, Theorems 5 and 6 can be applied to the exponential distribution (see Definition 1) to determine the PDF and CDF for the k-th order statistic, as well as the joint density for r consecutive order statistics. One obtains the following:
f k : n ( x ) = n n 1 k 1 λ e λ x ( n + 1 k ) ( 1 e λ x ) k 1 1 [ 0 , ) ( x ) , F k : n ( x ) = i = k n n i ( 1 e λ x ) i e λ x ( n i ) 1 [ 0 , ) ( x ) , f 1 , , r ( x 1 : n , , x r : n ) = n ! ( n r ) ! λ r exp λ i = 1 r x i : n + ( n r ) x r : n .
The properties of the exponential distribution enumerated in (8) are implemented to determine the explicit forms of three kinds of estimators suited for type II censored data: MVUE, MLE, and best linear unbiased estimator (BLUE).

5.1. Minimum-Variance Unbiased Estimator for Censored Data

The results presented in (8) along with the factorization theorem allow us to state that
T r = i = 1 r X i : n + ( n r ) X r : n
is a sufficient statistic. Furthermore, we know that λ ( , 0 ) , which implies on the basis of Theorem 4 that T r is a complete statistic. We formulate and prove the theorem.
Theorem 7.
For type II censored data, X 1 : n , , X r : n , selected from an exponential distribution, the rate parameter, λ, can be estimated with the MVUE given by
λ ^ M V U E ( r ) = r 1 T r
Proof. 
Let us start by studying the distribution of the statistic T r .
Suppose Y 1 , , Y n are selected from the exponential distribution characterized by λ = 1 . Then, one can prove that these figures are related to the order statistics by [34]
Y 1 = n X 1 : n , Y 2 = ( n 1 ) ( X 2 : n X 1 : n ) , Y n = X n : n X n 1 : n X 1 : n = Y 1 n X 2 : n = Y 1 n + Y 2 n 1 X n : n = Y 1 n + Y 2 n 1 + + Y n 1 .
We see that X i : n = k = 1 i Y k n k + 1 for i = 1 , , n . Thus,
T r = i = 1 r X i : n + ( n r ) X r : n = Y 1 n + Y 1 n + Y 2 n 1 + + Y 1 n + Y 2 n 1 + + Y r n r + 1 + ( n r ) Y 1 n + Y 2 n 1 + + Y r n r + 1 = Y 1 r n + 1 r n + Y 2 r 1 n 1 + n n 1 r n 1 + + Y r 1 n r + 1 + n n r + 1 r n r + 1 = Y 1 + Y 2 + + Y r .
Again, we use the fact that i = 1 r Y i , which is a sum of variables from the exponential distribution, has the distribution Γ ( r , n ) . Then, it follows that
E r 1 T r = ( r 1 ) E 1 T r = ( r 1 ) 0 + 1 t λ r Γ ( r ) t r 1 e λ t d t = ( r 1 ) λ r 1 0 + λ r 1 Γ ( r 1 ) t r 2 e λ t d t = λ .
The last integral gives 1 since it is computed over the entire distribution Γ ( r 1 , λ ) . Finally, based on the Theorem 2, we can conclude that
λ ^ M V U E ( r ) = r 1 T r = r 1 i = 1 r X i : n + ( n r ) X r : n
satisfies the conditions for MVUE, which finishes the proof. □
In addition, one can notice that, for r = n , we have λ ^ M V U E ( r ) = λ ^ M V U E , which means that, without the censoring, our estimator agrees with the formula for the complete set of data; see (6).
One can also compute the variance of λ ^ M V U E ( r ) and obtain
Var λ ^ M V U E ( r ) = λ 2 r 2 .
The proof of (11) shall be skipped since one can use the same reasoning as in the case of obtaining Var λ ^ M V U E ; see (7). Here, T r has the distribution Γ ( r , λ ) , which allows one to proceed analogously as in Section 4.3.
The result (11) informs us about the impact of the censoring on the reliability of estimation. Naturally, as we reduce the number of observations included in the model, we expect to increase the uncertainty of estimation. This feature is reflected in (11), which shows that, the less data we include, the more variance we obtain.

