Complexity / 2021 / Article
Special Issue

Dynamic Analysis, Learning, and Robust Control of Complex Systems

View this Special Issue

Research Article | Open Access

Volume 2021 |Article ID 9932840 |

Saad J. Almalki, Tahani A. Abushal, M. D. Alsulami, G. A. Abd-Elmougod, "Analysis of Type-II Censored Competing Risks’ Data under Reduced New Modified Weibull Distribution", Complexity, vol. 2021, Article ID 9932840, 13 pages, 2021.

Analysis of Type-II Censored Competing Risks’ Data under Reduced New Modified Weibull Distribution

Academic Editor: Ahmed Mostafa Khalil
Received15 Mar 2021
Revised06 Apr 2021
Accepted21 Apr 2021
Published29 May 2021


Models with the bathtub-shaped hazard rate function are widely used in lifetime analysis and reliability engineering. In this paper, we adopted the reduced new modified Weibull (RNMW) distribution with a bathtub-shaped hazard rate function. Under consideration that the population units are failing with two independent causes of failure and the failure time is distributed with RNMW distribution, we formulate the model which is known as competing risks model. The model parameters under the type-II censoring scheme are estimated with the maximum likelihood method with the corresponding asymptotic confidence intervals. Also, the Bayes point and credible intervals with the help of MCMC methods are constructed. The real and simulated datasets are analyzed for illustrative purposes. Finally, the estimators are compared with the Monte Carlo simulation study.

1. Introduction

In the past few years, different modifications of Weibull distribution were constructed with a bathtub-shaped hazard rate function. These modifications were discussed with different authors, see [14]. Some modification models of Weibull distribution are discussed with with two or three parameters’ vectors [46]. Also, some of the modifications of Weibull distribution were discussed with four parameters (see [7]) and the modifications with five parameters (see [8]). Then, the large sets of distribution are generalized with generalized linear exponential distribution as the bathtub-shaped hazard rate presented by Sarhan et al. [9]. The unimodal, decreasing, increasing, or bathtub-shaped hazard rate beta-Weibull distribution was proposed by Lee et al. [10]. The four parameters’ generalized modified Weibull distribution was proposed by Carrasco et al. [11].

Almalki and Yuan [12] have presented new modified Weibull distribution with five parameters and distribution function (CDF) given bywhere and are called shape parameters, and are called scale parameters, and is called the accelerated parameter. Most effective and flexible lifetime distributions with bathtub-shaped hazard functions have more than three or four parameters but the reduced lifetime distributions have a few number of parameters, two or three, but these distributions are not much (for example, the modified Weibull distribution, the exponentiated Weibull distribution, and the modified Weibull extension). Almalki [13] presented a new version of new modified Weibull distribution with a bathtub-shaped failure rate function (FRF) called reduced new modified Weibull distribution by taking  = , with CDF given bywhere and are called scale parameters and is called the accelerated parameter.

In this paper, we considered the special case of reduced version (2) called new reduced modified Weibull (NRMW) distribution with parameters as follows:

The density, survival, and hazard failure rate functions are given, respectively, bywhere and are nonnegative parameters. The PDF of NRMW distribution has different shape, decreasing, or decreasing-increasing-decreasing, as shown in Figure 1. Also, different shapes of hazard failure rate function, decreasing, and the bathtub-shape are given in Figure 1.

If the random variable is distributed with NRMW, then the following two properties are satisfied.(1)The rth moment of the random variable of NRMW is given bywhere is the gamma function.(2)The moment generating function is given by

The lifetime data of product units are presented in complete or censored data dependent on some consideration of the test time or cost. The word complete is used when the failure time data is obtained from all units under the test. But, the censored data is used when some but not all units under the test are failed through determined period of time. The censoring is available in various types; type-I and type-II censoring schemes are from the oldest censoring scheme. In the type-I censoring scheme, the experimenter removed the test at prefixed time; then, the failure times are random. But, in the type-II censoring scheme, the experimenter removed the test at the prefixed number of failure; then, the test time is random.

In life-testing experiments or reliability analysis, tested units fail with different modes of failure which is a common phenomenon in the life testing experiment and known by the competing risks’ problem. In practice, for the life products, the product units fail under different failure modes, one of them causes failure, and the problem of assessment of the risk of any failure mode in the presence of other modes takes the attention of several authors; for more details, see [14-18] and recent [19, 20]. In our population, we record the failure time and the corresponding failure mode under consideration that only two failure modes exist and the unit fails under only one mode.

The paper aims to model type-II competing risk samples with NRMW distribution when the failure modes are independent and failure occurs under only one mode. Then, we have a description of the model mechanism and the corresponding likelihood function. Also, the model parameters are estimates for point and interval with maximum likelihood and Bayes methods. The theoretical results are discussed through simulation Monte Carlo study and real data analysis.

The paper is organized as follows. Section 2 contains some abbreviations and model description. Section 3 contains the classical estimation with the MLE method. Section 4 contains Bayes estimation with the MCMC method. In Section 5, the two lifetime data are analyzed for the illustrating purpose. Section 6 reports the results of the Monte Carlo study.

2. The Abbreviations and Model

In this section, we give the list of abbreviations that are used in this article as well as the complete description of the model mechanism as follows.

2.1. List of Abbreviations

NRMW: Reduced new modified WeibullPDF: Probability density functionCDF: Cumulative distribution function: Survival functionHF: Hazard function: The observed time to failure: th time to failure under cause : Indicator denoted to the causeMCMC: Markov chain Monte CarloMH: Metropolis–Hastings algorithmMSE: Mean squared errorMIL: Mean interval lengthCP: Coverage percentageMLE: Maximum likelihood estimateLF: Loss functionACI: Approximate confidence intervalCI: Credible intervals

2.2. The Model Description

Let identical independent (i.i) units are selected from population to test under the life testing experiment. And, the integer number needing for statistical inference is determined at the beginning of the experiment. When the experiment is running, failure time and the corresponding cause of failure are recorded, say . Under consideration of that only two causes of failure and observed sample  = {, , ..., }, the joint likelihood function is formulated bywhere , , , and

For the given type-II competing risks’ sample drawn from NRMW distributions, say NRMW , , and the observed variable  = min (, ), 1, 2, …, , are independent and distributed as NRMW distribution with shape parameter and accelerate parameter . Hence, from (8), the likelihood function is reduced towhere the two integers and present numbers of units that fail under first and second causes, respectively.

Remarks 1. (1)The latent failure time is distributed with NRMW distribution with and shape and accelerate parameters, respectively(2)The value is distributed with binomial distribution with sample size and probability of success but is binomial distributed with sample size and probability of success

3. Maximum Likelihood Estimations

The maximum likelihood estimators of model parameters in this section are formulated for the point and interval estimate with given observed type-II competing risks’ censoring sample as follows.

3.1. Point MLE

The natural logarithms of likelihood function (10) is reduced to

After taking the partial derivative of the log-likelihood function with respect to parameters’ vector and , we have the likelihood equations which are defined by the following theorem.

Theorem 1. The conditional ML estimators of parameters and , given 0 and two numbers and 0, can be written bywhere

Remark 2. If , there are no failures due to cause . Then, the observed data  = {, , , } does not provide information about parameter .
Also, the partial derivative of the log-likelihood function with respect to parameter It is clearly from (14) that there is not a closed form for the ML estimator of ; then, the iteration method can solve this problem as follows.

Theorem 2. The ML estimators of parameter presented by the nonlinear equation can be given bywhere

Remark 3. Nonlinear equation (16) can be solved with any iteration method such as Newton–Raphson or fixed point but needs to find the initial value of which can be obtained from the profile likelihood function presented byThen, from theorems (1) and (2), the ML estimate of the parameters’ vector is obtained to be .