5.2. Maximum Likelihood Estimator for Censored Data

MLE is also obtainable with a set of censored data X 1 : n , , X r : n . We propose and prove a theorem.
Theorem 8.
Let X 1 , , X n denote a sample of variables with the exponential distribution characterized by the rate parameter λ. The parameter λ can be estimated based on the first r order statistics, X 1 : n , , X r : n , from the following MLE:
λ ^ M L E ( r ) = r T r ,
where the statistic T r was defined in (9).
Proof. 
Since we know the statistics of r consecutive order statistics from the exponential distribution, we can formulate the maximum likelihood function for type II censored set of data
L ( λ ) = n ! ( n r ) ! i = 1 r f ( X i : n ) ( 1 F ( X r : n ) ) n r = n ! ( n r ) ! i = 1 r λ e λ X i : n e X r : n n r = n ! ( n r ) ! λ r exp λ i = 1 r X i : n + ( n r ) X r : n .
In this approach, we search for the maximum value of L ( λ ) . To achieve this, we compute the natural logarithm of L ( λ ) along with its first derivative:
l ( λ ) ln L ( λ ) = ln n ! ( n r ) ! + r ln λ λ i = 1 r X i : n + ( n r ) X r : n , l ( λ ) λ = r λ i = 1 r X i : n + ( n r ) X r : n .
Then, by solving l ( λ ) λ = 0 , we obtain the estimator:
λ ^ M L E ( r ) = r i = 1 r X i : n + ( n r ) X r : n = r T r .
Finally, we check that the second derivative is negative:
2 l ( λ ) λ 2 = r λ 2 < 0
for all λ , which implies that we maximize the likelihood function and that λ ^ M L E ( r ) is a legitimate estimator. □
Finally, let us notice that, for r = n , one obtains λ ^ M L E ( r ) = λ ^ M L E 1 X ¯ . This observation comes as no surprise since, without the censoring, both approaches are expected to deliver the same estimator.