3.2. Interval Estimation

The second derivative of the log likelihood function with respect to is given by


Hence, from equations (19) to (21), the Fisher information matrix (IM) is defined as minus expectation of equations (19)–(21) to be given by

The approximate value of the Fisher information matrix is defined by

Under limiting properties of the MLEs is using it to present the asymptotic distribution of . Then, the asymptotically normally distributed mean and variance covariance matrix describe the asymptotic distribution of Therefore, the interval estimate with confidence level is given bywhere the vector presents the diagonal of inverse of and the value presents the percentile of the standard normal distribution with right-tail probability .

4. MCMC Bayes Estimation

Bayesian estimation depends on the amount of the past information about the model parameters which is known by prior distribution. And, the amount of the information existing in data is known by the likelihood function. Then, we aim to formulate these two data in the form of probability distribution, known by posterior distribution, as follows.

Suppose that the parameters’ vector is distributed with independent gamma priors. Therefore, the joint prior distribution can be presented by

Generally, the posterior distribution can be formulated by

Also, generally the ratio of two integrals (26), especially, in the high-dimensional case, cannot obtain analytical. Then, different methods are available to approximate this ratio such as Lindley approximation and numerical integration. But, one of the most applied methods known by MCMC method is discussed in this article. Hence, without loss of the generality, the Bayes estimate of the function under squared error loss (SEL) function is given by

4.1. MCMC Approach

The posterior distribution presented by (26) with prior distribution (24) and likelihood function (10) is reduced towhere is the normalized constant. From the posterior distribution the full-conditional PDFs of the vector , is given by

The full-conditional PDFs have shown that generation from posterior distribution depend on two-conditional gamma density and more with general conditional function which is similar to normal distribution. Hence, the MH algorithm under Gibbs is a more suitable algorithm to construct the empirical posterior distribution (see [24]) Also, for the recent review of MH algorithms under Gibbs, see [25] and [26].

4.2. Gibbs with MH Algorithms
Step 1: set the indicator and .Step 2: from (28) and (29), generate and .Step 3: with normal proposal distribution with mean and variance () = , generate the value under proposal normal distribution with MH algorithms as follows.(i)Generate the proposal, , from .(ii)Calculate the acceptance probability:(iii)Generate uniform (0, 1) value .(iv)If , accept the proposal . Otherwise, reject the proposal and repeat the value .Step 4: report and set .Step 5: steps from (2) to (4) are repeated times.Step 6: the point Bayes estimators for any function are defined byand integer is the number needed to achieve the stationary distribution (burn-in). The corresponding posterior variance of is given byStep 7: for interval estimators with confidence level of is given by

5. Data Analysis

In this section, we discussed two lifetime datasets; real and simulated data to illustrate the developed results in this paper.

5.1. Example 1: Real Dataset

Under a laboratory experiment with a conventional laboratory environment, Hoel [23] tested a male mice exposed to radiation dose of 300 roentgens at age of 5-6 weeks. The lifetime data under two causes of failure, thymic lymphoma as a first cause and other causes as a second cause of failure, are reported in Table 1. The causes of failure are obtained for each mouse by autopsy. Restricting the analysis to two causes of death, for the purpose of analysis, we consider thymic lymphoma as cause 1 and reticulum cell sarcoma as cause 2. Different combinations of Hoel data are used by several authors [2426]. Hence, under sample size  = 61 and effected sample size  = 23, the type-II competing risks’ data after divided by 100 for simplicity are given by {(0.40, 2), (0.42, 2), (0.51, 2), (0.62, 2), (1.59, 1), (1.63, 2), (1.79, 2), (1.89, 1), (1.91, 1), (1.98. 1), (2.00, 1), (2.06, 2), (2.07, 1), (2.20, 1), (2.22, 2), (2.28, 2), (2.35, 1), (2.45, 1), (2.49, 2), (2.50, 1), (2.52, 2), (2.56, 1), (2.61, 1)}.

Other causes40425162163179206222228252249

For given dataset, the efficiency of the theoretical results of NRMW distribution for analysis of this data is constructed. Under type-II competing risks’ data, the profile log-likelihood function of given in Figure 2 is a unimodal function, and the ML estimate is computed with iteration with initial guess of as 1.0. The noninformative prior is used for prior information as , . The results of MLE and Bayes estimate are reported in Table 2 for point and 95% interval estimate. For the MCMC approach in the Bayes method. We run the chan (Gibbs with MH algorithm) 11000 times and the first 1000 times which are needed to reach the stationary distribution are deleted as known by “brun-in.” The empirical posterior distribution under the MCMC approach is described with Figures 3 and 4. The MCMC convergence to the posterior distribution is described by Figures 3 and 4.

Pa.95% ACILength95% CILength

0.005120.0068(0.00000, 0.01472)0.0147(0.0012, 0.0183)0.0172
0.004690.0062(0.00000, 0.01512)0.0151(0.0011, 0.0171)0.0161
1.283891.2411(0.54999, 2.01780)1.4678(0.7868, 1.8240)1.0372

5.2. Example 2: Simulated Dataset

The algorithms used to generate and analyze the type-II competing risks sample from NRMW distribution is described as follows:(1)Suppose a sample size  = 50 and effected sample size .(2)From gamma prior distributions with  = , generate a sample of size 10. Then, the true parameters’ value is computed to be the sample mean  = .(3)Generate type-II competing risks’ sample from NRMW with () shape and scale parameters to be {0.0273, 0.0349, 0.0604, 0.0779, 0.0834, 0.0902, 0.1604, 0.167, 0.1674, 0.1682, 0.1892, 0.2384, 0.2431, 0.2786, 0.2786, 0.2958, 0.3827, 0.452, 0.5049, 0.5735, 0.5845, 0.5996, 0.6032, 0.6201, 0.6279, 0.6376, 0.6461, 0.6529, 0.6668, 0.6726}; and are generated from binomial distribution to be and .(4)The graphs of profile log-likelihood function and empirical posterior distribution under MCMC are given in Figures 57, respectively.(5)The results of ML and Bayes estimate are reported in Table 3 for point and 95% interval estimate.

Pa.95% ACILength95% CILength

0.12740.1467(0.0334, 0.2215)0.1881(0.0742, 0.2469)0.1727
0.02550.0320(0.0000, 0.0529)0.0529(0.0104, 0.0690)0.0586
1.28392.4580(1.4654, 3.8878)2.4224(1.5523, 3.4745)1.9222

6. Simulation Studies

The quality of the proposed model and the corresponding developed results in this paper is assessed through the Monte Carlo simulation study as follows. In our study, we measure the effect of change of each sample size affect sample size and model parameters . So, different combinations of the censoring scheme are reported in the simulation table. For the parameters’ values, two sets are used  = . The simulation study is carried out with respect to 1000 simulated datasets. The prior parameters are selected to satisfy the property that . For the point estimate, we compute mean (ME) and the square root of mean squared error (MSE). For the interval estimate, we compute mean interval length (MIL) and probability coverage (PC). We run chan (MCMC iteration) 11000 times discarding the first 1000 values as brun-in (number of iterations needed to reach the stationary distribution). The results of the simulation study are reported in Tables 47.