5.3. Best Linear Unbiased Estimator

For order statistics, one can define linear estimators, i.e., linear combinations of the order statistics V ^ = i = 1 n a i X i : n , where a i R are some constant coefficients. Then, one can introduce the notion of best linear unbiased estimator (BLUE) [40].
Definition 10.
An unbiased linear estimator V ^ = i = 1 n a i X i : n of the parameter function g ( θ ) is called best linear unbiased estimator (BLUE) if and only if
i = 1 n c i X i : n UE [ g ( θ ) ] θ Θ E θ i = 1 n a i X i : n g ( θ ) 2 E θ i = 1 n c i X i : n g ( θ ) 2 .
The goal of this section is to find a minimum-variance BLUE that is based on first r order statistics ( 1 < r n ), X 1 : n , , X r : n , to estimate the scale parameter β 1 λ of the exponential distribution. We formulate and prove a theorem.
Theorem 9.
Let X 1 , , X n denote a sample of variables with the exponential distribution characterized by the rate parameter λ. The scale parameter β can be estimated based on the first r order statistics, X 1 : n , , X r : n , from the following BLUE:
β ^ B L U E ( r ) = i = 1 r c i X i : n = 1 r i = 1 r X i : n + ( n r ) X r : n .
Proof. 
The estimator has the form:
β ^ B L U E ( r ) = i = 1 r c i X i : n ,
where the coefficients c i have to be properly determined to ensure that λ B L U E ( r ) is unbiased and features minimal variance. Let us notice that the random variables
Z 1 = n X 1 : n Z i = ( n i + 1 ) ( X i : n X i 1 : n ) , i = 2 , , r ,
are independent and have the exponential distribution with the rate parameter λ . One can use these variables to determine the coefficients c i . First, let us note that the estimator (14) can be rewritten as
β ^ B L U E ( r ) = i = 1 r c i X i : n = i = 1 r c i X 1 : n i = 1 r X i : n X i + 1 : n j = i + 1 r c j = X 1 : n i = 1 r c i + i = 1 r X i + 1 : n X i : n j = i + 1 r c j .
Then, if we denote
d i 1 n i + 1 j = i r c j , i = 1 , , r ,
we obtain
β ^ B L U E ( r ) = i = 1 r c i X i : n = i = 1 r d i Z i : n .
Next, we move on to computing the expected value of the estimator β ^ B L U E ( r ) :
E β ^ B L U E ( r ) = E i = 1 r d i Z i : n = i = 1 r d i E [ Z i : n ] = β i = 1 r d i .
Since β ^ B L U E ( r ) needs to be unbiased, we obtain a necessary condition for BLUE:
i = 1 r d i = 1 .
To ensure the minimal variance, we consider
min d 1 , , d r E i = 1 r d i Z i : n β 2 ,
which can be elaborated on by taking advantage of the necessary condition (16):
E i = 1 r d i Z i : n β 2 = E i = 1 r d i ( Z i : n β ) 2 = i = 1 r d i 2 Var Z i + i j r d i d j Cov Z i Z j = β 2 i = 1 r d i 2 = β 2 i = 1 r 1 d i 2 + 1 i = 1 r 1 d i 2 ,
where we used the fact that d r = 1 i = 1 r 1 d i .
As a result, in order to determine the minimal value of (17), we need to consider the following:
min d 1 , , d r i = 1 r 1 d i 2 + 1 i = 1 r 1 d i 2 .
By differentiating (18) with respect to d i for i = 1 , , r 1 , i we obtain the conditions for optimization
d i j = 1 r 1 d j 2 + 1 j = 1 r 1 d j 2 = 2 d i 2 1 j = 1 r 1 d j = 2 d i 1 j = 1 r 1 d j = 0 ,
which leads to a system of equations:
d i = 1 j = 1 r 1 d j , j = 1 , , r 1 .
We notice that all coefficients d i must be equal for i = 1 , , r 1 . Let us, then, use one symbol d d i , which gives
d = 1 i = 1 r 1 d = 1 ( r 1 ) d
and, finally, we arrive at the result
d = d i = 1 r , i = 1 , , r 1 .
From the necessary condition (16), we obtain
d r = 1 i = 1 r 1 = 1 r .
Since, for the BLUE, we need c i , we calculate those from (15):
1 n i + 1 j = i r c j = 1 r j = i r c j = n i + 1 r , i = 1 , , r ,
which leads to
c r = n r + 1 r , c i = j = i r c j j = i + 1 r c j = n i + 1 r n ( i + 1 ) + 1 r = 1 r for i = 1 , , r 1 .
If we substitute the results into (14), we obtain the explicit formula for the BLUE:
β ^ B L U E ( r ) = i = 1 r c i X i : n = 1 r i = 1 r X i : n + ( n r ) X r : n ,
which finishes the proof. □

6. Performance Analysis of the Estimators for Censored Data

In this section, we propose a numerical framework to evaluate the efficiency of the estimators that operate on censored data. In particular, we compare the performance of λ ^ M V U E ( r ) and λ ^ M L E ( r ) for different values of r.
First, let us consider a typical fiber with the attenuation coefficient α = 0.5 dB/km. We know that the photon loss is characterized by an exponential distribution with the rate parameter λ = ln 10 α . Thus, we can simulate an experimental scenario by randomly generating a sample of 10 7 observations such that X Exp ( λ ) . Wolfram Mathematica 10.0 was used to generate random numbers and compute the estimators with order statistics. Each piece of data corresponds to the distance that a photon has covered before absorption (or scattering). To quantify the performance of the statistical estimators, we did not focus on specific results of estimation, but we computed the relative error
δ x : = | λ λ ^ x | λ 100 % ,
where λ ^ x denotes any of the estimators considered. For convenience, we expressed the estimation error as a percentage of the actual rate parameter. This approach allowed us to investigate how the quality of estimation changes when we reduce the initial set of observations by leaving only the first r order statistics. The percent errors that depend on r are denoted by δ M V U E ( r ) and δ M L E ( r ) for the respective estimators λ ^ M V U E ( r ) and λ ^ M L E ( r ) . The results of the numerical simulation are collected in Table 1.
In the first place, one can notice that the first row with r = 10 7 corresponds to an estimation with the complete set of data. It was already explained that, in this case, λ ^ M V U E ( r ) and λ ^ M L E ( r ) are equivalent to standard estimators for the exponential model. We see that r = 10 7 observations are sufficient for a reliable estimation of the rate parameter and, consequently, determining the attenuation coefficient α . If we decrease r, which means that we incorporate only a portion containing r consecutive order statistics, we observe that the estimation error increases monotonically for both estimators. This tendency was anticipated since, by performing censoring, we reject a part of the highest-valued observation. This implies that a censored set of data is not representative for the distribution, which leads to a more significant error in parameter estimation. We see, however, that, up to r = 10 5 , the growth of the error is not critical. By further censoring the data, we obtain results that are more distorted due to the incomplete representation of the distribution. Finally, if r = 10 , which means that we implement only the lowest 10 observation, we obtain unreliable results.
In addition, we notice that the performance of λ ^ M V U E ( r ) for r = 10 and r = 100 differs considerably from λ ^ M L E ( r ) , whereas, for the other values of r, both estimators deliver similar results. This discrepancy for a low number of statistics results from different figures in the numerators of λ ^ M V U E ( r ) and λ ^ M L E ( r ) , which leads to a significant difference when only the lowest order statistics are included in the estimation. In conclusion, the feasibility study presented in this section allows one to verify how many observations are needed to guarantee reliable parameter estimation.