TollsBayes Bayes

(30, 10)MEs0.01350.02541.84200.01280.02451.81510.01190.02251.6241

(30, 20)MEs0.01200.02451.81800.01170.02411.80700.01150.02141.6110

(30, 30)MEs0.01080.02351.70100.01090.02371.70210.01110.02121.6030

(50, 15)MEs0.01230.02471.82410.01180.02391.81100.01130.02121.6132

(50, 30)MEs0.01090.02341.70400.01110.02351.70300.01090.02141.6051

(50, 50)MEs0.00980.02111.68710.01010.02171.65510.00970.02211.5550

(70, 35)MEs0.01200.02181.69800.01130.02251.66020.01020.02281.5672

(70, 50)MEs0.01010.02121.6890.01020.02181.65100.00960.02191.552

(70, 70)MEs0.00990.02081.60310.00990.02101.5550.00980.02191.5400

TollsBayes Bayes

(30, 10)MILs0.02990.04753.41520.02870.04643.41490.02150.04223.4109

(30, 20)MILs0.02680.04513.41270.02540.04313.41220.01850.04013.4090

(30, 30)MILs0.02370.04193.41000.02210.04023.41000.01570.03703.4065

(50, 15)MILs0.02720.04573.41310.02550.04343.41270.01900.04083.4092

(50, 30)MILs0.02410.04153.41010.02190.04083.41030.01550.03723.4061

(50, 50)MILs0.02250.04033.40850.02070.04003.40880.01420.03613.4048

(70, 35)MILs0.02310.04093.40920.02140.04073.40970.01490.03723.4054

(70, 50)MILs0.02250.04013.40820.02040.04023.40830.01440.03653.4045

(70, 70)MILs0.02090.03823.40410.01790.03763.40450.01120.03313.4015

TollsBayes Bayes

(30, 10)MEs0.08420.04321.35420.08460.04351.35390.09210.04891.2874

(30, 20)MEs0.08820.04811.34980.08900.04951.34820.09810.04821.2811

(30, 30)MEs0.09210.04911.34500.09110.05211.3440.09920.04821.2711

(50, 15)MEs0.08740.04711.35110.08800.04821.34900.09940.04871.2815

(50, 30)MEs0.09240.04931.34550.09090.05191.35100.09900.04871.2707

(50, 50)MEs0.12010.05111.32220.12170.05091.30010.09970.05031.2110

(70, 35)MEs0.09600.04991.34410.09390.05111.34510.09980.04971.2670

(70, 50)MEs0.11500.05081.32000.12070.04801.29000.09940.05091.2121

(70, 70)MEs0.10700.05031.14100.10020.05101.15910.10700.05031.1100

TollsBayes Bayes

(30, 10)MILs0.23420.12341.72410.23290.12231.72190.23290.12231.7219

(30, 20)MILs0.23230.12151.72190.23110.12041.72020.23110.12011.7200

(30, 30)MILs0.22800.11911.71710.22850.11721.71690.22930.11771.7168

(50, 15)MILs0.23270.12181.72230.23170.12111.72080.23190.12071.7206

(50, 30)MILs0.22770.11901.71680.22820.11751.71710.22900.11741.7163

(50, 50)MILs0.22240.11631.71320.22270.11611.71250.22390.11261.7125

(70, 35)MILs0.22680.11811.71490.22750.11701.71630.22810.11671.7157

(70, 50)MILs0.22270.11611.71290.22250.11581.71260.22410.11231.7122

(70, 70)MILs0.22010.11431.71140.21990.11421.71090.22250.11111.7104

Models with the bathtub-shaped or increasing failure rate function have modeled a different lifetime data. In this section, we adopted the simulation study for one reducing form of the modified Weibull distribution.

7. Conclusion

Different types of censoring schemes are available, see [27], and the type-II censoring scheme presents the simple type of censoring, saving the number of failures needed for statistical inference. Also, simulation studies are constructed to check the validity of the developed theoretical result, see [28, 29]. The problem of “time-to-failure” under different causes of failure is common in reliability studying. In natural, causes of failure may be dependent but in our modeling, we proposed that the causes of failure are independent. This model considers that the unit failure time is distributed with NRMW distribution with type-II censoring scheme. In this section, the simulation results have reported some points described as follows.(1)The proposed model under the type-II censoring scheme for competing risks’ model serves well for all choice of censoring schemes and parameters’ choices(2)The Bayes estimation under noninformative prior is more closed to maximum likelihood estimation(3)The informative priors serve better than noninformative prior and maximum likelihood estimations(4)By increasing the value of the affect sample size , the values of the MSE and MIL reduce.(5)The numerical results are more suitable when the proportion is increasing.

Data Availability

No data were used to support the findings of this study.

Conflicts of Interest

The authors declare that they have no conflicts of interest regarding the publication of the paper.


This work was supported by Taif University under researchers supporting project number TURDP-2020/253, Taif, Saudi Arabia.


  1. S. Rajarshi and M. B. Rajarshi, “Bathtub distributions: a review,” Communications in Statistics-Theory and Methods, vol. 17, no. 8, pp. 2597–2621, 1988. View at: Publisher Site | Google Scholar
  2. D. N. P. Murthy, M. Xie, and R. Jiang, Weibull Models, John Wiley and Sons, New York, NY, USA, 2003.
  3. H. Pham and C.-D. Lai, “On recent generalizations of the weibull distribution,” IEEE Transactions on Reliability, vol. 56, no. 3, pp. 454–458, 2007. View at: Publisher Site | Google Scholar
  4. C. D. Lai, M. Xie, and D. N. P. Murthy, “A modified weibull distribution,” IEEE Transactions on Reliability, vol. 52, no. 1, pp. 33–37, 2003. View at: Publisher Site | Google Scholar
  5. M. Bebbington, C.-D. Lai, and R. Zitikis, “A flexible weibull extension,” Reliability Engineering & System Safety, vol. 92, no. 6, pp. 719–726, 2007. View at: Publisher Site | Google Scholar
  6. M. Xie, Y. Tang, and T. N. Goh, “A modified Weibull extension with bathtub-shaped failure rate function,” Reliability Engineering & System Safety, vol. 76, no. 3, pp. 279–285, 2002. View at: Publisher Site | Google Scholar
  7. M. Xie and C. D. Lai, “Reliability analysis using an additive weibull model with bathtub-shaped failure rate function,” Reliability Engineering and System Safety, vol. 52, pp. 87–93, 1995. View at: Publisher Site | Google Scholar
  8. A. M. Sarhan and J. Apaloo, “Exponentiated modified weibull extension distribution,” Reliability Engineering & System Safety, vol. 112, pp. 137–144, 2013. View at: Publisher Site | Google Scholar
  9. A. M. Sarhan, A. E.-B. A. Ahmad, and I. A. Alasbahi, “Exponentiated generalized linear exponential distribution,” Applied Mathematical Modelling, vol. 37, no. 5, pp. 2838–2849, 2013. View at: Publisher Site | Google Scholar
  10. F. Famoye, C. Lee, and O. Olumolade, “The beta-weibull distribution,” Journal of Statistical Theory and Applications, vol. 4, pp. 121–136, 2005. View at: Google Scholar
  11. J. M. F. Carrasco, E. M. M. Ortega, and G. M. Cordeiro, “A generalized modified Weibull distribution for lifetime modeling,” Computational Statistics & Data Analysis, vol. 53, no. 2, pp. 450–462, 2008. View at: Publisher Site | Google Scholar
  12. S. J. Almalki and J. Yuan, “A new modified Weibull distribution,” Reliability Engineering & System Safety, vol. 111, pp. 164–170, 2013. View at: Publisher Site | Google Scholar
  13. S. J. Almalki, “A reduced new modified Weibull distribution,” Journal of Communications in Statistics-Theory and Methods, vol. 47, pp. 2297–2313, 2018. View at: Publisher Site | Google Scholar
  14. D. R. Cox, “The analysis of exponentially distributed life-times with two types of failure,” Journal of the Royal Statistical Society: Series B (Methodological), vol. 21, no. 2, pp. 411–421, 1959. View at: Publisher Site | Google Scholar
  15. H. A. David and M. L. Moeschberger, The Theory of Competing Risks, Griffin, London, UK, 1978.
  16. M. J. Crowder, Classical Competing Risks, Chapman and Hall, London, UK, 2001.
  17. N. Balakrishnan and D. Han, “Exact inference for a simple step-stress model with competing risks for failure from exponential distribution under type-II censoring,” Journal of Statistical Planning and Inference, vol. 138, pp. 4172–4186, 2008. View at: Publisher Site | Google Scholar
  18. A. Ganguly and D. Kundu, “Analysis of simple step-stress model in presence of competing risks,” Journal of Statistical Computation and Simulation, vol. 86, no. 10, pp. 1989–2006, 2016. View at: Publisher Site | Google Scholar
  19. A. Ali, A. M. Almarashi, and G. A. Abd-Elmougod, “Statistical analysis of competing risks lifetime data from Nadarajaha and haghighi distribution under type-II censoring,” Journal of Intelligent and Fuzzy Systems, vol. 38, pp. 2591–2601, 2019. View at: Publisher Site | Google Scholar
  20. A. M. Almarashi and G. A. Abd-Elmougod, “Accelerated competing risks model from Gompertz lifetime distributions with type-II censoring scheme,” Thermal Science, vol. 24, pp. 165–175, 2019. View at: Publisher Site | Google Scholar
  21. N. Metropolis, A. W. Rosenbluth, M. N. Rosenbluth, A. Teller, and E. Teller, “Equation of state calculations by fast computing machines,” The Journal of Chemical Physics, vol. 21, no. 6, pp. 1087–1092, 1953. View at: Publisher Site | Google Scholar
  22. A. Ali, A. M. Almarashi, and G. A. Abd-Elmougod, “Joint type-I generalized hybrid censoring for estimation the two Weibull distributions,” Journal of Information Science and Engineering, vol. 36, pp. 1243–1260, 2020. View at: Google Scholar
  23. D. G. Hoel, “A representation of mortality data by competing risks,” Biometrics, vol. 28, no. 2, pp. 475–488, 1972. View at: Publisher Site | Google Scholar
  24. B. Pareek, D. Kundu, and S. Kumar, “On progressively censored competing risks data for weibull distributions,” Computational Statistics & Data Analysis, vol. 53, no. 12, pp. 4083–4094, 2009. View at: Publisher Site | Google Scholar
  25. A. M. Sarhan, D. C. Hamilton, and B. Smith, “Statistical analysis of competing risks models,” Reliability Engineering & System Safety, vol. 95, no. 9, pp. 953–962, 2010. View at: Publisher Site | Google Scholar
  26. E. Cramer and A. B. Schmiedt, “Progressively type-II censored competing risks data from lomax distributions,” Computational Statistics & Data Analysis, vol. 55, no. 3, pp. 1285–1303, 2011. View at: Publisher Site | Google Scholar
  27. N. Balakrishnan and R. Aggarwala, Progressive Censoring–Theory, Methods, and Applications, Springer Science+Business Media, Berlin, Germany, 2000.
  28. A. A. Soliman, A. H. Abd Ellah, N. A. Abou-Elheggag, and G. A. Abd-Elmougod, “A simulation-based approach to the study of coefficient of variation of Gompertz distribution under progressive first-failure censoring,” Indian Journal of Pure and Applied Mathematics, vol. 42, no. 5, pp. 335–356, 2011. View at: Publisher Site | Google Scholar
  29. A. A. Soliman, A. H. Abd-Ellah, N. A. Abou-Elheggag, and G. A. Abd-Elmougod, “Estimation of the parameters of life for Gompertz distribution using progressive first-failure censored data,” Computational Statistics & Data Analysis, vol. 56, no. 8, pp. 2471–2485, 2012. View at: Publisher Site | Google Scholar

Copyright © 2021 Saad J. Almalki et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Related articles

No related content is available yet for this article.
 PDF Download Citation Citation
 Download other formatsMore
 Order printed copiesOrder

Related articles

No related content is available yet for this article.

Article of the Year Award: Outstanding research contributions of 2021, as selected by our Chief Editors. Read the winning articles.