7. Discussion

In the paper, we considered applications of the estimation theory to the exponential distribution. The problem is formulated on the assumption that a measurable quantity is represented by a random variable X with a PDF f θ ( x ) that depends on an unknown parameter θ . Then, on the basis of the observed sample values X 1 , , X n , it is desired to estimate the value of the unknown parameter θ or the value of some function of the parameter, g ( θ ) . We followed the approach called the parametric point estimation with the goal of determining some statistic, say S ( X 1 , , X n ) , to represent the unknown parameter.
The paper contains a brief revision of general concepts of estimation, included in Section 3. Then, in Section 4, we summarized the most common estimators for the exponential distribution, where the goal was to determine the rate parameter λ . We presented four types of estimators that operate on the complete set of data, i.e., X 1 , , X n .
In physics, the exponential distribution plays a central role in decay processes. In particular, the Beer–Lambert law (3) describes the attenuation that involves a decline in the intensity of light as the beam travels through a fiber. This macroscopic law has been implemented to develop a quantum picture for the photon loss. First of all, we have postulated that the distance that a photon covers before absorption (or scattering) has ah exponential distribution, i.e., L Exp ( λ ) . In this context, the rate parameter λ is connected to the attenuation coefficient α that describes the properties of the optical link. Therefore, the estimators presented in Section 4 can be applied to characterize fibers by determining their attenuation coefficients. In addition, the estimation theory allows us to establish minimum-variance estimators that are particularly well-suited for physical applications. The variance, which is an indicator of statistical dispersion, conveys information about the reliability of the measurement. A higher variance means that the scheme provides different results under unchanged conditions. However, we are interested in consistent measurement procedures that feature only insignificant scatter within the delivered results. For this reason, the class of MVUE, which also guarantees validity through unbiasedness, appears very promising for further applications.
The key part of the paper relates to the estimators corresponding to type II censored data, which were introduced in Section 5. In such a case, operating with an incomplete set of measurements is assumed, i.e., we possess r consecutive order statistics: X 1 : n , , X r : n . This problem is intrinsically linked to the nature of physical measurement. For the exponential distribution, the random variable can be observed within the interval: X [ 0 ; ) . However, if X denotes a physical observable (e.g., fiber length or time), it cannot be tracked up to infinity. Consequently, the set of physically obtainable data is always truncated according to our inability to capture extremely large values of the random variable. This inherent limitation of measurement becomes a motivation to search for statistical estimators that can produce reliable results with realistic sets of data.
In this paper, three estimators for type II censored data have been presented. Two of them, i.e., MVUE and MLE, allow one to estimate the rate parameter ( λ ) of the exponential distribution, whereas the third (BLUE) provides a formula for the scale parameter ( λ 1 ). Any of the estimators can be implemented with a realistic set of data. Special attention, however, has been paid to MVUE, where an explicit formula for the variance can be given. Thanks to this, we can investigate how the reliability of the estimation declines as we reduce the set of data.
Numerical simulations have been performed to test the efficiency of the estimators (MVUE and MLE) with censored data. We assumed a specific value of the attenuation coefficient, which allowed us to generate a set of observations. To quantify the performance of the estimators, we computed the percent errors for different numbers of order statistics included in the estimation. The results demonstrate how the quality of estimation degenerates as we truncate the initial set of data. By following the method presented in this paper, one can conduct similar simulations with another attenuation coefficient or other numbers of statistics.

8. Conclusions

This paper provides statistical tools for analyzing the photon loss in fiber-optic communication. The attenuation coefficient can be determined based on the estimators presented in this work, including the methods intended for censored (truncated) sets of data. The results pave the way for the analytical treatment of the attenuation process. In the future, other types of distributions relevant to physics can be investigated to determine reliable estimators of the parameters.

Author Contributions

Conceptualization, A.C.; formal analysis, A.C. and K.C; investigation, A.C. and K.C.; methodology, A.C. and K.C.; project administration, A.C.; supervision, A.C.; validation, K.C.; writing—original draft, A.C.; writing—review and editing, A.C. and K.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data and code underlying the results presented in this paper can be obtained from the corresponding author upon a reasonable request.

Acknowledgments

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
BLUEbest linear unbiased estimator
CCDFcomplementary cumulative distribution function
CDFcumulative distribution function
EDFempirical distribution function
EMestimator of moments
MGFmoment generating function
MLEmaximum likelihood estimator
MVUEminimum-variance unbiased estimator
PDFprobability density function
QEquantile estimator
UEunbiased estimator

References

  1. Okoshi, T. Optical Fibers; Academic Press Inc.: London, UK, 1982. [Google Scholar]
  2. Ishio, H.; Minowa, J.; Nosu, K. Review and status of wavelength-division-multiplexing technology and its application. J. Light. Technol. 1984, 2, 448–463. [Google Scholar] [CrossRef]
  3. Cordeiro, C.M.B.; Franco, M.A.R.; Chesini, G.; Barretto, E.C.S.; Lwin, R.; Brito Cruz, C.H.; Large, M.C.J. Microstructured-core optical fibre for evanescent sensing applications. Opt. Express 2006, 14, 13056. [Google Scholar] [CrossRef] [PubMed]
  4. Maidi, A.M.; Yakasai, I.; Abas, P.E.; Nauman, M.M.; Apong, R.A.; Kaijage, S.; Begum, F. Design and Simulation of Photonic Crystal Fiber for Liquid Sensing. Photonics 2021, 8, 16. [Google Scholar] [CrossRef]
  5. Matsuura, M. Recent Advancement in Power-over-Fiber Technologies. Photonics 2021, 8, 335. [Google Scholar] [CrossRef]
  6. Oh, S.J.; Chun, W.; Riffat, S.B.; Jeon, Y.I.; Dutton, S.; Han, H.J. Computational analysis on the enhancement of daylight penetration into dimly lit spaces: Light tube vs. fiber optic dish concentrator. Build. Environ. 2013, 59, 261–274. [Google Scholar] [CrossRef]
  7. Caravaca-Aguirre, A.M.; Piestun, R. Single multimode fiber endoscope. Opt. Express 2017, 25, 1656–1665. [Google Scholar] [CrossRef] [PubMed]
  8. Krenn, M.; Malik, M.; Scheidl, T.; Ursin, R.; Zeilinger, A. Quantum communication with photons. In Optics in Our Time; Al-Amri, M.D., El-Gomati, M.M., Zubairym, M.S., Eds.; Springer: Cham, Switzerland, 2016; pp. 455–482. [Google Scholar]
  9. Pirandola, S.; Andersen, U.L.; Banchi, L.; Berta, M.; Bunandar, D.; Colbeck, R.; Englund, D.; Gehring, T.; Lupo, C.; Ottaviani, C.; et al. Advances in quantum cryptography. Adv. Opt. Photon. 2020, 12, 1012–1236. [Google Scholar] [CrossRef]
  10. Bennett, C.H.; Brassard, G. Quantum Cryptography: Public key distribution and coin tossing. In Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 9–12 December 1984; pp. 175–179. [Google Scholar]
  11. Ekert, A.K. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 1991, 67, 661–663. [Google Scholar] [CrossRef]
  12. Boaron, A.; Boso, G.; Rusca, D.; Vulliez, C.; Autebert, C.; Caloz, M.; Perrenoud, M.; Gras, G.; Bussieres, F.; Li, M.-J.; et al. Secure quantum key distribution over 421 km of optical fiber. Phys. Rev. Lett. 2018, 121, 190502. [Google Scholar] [CrossRef]
  13. Wei, J.L.; Sanchez, C.; Giddings, R.P.; Hugues-Salas, E.; Tang, J.M. Significant improvements in optical power budgets of real-time optical OFDM PON systems. Opt. Express 2010, 18, 20732–20745. [Google Scholar] [CrossRef] [PubMed]
  14. Grassl, M.; Beth, T.; Pellizzari, T. Codes for the quantum erasure channel. Phys. Rev. A 1997, 56, 33–38. [Google Scholar] [CrossRef]
  15. Cory, D.G.; Price, M.D.; Maas, W.; Knill, E.; Laflamme, R.; Zurek, W.H.; Havel, T.F.; Somaroo, S.S. Experimental Quantum Error Correction. Phys. Rev. Lett. 1998, 81, 2152–2155. [Google Scholar] [CrossRef]
  16. Lidar, D.A.; Brun, T.A. (Eds.) Quantum Error Correction; Cambridge University Press: New York, NY, USA, 2013. [Google Scholar]
  17. Terhal, B.M. Quantum error correction for quantum memories. Rev. Mod. Phys. 2015, 87, 307–346. [Google Scholar] [CrossRef]
  18. Chuang, I.L.; Leung, D.W.; Yamamoto, Y. Bosonic quantum codes for amplitude damping. Phys. Rev. A 1997, 56, 1114–1125. [Google Scholar] [CrossRef]
  19. Gingrich, R.M.; Kok, P.; Lee, H.; Vatan, F.; Dowling, J.P. All Linear Optical Quantum Memory Based on Quantum Error Correction. Phys. Rev. Lett. 2003, 91, 217901. [Google Scholar] [CrossRef] [PubMed]
  20. Wasilewski, W.; Banaszek, K. Protecting an optical qubit against photon loss. Phys. Rev. A 2007, 75, 042316. [Google Scholar] [CrossRef]
  21. Fröhlich, B.; Dynes, J.; Lucamarini, M.; Sharpe, A.W.; Tam, S.W.-B.; Yuan, Z.; Shields, A.J. Quantum secured gigabit optical access networks. Sci. Rep. 2016, 5, 18121. [Google Scholar] [CrossRef] [PubMed]
  22. Valivarthi, R.; Umesh, P.; John, C.; Owen, K.A.; Verma, V.B.; Nam, S.W.; Oblak, D.; Zhou, Q.; Tittel, W. Measurement-device-independent quantum key distribution coexisting with classical communication. Quant. Sci. Technol. 2019, 4, 045002. [Google Scholar] [CrossRef]
  23. Li, Y.; Wang, N.; Wang, X.; Bai, Z. Influence of guided acoustic wave Brillouin scattering on excess noise in fiber-based continuous variable quantum key distribution. J. Opt. Soc. Am. B 2014, 31, 2379–2383. [Google Scholar] [CrossRef]
  24. Chen, J.-P.; Zhang, C.; Liu, Y.; Jiang, C.; Zhang, W.; Hu, X.-L.; Guan, J.-Y.; Yu, Z.-W.; Xu, H.; Lin, J.; et al. Sending-or-not-sending with independent lasers: Secure twin-field quantum key distribution over 509 km. Phys. Rev. Lett. 2020, 124, 070501. [Google Scholar] [CrossRef] [PubMed]
  25. James, D.F.V.; Kwiat, P.G.; Munro, W.J.; White, A.G. Measurement of qubits. Phys. Rev. A 2001, 64, 052312. [Google Scholar] [CrossRef]
  26. Altepeter, J.B.; Jeffrey, E.R.; Kwiat, P.G. Photonic State Tomography. Adv. At. Mol. Opt. Phys. 2005, 52, 105–159. [Google Scholar]
  27. Acharya, A.; Kypraios, T.; Guta, M. A comparative study of estimation methods in quantum tomography. J. Phys. A Math. Theor. 2019, 52, 234001. [Google Scholar] [CrossRef]
  28. Paris, M.G.A. Quantum estimation for quantum technology. Int. J. Quantum Inf. 2009, 7, 125–137. [Google Scholar] [CrossRef]
  29. Albarelli, F.; Demkowicz-Dobrzański, R. Probe Incompatibility in Multiparameter Noisy Quantum Metrology. Phys. Rev. X 2022, 12, 011039. [Google Scholar] [CrossRef]
  30. Ross, S.M. Introduction to Probability Models, 9th ed.; Elsevier: London, UK, 2007; pp. 282–291. [Google Scholar]
  31. Mood, A.M.; Graybill, F.A.; Boes, D.C. Introduction to the Theory of Statistics; McGraw-Hill: New York, NY, USA, 1974. [Google Scholar]
  32. Czerwinski, A.; Szlachetka, J. Efficiency of photonic state tomography affected by fiber attenuation. Phys. Rev. A 2022, 105, 062437. [Google Scholar] [CrossRef]
  33. Hogg, R.V.; Craig, A.T. Introduction to Mathematical Statistics, 4th ed.; Macmillan: New York, NY, USA, 1978. [Google Scholar]
  34. David, H.A.; Nagaraja, H.N. Order Statistics; John Wiley & Sons: Hoboken, NJ, USA, 2003. [Google Scholar]
  35. Cohen, A.C. Simplified estimators for the normal distribution when samples are singlycensored or truncated. Technometrics 1959, 1, 217–237. [Google Scholar] [CrossRef]
  36. Balakrishnan, N.; Cohen, A.C. Order Statistics and Inference. Estimation Methods, 1st ed.; Academic Press Inc.: London, UK, 1991. [Google Scholar]
  37. Smith, P.J. Analysis of Failure and Survival Data, 1st ed.; Chapman and Hall: New York, NY, USA, 2002. [Google Scholar]
  38. Mahmoud, M.R.; Sultan, K.S.; Saleh, K.M. Progressively censored data from the linear exponential distribution: Moments and estimation. Int. J. Stat. 2006, 64, 199–215. [Google Scholar]
  39. Casella, G.; Berger, R.L. Statistical Inference, 2nd ed.; Thomson Learning Inc.: Duxbury, MA, USA, 2002. [Google Scholar]
  40. Nelson, W.; Hahn, G.J. Linear Estimation of a Regression Relationship from Censored Data–Part II Best Linear Unbiased Estimation and Theory. Technometrics 1973, 15, 133–150. [Google Scholar]
Table 1. The percent errors of the rate parameter estimation. The results are rounded to two significant figures. The estimators λ ^ M V U E ( r ) (10) and λ ^ M L E ( r ) (12) were utilized.
Table 1. The percent errors of the rate parameter estimation. The results are rounded to two significant figures. The estimators λ ^ M V U E ( r ) (10) and λ ^ M L E ( r ) (12) were utilized.
r δ MVUE ( r ) δ MLE ( r )
10 7 0.024%0.024%
10 6 0.037%0.036%
10 5 0.050%0.051%
10 4 0.53%0.52%
10 3 1.3%1.2%
10 2 3.4%4.5%
1015%5.9%
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Czerwinski, A.; Czerwinska, K. Statistical Analysis of the Photon Loss in Fiber-Optic Communication. Photonics 2022, 9, 568. https://doi.org/10.3390/photonics9080568

AMA Style

Czerwinski A, Czerwinska K. Statistical Analysis of the Photon Loss in Fiber-Optic Communication. Photonics. 2022; 9(8):568. https://doi.org/10.3390/photonics9080568

Chicago/Turabian Style

Czerwinski, Artur, and Katarzyna Czerwinska. 2022. "Statistical Analysis of the Photon Loss in Fiber-Optic Communication" Photonics 9, no. 8: 568. https://doi.org/10.3390/photonics9080568

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop