Next Article in Journal
seq2R: An R Package to Detect Change Points in DNA Sequences
Next Article in Special Issue
Discriminating among Generalized Exponential, Weighted Exponential and Weibull Distributions
Previous Article in Journal
Magnetic Field Dynamical Regimes in a Large-Scale Low-Mode αΩ-Dynamo Model with Hereditary α-Quenching by Field Energy
Previous Article in Special Issue
Non-Parametric Conditional U-Processes for Locally Stationary Functional Random Fields under Stochastic Sampling Design
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Statistical Inference on the Entropy Measures of Gamma Distribution under Progressive Censoring: EM and MCMC Algorithms

by
Essam A. Ahmed
1,2,
Mahmoud El-Morshedy
3,4,*,
Laila A. Al-Essa
5 and
Mohamed S. Eliwa
4,6,7
1
Applied College, Taibah University, Al-Madinah Al-Munawwarah 41941, Saudi Arabia
2
Department of Mathematics, Sohag University, Sohag 82524, Egypt
3
Department of Mathematics, College of Science and Humanities in Al-Kharj, Prince Sattam bin Abdulaziz University, Al-Kharj 11942, Saudi Arabia
4
Department of Mathematics, Faculty of Science, Mansoura University, Mansoura 35516, Egypt
5
Department of Mathematical Sciences, College of Science, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
6
Department of Statistics and Operation Research, College of Science, Qassim University, Buraydah 51482, Saudi Arabia
7
Department of Mathematics, International Telematic University Uninettuno, I-00186 Rome, Italy
*
Author to whom correspondence should be addressed.
Mathematics 2023, 11(10), 2298; https://doi.org/10.3390/math11102298
Submission received: 13 April 2023 / Revised: 8 May 2023 / Accepted: 10 May 2023 / Published: 15 May 2023
(This article belongs to the Special Issue Current Developments in Theoretical and Applied Statistics)

Abstract

:
Studying the ages of mobile phones is considered one of the most important things in the recent period in the field of shopping and modern technology. In this paper, we will consider that the ages of these phones follow a gamma distribution under progressive first-failure (PFF) censoring. All of the unknown parameters, as well as Shannon and Rényi entropies, were estimated for this distribution. The maximum likelihood (ML) approach was utilized to generate point estimates for the target parameters based on the considered censoring strategy. The asymptotic confidence intervals of the ML estimators (MLEs) of the targeted parameters were produced using the normal approximation to ML and log-transformed ML. We employed the delta method to approximate the variances of the Shannon and Rényi functions to obtain their asymptotic confidence intervals. Additionally, all parameter estimates utilized in this study were determined using the successful expectation–maximization (EM) method. The Metropolis–Hastings (MH) algorithm was applied to construct the Bayes estimators and related highest posterior density (HPD) credible intervals under various loss functions. Further, the proposed methodologies were contrasted using Monte Carlo simulations. Finally, the radio transceiver dataset was analyzed to substantiate our results.

1. Introduction

Smartphones have become an essential tool in our daily lives, but they do not last forever. The best phone goes through many problems before it dies, which makes you look for a new one. Therefore, when buying a new phone, it is necessary to know how long the phone will last before it dies. In this article, we will cover the lifespan of smartphones, considering that they follow a specific distribution, and we will estimate the parameters of this distribution and some important functions, such as the entropy function of this distribution, in order to provide some information that will benefit the companies designed for these devices, as well as to support decision makers in the field of technology to improve efficiency and to extend the life of these phones. In this study, we will consider that the lifetimes of phones follow the gamma distribution.
A continuous probability distribution called gamma is used to model continuous random variables (lifetimes of phones) with skewed distributions and fixed positive values. This group of continuous probability distributions has two parameters. The gamma distribution is exemplified in particular by the exponential, Erlang, and chi-squared distributions. It is extensively applied in a variety of application areas, such as engineering, the environment, meteorology, climatology, and other physical circumstances, as well as queuing theory and reliability theory (see Lawless [1]). The probability density function (PDF) of a gamma random variable (RV) is defined as follows:
f X x ; α , β = β α Γ α x α 1 e β x ; x > 0 , α > 0 , β > 0 ,
where Γ α is the well-known gamma function defined by
Γ α = 0 x α 1 e x d x ; α > 0 ,
and the corresponding cumulative distribution function (CDF) is given by
F X x ; α , β = 1 Γ α , β x Γ α ; x > 0 , α > 0 , β > 0 ,
where Γ a , b = b t a 1 e t d t is the upper incomplete gamma function. The PDF of a gamma RV takes on a wide variety of shapes depending on the values of α , also known as the shape parameter, and β referred to as the inverse scale parameter, called a rate parameter. The hazard function shape of gamma distribution can be increased, decreased, or constant depending on α > 1 , α < 1 , or α = 1 , respectively. When α = 1 , the gamma RV becomes an exponential RV with parameter λ , and when α = n 2 , n Z and β = 1 2 , one can show that gamma RV decreases to the chi-square distribution with n degrees of freedom. Moreover, when α = n (integer), the gamma distribution is sometimes known as the Erlang distribution. In addition, the log-normal distribution is a limiting special case when α .
However, estimating the gamma parameters is still a complex issue. Recently, there have been many studies on the estimation procedure for the gamma distribution based on both complete and censored data. For instance, Son and Oh [2] proposed a Bayesian estimator using Gibbs sampling for the two-parameter gamma distribution based on a complete sample. Under the same sample, Pradhan and Kundu [3] studied the Bayes estimation and prediction of the two-parameter gamma distribution. Basak and Balakrishnan [4] considered some classical procedures to estimate the three-parameter gamma distribution using progressive Type-II samples. Bayesian inference for the capability index of the gamma distribution was developed by Almeida et al. [5]. Recently, Dey et al. [6] derived maximum likelihood and Bayes estimates of the unknown parameters of the gamma lifetime model based on progressive Type-II censoring, and also studied the problem of interval estimation.
Uncertainty about the time of death is part of the life of any product, and plays an important role in demographic and actuarial sciences. This paper analyzes death uncertainty through the concept of entropy. For more details on the concept of uncertainty and its applications, one can see Singh [7]. One way to define entropy in statistics is the expected value of the information content of a random variable. Information content, also known as subjective information or surprise, is a measure of the amount of information gained by observing the outcome of a random variable. The information content is inversely proportional to the probability of the outcome: the higher the probability of the outcome, the less information you provide; the outcome is less likely. There are several types of informational entropies. The concept of entropy was defined by Rényi [8]. For more details, see, Amigó et al. [9]. Here, we focus our attention on two of the most famous measures of entropy, namely the Shannon [10], and Rényi [8] entropies. If X is a continuous RV with PDF, say, f ( x ) , then the Shannon entropy “ShEn”, say, H S h ( f ) , is defined by
H S h ( f ) = E log f X x = X log f X x f X x d x
and the Rényi entropy “REn”, say, H R ( λ , f ) , is given by
H R ( λ , f ) = 1 1 λ ln X f X x λ d x , λ ( 1 ) > 0 .
Note that as λ tends to one, H R ( λ , f ) tends to H S h ( f ) . When X gamma ( α , β ) , the H S h ( f ) and H R ( λ , f ) can be obtained as
H S h ( f ) = α + log Γ α log β + ( 1 α ) ψ α
and
H R ( λ ) = log β + 1 1 λ log Γ λ α λ + 1 λ λ α λ + 1 Γ λ α , λ α λ + 1 > 0 and λ ( 1 ) > 0 ,
where ψ α is the digamma function, given by
ψ α = log Γ α α = 0 log α x α 1 e x d x = γ 1 α + i = 1 1 i 1 i + α ,
and γ 0.5772156649 is known as Euler’s constant. As given by Acharya et al. [11], the Renyi entropy has many applications. Estimations of the Shannon and Renyi entropies have many applications in various fields; for example, in medicine, it is used in measuring genetic diversity, measuring neural activity, detecting cardiac autonomic neuropathy (CAN) in patients with diabetes (Cornforth et al. [12]), etc. Several authors have presented the problem of estimating entropy functions for different distributions under various samples. Among them, Kang et al. [13] introduced estimators of entropy for a double exponential distribution when the samples are multiplying Type-II censored samples. Cho et al. [14] estimated the ShEn function of the Rayleigh distribution based on doubly generalized Type II hybrid censored samples. Based on generalized Type II hybrid censored samples, Cho et al. [15] derived estimators for the entropy function of a Weibull distribution. The estimated entropy for a generalized exponential distribution under record values is obtained by Chacko [16]. Liu and Gui [17] investigated the ShEn for Lomax distribution based on a generalized progressive hybrid censoring scheme. Furthermore, statistical inference on the ShEn of the inverse Weibull distribution under PFF censoring was considered by Yu et al. [18]. One of the main objectives of this research is to estimate the ShEn and REn of gamma distribution based on progressive first-failure censoring data.
Life-testing experiments are powerful tools in modern science and technology for gaining comprehensive knowledge of products. It is challenging to obtain comprehensive information about every failed unit in the life-testing experiment. The sampling process is condensed by the particular censoring method set in advance to save time and cut costs. The final sample we obtain is known as a censored sample. Censoring is a highly prevalent occurrence that has been exploited extensively in the fields of industrial engineering, biology, clinical trials, radio interference, etc. It has been shown through various life experiences that both statistical inference and cost savings can be achieved by designing a reasonably effective censoring system. The most popular censoring techniques among the numerous approaches are Type-I and Type-II with its PFF schemes. For more information see, Balakrishnan and Aggarwala [19], Wu and Kus [20], Dube et al. [21], Maurya et al. [22], and references cited therein. In the PFF censoring scheme, we randomly divide N( N = n × k ) units into n groups, with each group containing k independent units. We observe these n groups simultaneously and independently. Now, let the failure times of n × k items under the study have a continuous PDF f X ( x | θ ) and CDF F X ( x | θ ) ; the joint PDF of X 1 : m : n : k < X 2 : m : n : k < < X m : m : n : k can be formulated as
L X 1 ; m : n : k , , X m ; m : n : k θ | x 1 : m : n : k , , x m : m : n : k = A k m i = 1 m f x i ; m : n : k | θ 1 F x i ; m : n : k | θ k R i + 1 1 ,
where A = n ( n R 1 1 ) ( n R 1 R 2 1 ) ( n R 1 R 2 m + 1 ) .
In this study, we consider PFF censoring because of its good generalization behavior with other censoring plans. To the best of our knowledge, there are not any papers dealing with the estimation of the gamma distribution parameters based on PFF censoring.

2. Maximum Likelihood Estimators

This approach can be used to search the space of possible distributions and parameters. The goal of maximum-likelihood (ML) estimation is to find those parameter values of the model that maximize the probability function over the parameter space. The specific value that maximizes the probability function is called the maximum likelihood estimate. The maximum likelihood method is a mainstream method of statistical inference and can be applied to different types of distributions and models. Due to their asymptotic properties, confidence intervals (CIs) can be derived based on Fisher information matrix (FIM).

2.1. Likelihood Equations

Let X 1 ; m : n : k , X 2 ; m : n : k , , X m ; m : n : k be PFF censored samples from gamma( α , β ) distribution with censoring scheme = ( R 1 , R 2 , , R m ) , effective sample size m, number of groups n, and group size k. We use x i instead of X i ; m : n : k to simplify notation. The observed data are x ̲ = ( x 1 ; m : n : k , x 2 ; m : n : k , , x m ; m : n : k ) , and from (7), the likelihood function, say, L α , β | x ̲ , can be listed as
L α , β | x ̲ = A k m i = 1 m β α Γ α x α 1 e β x Γ α , β x Γ α k R i + 1 1 .
The log-likelihood function, say, α , β | x ̲ , can be written as
α , β | x ̲ m α log β + α 1 i = 1 m log x i β i = 1 m x i N log Γ α + i = 1 m k R i + 1 1 log Γ α , β x i ,
where N = n k . The partial derivatives of α , β | x ̲ with respect to α and β are set equal to zero to determine the MLEs of α and β . Thus, we have the following:
α , β | x ̲ α = m log β + i = 1 m log x i N ψ α + i = 1 m k R i + 1 1 φ 1 i α , β = 0
and
α , β | x ̲ β = m α β i = 1 m x i i = 1 m k R i + 1 1 φ 2 i α , β = 0 ,
where
φ 1 i α , β = log β x i + 1 Γ α , β x i G 2 , 3 3 , 0 β t 1 , 1 0 , 0 , α
and
φ 2 i α , β = log Γ α , β x i β = β α + 1 x i α e β x i Γ α , β x i ,
where ψ α = Γ α α log α 1 2 α is the digamma function and G 2 , 3 3 , 0 . is Meijer’s G-function. For the definition and properties of Meijer’s G-function, we refer to Mathai [23] and Askey [24]. Clearly, the roots of the nonlinear (10) and (11) cannot yield solutions to α and β in a closed form, so some numerical techniques, such as the Newton–Raphson (NR) method, are employed to derive the MLEs ( α ^ M L and β ^ M L ). The MLEs of the H S h ( f ) and H R ( λ ) are obtained using the invariance property of MLEs, such as
H ^ S h ( f ) = α ^ M L + log Γ α ^ M L log β ^ M L + ( 1 α ^ M L ) ψ α ^ M L
and
H ^ R ( λ ) = log β ^ M L + 1 1 λ log Γ λ α ^ M L λ + 1 λ λ α ^ M L λ + 1 Γ λ α ^ M L .

2.2. Asymptotic Confidence Intervals for MLEs

As discussed in the previous section, the MLE specifies a single value of the unknown parameter. The single value (point estimate) gives no indication as to the accuracy of the estimate, and falls short of providing the confidence placed on it. So, we have to use the interval estimate. The ACIs of α and β can be established by using the asymptotic variances of MLEs, say, V ^ a r α ^ M L and V ^ a r ( β ^ M L ) , which can be obtained from the inverse FIM. Let θ = ( α , β ) , then the FIM, say, I ( θ ) , can be written as
I ( θ ) = E 2 α , β | x ̲ 2 α 2 2 α , β | x ̲ α β 2 α , β | x ̲ α β 2 α , β | x ̲ 2 β 2 .
where
2 α , β | x ̲ 2 α 2 = N ψ ( 1 ) α + i = 1 m k R i + 1 1 Ω 1 i α , β ,
2 α , β | x ̲ α β = m β i = 1 m k R i + 1 1 Ω 2 i α , β
and
2 α , β | x ̲ 2 β 2 = m α β 2 + i = 1 m k R i + 1 1 Ω 3 α , β x i .
where ψ ( 1 ) α = 2 Γ α α 2 is the tri-gamma function. It may also be defined as the sum of the series i = 1 α + i 2 ,
Ω 1 i α , β = 2 Γ α , β x i 2 α 2 = 2 G 3 , 4 4 , 0 β x i 1 , 1 , 1 0 , 0 , 0 , α + 2 log ( β x i ) G 2 , 3 3 , 0 β x j 1 , 1 0 , 0 , α Γ α , β x i + log ( β x i ) 2 φ 1 i α , β 2 ,
Ω 2 i α , β = 2 Γ α , β x i α β = φ 2 i α , β φ 1 i α , β log ( β x i )
and
Ω 3 α , β x i = 2 Γ α , β x i β 2 = φ 2 i α , β x i α 1 φ 2 i α , β ,
where φ 1 i α , β and φ 2 i α , β are given, respectively, by (12) and (13). Let θ ^ = ( α ^ M L , β ^ M L ) be the MLEs of the parameters θ = ( α , β ) . Then, the observed FIM can be listed as
I ( θ ^ ) = 2 α , β | x ̲ 2 α 2 2 α , β | x ̲ α β 2 α , β | x ̲ α β 2 α , β | x ̲ 2 β 2 ( α , β ) = ( α ^ M L , β ^ M L ) .
Thus,
I 1 ( θ ^ ) = V ^ a r α ^ M L C ^ o v α ^ M L , β ^ M L C ^ o v α ^ M L , β ^ M L V ^ a r ( β ^ M L ) .
Therefore, the two-sided equal tail asymptotic 100 ( 1 τ ) % CIs of α and β are, respectively, given by
α ^ M L ± Z τ 2 V ^ a r α ^ M L and β ^ M L ± Z τ 2 V ^ a r ( β ^ M L ) ,
To get the approximate estimation of the variance of ShEn and REn, the delta approach can be applied. Let
D H S h = H S h ( f ) α , H S h ( f ) β α = α ^ M L , β = β ^ M L and D H R = H R ( λ ) α , H R ( λ ) β α = α ^ M L , β = β ^ M L .
Calculate the estimated variance of H ^ S h ( f ) and H ^ R ( λ ) as
V ^ a r ( H ^ S h ( f ) ) = D H S h I 1 ( α ^ M L , β ^ M L ) D H S h T and V ^ a r ( H ^ R ( λ ) ) = D H R I 1 ( α ^ M L , β ^ M L ) D H R T ,
where D T is the transpose of matrix D. Then, we obtain the 100 ( 1 τ ) % two-sided asymptotic approximate CIs for ShEn and REn, respectively, in the following forms:
H ^ S h ( f ) Z τ 2 V ^ a r ( H ^ S h ( f ) , H ^ S h ( f ) + Z τ 2 V ^ a r ( H ^ S h ( f ) )
and
H ^ R ( λ ) Z τ 2 V ^ a r ( H ^ R ( λ ) ) , H ^ R ( λ ) + Z τ 2 V ^ a r ( H ^ R ( λ ) ) .
It is well known in the literature that the approximate CIs dependent on the logarithmically transformed MLE method have the potential to provide more accurate coverage (see Meeker and Escobar [25]); consequently, in the following subsection, we will derive the approximate CIs of α , β , H S h ( f ) and H R ( λ ) based on this method, and we rely on them to provide simulation studies and numerical examples.

2.3. Asymptotic Confidence Intervals for Log-Transformed MLEs

The two-sided 100 ( 1 τ ) % log-normal approximation confidence intervals for positive parameters α and β are given by
α ^ M L exp Z ( 1 γ / 2 ) V ^ a r ( α ^ M L ) α ^ M L , α ^ M L exp Z ( 1 γ / 2 ) V ^ a r ( α ^ M L ) α ^ M L
and
β ^ M L exp Z ( 1 γ / 2 ) V ^ a r β ^ M L β ^ M L , β ^ M L exp Z ( 1 γ / 2 ) V ^ a r β ^ M L β ^ M L .
Following the same procedure, the two-sided 100 ( 1 τ ) % log-normal approximation CIs for ShEn and REn can be constructed as
H ^ S h ( f ) exp Z ( 1 τ / 2 ) V ^ a r ( H ^ S h ( f ) ) H ^ S h ( f ) , H ^ S h ( f ) exp Z ( 1 τ / 2 ) V ^ a r ( H ^ S h ( f ) ) H ^ S h ( f )
and
H ^ R ( λ ) exp Z ( 1 τ / 2 ) V ^ a r ( H ^ R ( λ ) ) H ^ R ( λ ) , H ^ R ( λ ) exp Z ( 1 τ / 2 ) V ^ a r ( H ^ R ( λ ) ) H ^ R ( λ ) ,
where V ^ a r ( H ^ S h ( f ) ) is the estimated variance of H S h ( f ) and V ^ a r ( H ^ R ( λ ) ) is the estimated variance of H R ( λ ) , which can be calculated by the delta method. In the next section, we will develop an EM algorithm for computing the MLEs of the α , β , H S h ( f ) and H R ( λ ) and their CIs.

3. Expectation–Maximization Algorithm

The EM algorithm was presented mathematically in detail by Dempster et al. [26] whereas for its application to PFF see, Ng et al. [27]. Suppose that W = ( X , Y ) consists of observable X = ( X 1 ; m : n : k , , X m ; m : n : k ) data and censored observations ( Y 1 , , Y m ) data, with Y j being a 1 × k ( R j + 1 ) 1 vector, such that Y j = ( Y j 1 , Y j 2 , , Y j k ( R j + 1 ) 1 ), j = 1 , , m . The likelihood function, say, L C W ; α , β , of the complete data is given by
L C W ; α , β i = 1 m f x i ; m : n : k | α , β i = 1 m j = 1 k R i + 1 1 f y i j | α , β β N α Γ N α i = 1 m x i α 1 i = 1 m j = 1 k R i + 1 1 y i j α 1 exp β i = 1 m x i + i = 1 m i = 1 k R i + 1 1 y i j .
The log-likelihood for the complete lifetimes of N = n k items from the two parameters gamma distribution, say, c W ; α , β , can be represented as
c W ; α , β N α log β N log Γ α + α 1 i = 1 m log x i + i = 1 m i = 1 k R i + 1 1 log y i j β i = 1 m x i + i = 1 m i = 1 k R i + 1 1 y i j .
The E-step involves the computation of the conditional expectation E ( c W ; α , β | X ) , which is equal to the pseudo s W ; α , β , defined as
s W ; α , β N α log β N log Γ α + α 1 i = 1 m log x i + i = 1 m i = 1 k R i + 1 1 E log y i j | y i j > x i β i = 1 m x i + i = 1 m i = 1 k R i + 1 1 E y i j | y i j > x i .
Then, the E-step needs the computation of E log y i j | x i and E y i j | x i , where, the conditional probability function of the censored data, given the observed data, can be obtained [24] as follows:
f Y | X ( y i j | x i , α , β ) = f ( y i j , α , β ) 1 F ( x i , α , β ) , y i j > x i , i = 1 , 2 , , m .
Given that t = x i for i = 1 , 2 , , m , the required expected values of a truncated gamma from the left at t are, respectively, given by
E log y i j | x i = ε 1 t , α , β = 1 1 F ( t , α , β ) t log z f ( z , α , β ) d z = 1 1 F ( t , α , β ) t log z β α Γ α z α 1 e β z d z = log t + 1 Γ α , β t G 2 , 3 3 , 0 β t 1 , 1 0 , 0 , α
and
E y i j | x i = ε 2 t , α , β = 1 1 F ( t , α , β ) t z f ( z , α , β ) d z = Γ α + 1 , β t β Γ α , β t .
The M-step deals with maximization of s W ; α , β with respect to α and β . Let the r t h -stage estimate of ( α , β ) be ( α ( r ) , β ( r ) ); then, next updated estimate ( α ( r + 1 ) , β ( r + 1 ) ) is obtained by maximizing the following equation:
Q α ( r ) , β ( r ) N α log β N log Γ α + α 1 i = 1 m ( k R i + 1 1 ) ε 1 x i , α ( r ) , β ( r ) + α 1 i = 1 m log x i β i = 1 m x i β i = 1 m ( k R i + 1 1 ) ε 2 x i , α ( r ) , β ( r ) .
By taking the derivatives of (30) with respect to α and β , respectively, and equating them to zero, as follows:
Q α , β α = N log β N ψ α + i = 1 m log x i + i = 1 m ( k R i + 1 1 ) ε 1 x i , α ( r ) , β ( r ) = 0
and
Q α , β β = N α β i = 1 m x i i = 1 m ( k R i + 1 1 ) ε 2 x i , α ( r ) , β ( r ) = 0 .
From (31),
log β ψ α = 1 N i = 1 m log x i + i = 1 m ( k R i + 1 1 ) ε 1 x i , α ( r ) , β ( r )
and from (33),
α β = 1 N i = 1 m x i + i = 1 m ( k R i + 1 1 ) ε 2 x i , α ( r ) , β ( r ) ,
or equivalently,
log β = log α log 1 N i = 1 m x i + i = 1 m ( k R i + 1 1 ) ε 2 x i , α ( r ) , β ( r ) .
Substituting from (34) in (33), we have
log α ψ α = log 1 N i = 1 m x i + i = 1 m ( k R i + 1 1 ) ε 2 x i , α ( r ) , β ( r ) 1 N i = 1 m log x i + i = 1 m ( k R i + 1 1 ) ε 1 x i , α ( r ) , β ( r ) .
We observe that the updated estimate α ( r + 1 ) of α can be computed from the fixed-point method, for which we solve the equation
g α = α ,
where
g α = exp ψ α + log 1 N i = 1 m x i + i = 1 m ( k R i + 1 1 ) ε 2 x i , α ( r ) , β ( r ) 1 N i = 1 m log x i + i = 1 m ( k R i + 1 1 ) ε 1 x i , α ( r ) , β ( r )
and
β ^ α = N α i = 1 m x i + i = 1 m ( k R i + 1 1 ) ε 2 x i , α ( r ) , β ( r ) 1 .
It is observed that β ( r + 1 ) can be obtained from (36). Then, ( α ( r + 1 ) , β ( r + 1 ) ) are used as the current estimates of ( α , β ) in the next iteration. The MLEs of ( α , β ) can be obtained by repeating the E-step and M-step until convergence is achieved. We stop the iterations when M a x [ α ( r + 1 ) α ( r ) + β ( r + 1 ) β ( r ) ] < , where ∈ is the tolerance limit.
According to the Corollary in McLachlan et al. [28] (page 84), the proposed EM estimator sequence converges to the unique maximizer of the log-likelihood function. Using the obtained point estimators of α , β and the invariance property of MLEs, we can derive the estimates for the ShEn and REn measures, which are given as follows:
H ^ S h E M f = α ( r + 1 ) + log Γ α ( r + 1 ) log β ( r + 1 ) + ( 1 α ( r + 1 ) ) ψ α ( r + 1 )
and
H ^ R R M λ = ln β ( r + 1 ) + 1 1 λ ln Γ λ α ( r + 1 ) λ + 1 λ λ α ( r + 1 ) λ + 1 Γ λ α ( r + 1 ) .

Fisher Information Matrix via EM Algorithm

FIM plays an important role in the statistical inference of unknown parameters.let us denote the observed, missing, and complete information by I X θ , I W | X θ , and I W θ , respectively. Using the procedure given by Louis [29], we can obtain
I X θ = I W θ I W | X θ ,
where
I W θ = E 2 θ 2 = a 11 ( α , β ) a 12 ( α , β ) a 21 ( α , β ) a 22 ( α , β )
and
I W | X j θ = E Z j | x j 2 log f Z j z j | x j , θ θ 2 = b 11 ( x j ; α , β ) b 12 ( x j ; α , β ) b 21 ( x j ; α , β ) b 22 ( x j ; α , β ) .
Furthermore, I W | X j θ stands for the FIM for a single observation, which is censored as the jth failure occurs. Over and above, we first calculate the elements of the FIM for complete information, I W θ :
a 11 ( α , β ) = E N ψ ( 1 ) α = N ψ ( 1 ) α , a 12 ( α , β ) = E N β = N β
and
a 22 ( α , β ) = E N α β 2 = N α β 2 , N = n k ,
where ψ ( 1 ) α is the first derivative of the digamma function. From (27), the expected negative values of the second partial derivatives are calculated using Mathematica 16 programming, given by
b 11 ( x j ; α , β ) = 2 Γ α , β x j G 3 , 4 4 , 0 β x j 1 , 1 , 1 0 , 0 , 0 , α G 2 , 3 3 , 0 β x j 1 , 1 0 , 0 , α 2 Γ α , β x j 2 ,
b 22 ( x j ; α , β ) = α β 2 + e 2 β x j β x j α e β x j β x j α + 1 Γ α , β x j β x j α β 2 Γ α , β x j 2
and
b 12 ( x j ; α , β ) = b 21 ( x j ; α , β ) = 1 β + e β x j G 2 , 3 3 , 0 β x j α + 1 , α + 1 α , α , 2 α β Γ α , β x j 2 .
It can be seen that all elements of the matrix I W | X j θ are functions of x j and θ . Then, the total missing information matrix can be calculated by the following expression:
I W | X θ = j = 1 m ( k R i + 1 1 ) I W | X j θ = j = 1 m ( k R i + 1 1 ) b 11 ( x j ; α , β ) i = 1 m ( k R i + 1 1 ) b 12 ( x j ; α , β ) i = 1 m ( k R i + 1 1 ) b 21 ( x j ; α , β ) i = 1 m ( k R i + 1 1 ) b 22 ( x j ; α , β ) .
Based on matrices (40) and (42), we can easily compute the observed information matrix I X θ from (39) and its inverse matrix I X 1 θ as well. Since the MLE θ ^ = ( α ^ , β ^ ) has asymptotic normality, we can write it as θ ^ N ( θ , I X 1 ( θ ^ ) ) . The corresponding 100 ( 1 τ ) % ACIs for α and β can be constructed as
α ^ ± Z τ 2 V ^ a r E M α ^ and β ^ ± Z τ 2 V ^ a r E M ( β ^ ) ,
where two elements of the main diagonal of I X 1 ( θ ^ ) are V ^ a r E M α ^ and V ^ a r E M ( β ^ ) . Then, using the delta method, we can approximate the variances of H S h ( f ) and H R ( λ ) as
V ^ a r E M ( H ^ S h ( f ) ) = D H S h I X 1 ( θ ^ ) D H S h T and V ^ a r E M ( H ^ R ( λ ) ) = D H R I X 1 ( θ ^ ) D H R T .
Furthermore, we can construct approximate CIs for H S h ( f ) and H R ( λ ) , as follows:
H ^ S h ( f ) Z τ 2 V ^ a r E M ( H ^ S h ( f ) ) , H ^ S h ( f ) + Z τ 2 V ^ a r E M ( H ^ S h ( f ) )
and
H ^ R E M ( λ ) Z τ 2 V ^ a r E M ( H ^ R ( λ ) ) , H ^ R E M ( f ) + Z τ 2 V ^ a r E M ( H ^ R ( λ ) ) .
Then, 100 ( 1 τ ) % approximate CIs for H S h ( f ) and H R ( f ) can alternatively be derived based on the logarithmic transformation method, as follows:
H ^ S h E M ( f ) exp Z ( 1 τ / 2 ) V ^ a r ( H ^ S h E M ( f ) ) H ^ S h E M ( f ) , H ^ S h E M ( f ) exp Z ( 1 τ / 2 ) V ^ a r ( H ^ S h E M ( f ) ) H ^ S h E M ( f )
and
H ^ R E M ( λ ) exp Z ( 1 τ / 2 ) V ^ a r E M ( H ^ R E M ( λ ) ) H ^ R E M ( λ ) , H ^ R E M ( λ ) exp Z ( 1 τ / 2 ) V ^ a r E M ( H ^ R E M ( λ ) ) H ^ R E M ( λ ) .

4. Bayesian Estimation

In the previous section, we obtain MLEs of the unknown parameters and uncertainty measures of the two-parameter gamma distribution when the data are progressively first-failure censored. In this section, we focus on objective Bayesian estimation of the unknown parameters α , β , H S h ( f ) , and H R ( λ ) with respect to squared error and LINEX loss functions. For this purpose, we consider informative gamma prior distributions for unknown parameters α and β , which of course contain noninformative priors within them as special cases. For more recent good references about statistical inference using the Bayes method, we would like to point out some references, including Zhuang et al. [30], Luo et al. [31], and Qin et al. [32].

4.1. Prior and Posterior Distribution

Any Bayesian estimate consists of two separate parts. The first, subjective, is the step of modeling information of a prior by adequate probability laws; it calls much more to the experience and common sense of the statistician than to mathematical considerations. The second step, objective, is the study of a posterior distribution to derive the desired estimators.
Here, we assume the independent gamma priors for the parameters α and β . Mathematically, let α gamma( a , b ) and β gamma( c , d ). Then, the joint prior distribution of α and β can be listed as
π α , β α a 1 β c 1 e b α + d β , a , b , c , d > 0 .
The hyperparameters a, b, c, d are assumed to be known, and are chosen in such a way that reflects the degree of belief about the unknown parameters. An easy way for choosing these hyperparameters is to consider the mean and the variance of the prior distributions of α , β , where the mean and variance of the gamma prior of α are a / b and a / b 2 , respectively. Further, the mean and variance of the MLEs of α for r samples are μ α = 1 r i = 1 r α ^ M L i and σ α 2 = 1 r 1 i = 1 r α ^ M L i μ α 2 , respectively. Therefore, by solving the equations a / b = μ α and a / b 2 = σ α 2 , we obtain a = μ α 2 / σ α 2 and b = μ α / σ α 2 . Similarly, other hyperparameters, c and d , can be obtained as c = μ β 2 / σ β 2 and d = μ β / σ β 2 . The joint posterior density function of the parameters α and β of the gamma model given the data can be expressed as
π * α , β | x ̲ = α a 1 β m α + c 1 e b α + d β A x Γ N α e β i = 1 m x i i = 1 m x i α 1 i = 1 m Γ α , β x i k R i + 1 1 ,
where
A x = 0 0 α a 1 β m α + c 1 e b α + d β Γ N α e β i = 1 m x i i = 1 m x i α 1 i = 1 m Γ α , β x i k R i + 1 1 d α d β .

4.2. Loss Functions

A widely used symmetric loss function is the squared error (SE). While for the asymmetric loss function, we can choose the linear exponential (LINEX), which was suggested by Varian [33]. The SE and LINEX loss functions are defined as L S E ( Θ , Θ ^ ) = ( Θ , Θ ^ ) 2 , L L I ( Θ , Θ ^ ) = exp [ v ( Θ ^ Θ ) ] v ( Θ ^ Θ ) 1 , where Θ ^ means an estimate of Θ . Let Θ take the value of α , β , H S h ( f ) , or H R ( λ ) , with π * α , β | x ̲ being the posterior distribution under the informative prior π α , β . Then, we can easily obtain the corresponding Bayesian estimates under the above loss functions in the following forms:
Θ ^ S E = E Θ Θ | x = 1 A ( x ) 0 0 Θ π * α , β | x ̲ d α d β
and
Θ ^ L I = 1 v log E Θ exp v Θ | x = 1 v log 1 A ( x ) 0 0 exp v Θ π * α , β | x ̲ d α d β ,
where E Θ means the posterior expectation under the parameter Θ . Since the denominator part A ( x ) involves multiple integrals and it is difficult to obtain the posterior densities of RVs α and β in explicit form, the Bayes estimate of Θ with respect to the SE or LINEX loss functions cannot be obtained explicitly. Thus, the Markov chain Monte Carlo (MCMC) should be applied.

4.3. Markov Chain Monte Carlo

MCMC methods provide a general solution for obtaining approximate samples from any target density. They are ubiquitous in modern statistics, especially in Bayesian fields. In Bayesian analysis, the main object of interest is the posterior distribution, which most often does not have a closed form, such as our situation. The Gibbs sampling algorithm (Geman and Geman [34]) and Metropolis–Hastings (M-H) (Hastings [35]) are among the MCMC algorithms commonly used in Bayesian estimation, and each of them needs the marginal posterior distributions to be used in the sampling method. After analyzing the posterior distribution given by (47), the full conditional posterior distributions for α and β based on the informative gamma priors are obtained, as follows:
π * α | β , x ̲ = α a 1 β m α Γ N α exp α i = 1 m log x i b + i = 1 m k R i + 1 1 log ( Γ α , β x i )
and
π * β | α , x ̲ = β m α + c 1 exp β d + i = 1 m x i + i = 1 m k R i + 1 1 log ( Γ α , β x i .
While we did not obtain the marginal distributions π * α | β , x ̲ and π * β | α , x ̲ in closed form, we cannot use the Gibbs algorithm, but rather, the Metropolis–Hasting (MH) algorithm is suitable for use in such a case to obtain the Bayesian point estimates and the highest posterior density (HPD) credible intervals of the unknown parameters α and β , as well as the entropy indexes H S h ( f ) and H R ( λ ) . A cyclic implementation of the MH sampling algorithm for obtaining approximate samples from π * proceeds according to the following steps:
Step 1:
Set initial values α 0 , and β 0 (say, MLEs of α and β ) and set J = 1 .
Step 2:
Generate α * and β * from the normal proposal distributions N α J 1 , σ α 2 and N β J 1 , σ β 2 , respectively, where σ α 2 and σ β 2 are the variances of α and β , which can be estimated from the inverse of FIM.
Step 3:
Evaluate the following acceptance probabilities:
r α = min π * α * | β J 1 , x ̲ π * α J 1 | β J 1 , x ̲ , 1 and r β = min π * β * | α J 1 , x ̲ π * β J 1 | α J 1 , x ̲ , 1 .
Step 4:
Generate samples u 1 and u 2 from uniform distribution U ( 0 , 1 ) .
Step 5:
If u 1 (acceptance probability) r α , accept the proposal and set α J = α * , else α J = α J 1 .
Step 6:
Similarly, if u 2 r β , accept the proposal and set β J = β * , else β J = β J 1 .
Step 7:
Compute the ShEn and REn indicators from (5) and (6), respectively:
H S h J ( f ) = α J + log Γ α J log β J + ( 1 α J ) ψ α J
and
H R J ( λ ) = log β J + 1 1 λ log Γ λ α J λ + 1 λ λ α J λ + 1 Γ λ α J .
Step 8:
Set J = J + 1 .
Step 9:
Repeat Steps (3–9), N M C (total number of iterations required) times to obtain MCMC samples. These are denoted as ( α 1 , β 1 , H S h 1 ( f ) , H R 1 ( λ ) ), ( α 2 , β 2 , H S h 2 ( f ) , H R 2 ( λ ) ), …, ( α N M C , β N M C , H S h N M C ( f ) , H R N M C ( λ ) ). After discarding the first M number of burn-in samples, the remaining N M C M samples are used to obtain the Bayesian estimates of α , β , H S h ( f ) , and H R ( λ ) , where the Bayes estimate of Θ = ( α , β , H S h ( f ) , H R ( λ ) ) under the SE and LINEX loss functions can now be computed as
Θ ^ B S = 1 N M C M j = M + 1 N M C Θ j , Θ ^ L I = 1 N M C M j = M + 1 N M C e v Θ j .
Step 10:
Order Θ ( M + 1 ) , Θ ( M + 2 ) , …, Θ ( N M C ) as Θ ( 1 ) < Θ ( 2 ) < < Θ ( N M C M ) . Then, the 100 ( 1 α ) % Bayesian credible interval of Θ is given by ( Θ ( N M C M ) α / 2 , Θ ( N M C M ) 1 α / 2 ) , where [ q ] denotes the integer portion of q. Therefore, the HPD (the shortest interval among all of the Bayesian credible intervals) of Θ can be constructed.

5. Radio Transceiver Data

The data used here were first provided by Aitkin [36] in 2022. They contain phone lifetimes in hours. The considered data were obtained from the study of the operating lifetimes of field telephones (radio transceivers) operating under industry conditions, which examined the lifetimes of a sample of 88 telephones, all of which were the same make and type. The aim of the study was to create a cleaning and maintenance program for phones to reduce the possibility of them breaking down and becoming unusable. According to this study, the phones were used by workers on eight-hour shifts. The number of shifts during which the telephones were operating correctly was recorded for each of the phones in the study. The telephones were switched off at the end of a shift, placed in the battery charger, and switched on again at the beginning of the next shift. Some telephones failed to switch on correctly at the beginning of a shift; others failed during a shift. The lifetimes of the 88 phones were recorded as 8, 16, 16, 16, 16, 32, 32, 40, 40, 40, 40, 56, 56, 56, 60, 64, 72, 72, 72, 72, 72, 80, 80, 80, 80, 96, 96, 104, 108, 112, 112, 114, 120, 128, 136, 152, 152, 152, 156, 160, 168, 168, 168, 168, 168, 176, 184, 184, 184, 194, 208, 208, 216, 224, 224, 224, 224, 232, 240, 246, 256, 264, 264, 272, 280, 288, 304, 308, 328, 328, 340, 352, 358, 360, 384, 392, 400, 424, 438, 448, 464, 480, 536, 552, 576, 608, 656, 716. To check whether the gamma distribution is an appropriate statistical distribution to fit the lifetime data set or not, the MLEs of the gamma parameters α and β were calculated. Moreover, various criteria, such as the negative log-likelihood function “ l n L ”, Akaike information criterion “ A I C = 2 × d ln L d x 1 , , x N | θ ”, Bayesian information criterion “ B I C = d × ln N 2 ln L d x 1 , , x N | θ ”, and Kolmogorov–Smirnov (K-S) statistics, were applied to test the goodness of fit of the model with its corresponding p-value, where θ is a parameter vector, d is the number of parameters in the fitted model, ln L d is evaluated at the MLEs, and N is the number of observed values. The numerical values of the MLEs, l n L , AIC, BIC, K-S, and p-values for the complete data set were computed as α ^ = 1.5383 , β ^ = 0.007298 , l n L = 554.506 , AIC = 1113.01 , BIC = 1117.97 , K-S = 0.0597 , and p-value = 0.9121 . We can see that the gamma distribution shows a good fit for the data set, and we do not reject the hypothesis that the data come from gamma distribution at significance levels of 0.05 because of the high p-value. In support of that, the fitting of the gamma model was examined using graphical fitting (Figure 1) techniques, including (i) a fitted gamma PDF, (ii) a probability–probability plot, (iii) a quantile–quantile plot, and (iv) an empirical and fitted gamma CDF. This figure proves again that the gamma distribution is a suitable lifetime model to fit considered data. Hence, we may use our model to analyze this data.
Before creating PFF censored samples, we would like to provide an initial idea of the different estimators based on the complete data ( n = m = 50 , k = 1 ). First, based on the complete data, the MLEs of the α , β , H S h ( f ) , and H R ( λ = 0.5 ) are calculated and provided in Table 1. When dealing with full data, the MLEs were calculated using both the NR and EM algorithms, and we discovered that the values are identical. Thus, the results are only provided once in Table 1 to avoid repetition. Similar reasoning can be applied to the MLEs’ approximated 95% CIs. Figure 2 gives a likelihood function surface plot for a two-parameter gamma distribution. Figure 3 gives the contour plot of the profile log-likelihood parameters α and β . It reveals that the maximum value is attained at ( α ^ , β ^ ) = ( 1.538 , 0.0073 ) . Furthermore, we depict the graphs of parameter profile versus log-likelihood function in Figure 4. From these graphs, we can say that the estimated ML can be calculated uniquely, or equivalently, the log-likelihood for this data is maximized when α = 1.538 and β = 0.0073 .
For Bayesian estimation, given by Section 4, we cannot obtain the informative priors, so all Bayesian estimates are obtained here based on the noninformative prior (NIP) ( a = b = c = d = 0 ). Using the MH algorithm described in Section 4.3, we generate 60 , 000 MCMC samples and discard the first 10 , 000 samples as burn-in. To run the MCMC algorithm, the ML estimates of α , and β are taken to be the initial guesses. Under SE and LINEX loss functions (with v = ± 2 ), the Bayesian MCMC estimates and associated 95% credible intervals of α , β , H S h ( f ) , and H R ( λ = 0.5 ) using both of the noninformative priors are computed and presented in Table 1. From Table 1, we can see both the MLE and the Bayes estimates of α , β , H S h ( f ) , and H R ( λ = 0.5 ) are relatively close. We considered a convergence diagnostic criterion proposed by Geweke [37] to confirm the convergences of chains generated via MCMC, assuming a 95% confidence level. This graph allows us to confirm the convergence of the chain. Trace plots based on 60,000 chain values of α , β , H S h ( f ) , and H R ( λ = 0.5 ) are provided in Figure 5 to demonstrate how well the simulated MCMC samples approximate. Each trace plot displays the sample’s arithmetic mean (represented by a dashed horizontal line) and its 95% HPD intervals (represented by a solid horizontal line). It shows that the MCMC method based on the remaining 60,000 variates converges successfully, and that using the first 10,000 samples as burn-in is suitable from a size point of view to eliminate the influence of the initial values. The histograms for the parameter estimates based on 60,000 chain values and the Gaussian kernel are also shown in Figure 6. The estimates unequivocally demonstrate that each and every one of the generated posteriors is symmetric with respect to the theoretical posterior density functions. The estimates clearly indicate that all of the generated posteriors are symmetric with respect to the theoretical posterior density functions.
In our next step, we randomly partition the given data into n = 44 groups with k = 2 independent items inside each group in order to analyze this data set using PFF censored samples. Thereafter, the following first-failure censored data are obtained: 8, 16, 16, 32, 40, 40, 56, 60, 72, 72, 72, 80, 80, 96, 108, 112, 120, 136, 152, 156, 168, 168, 168, 184, 184, 208, 216, 224, 224, 240, 256, 264, 280, 304, 328, 340, 358, 384, 400, 438, 464, 536, 576, 656. Next, we generate PFF censored samples using three different censoring schemes from the above first-failure censored sample with m = 30 . The different censoring schemes and the corresponding PFF censored samples are presented in Table 2. As was presented above for the complete sample, the estimates of ML and Bayes were calculated, and the numerical results are presented in Table 3. Moreover, the estimates of α , β , H S h ( f ) , and H R ( λ ) based on EM algorithm were calculated and added to the table because they differ from the estimates calculated by NR in the case of censored samples data.
Tabulated values show that the various estimations are reasonably close to one another. Moreover, for α , β , and H R ( λ = 0.5 ) , the Bayes estimation based on NIP has good behavior when compared to the other intervals in terms of interval lengths. In the cases of CS1 and CS2, we discover that the MLE of H S h ( f ) based on the EM algorithm is the best estimate, whereas in the case of CS3, we find that the Bayes estimation based on the NIP prior is the best. Table 4 shows the effect of parameter v on the Bayes estimates, whereas in the case of negative values, we noticed that there was an increase in the values of the estimates from those calculated by the SE loss function, and vice versa in the case of the positive value. Practically, it is not possible to compare the methods presented in this paper with one sample, so we will present a simulation study in the next section.

6. Simulation Study

The proposed estimates of the entropy functions provided by (3) and (4), as well as the unknown parameters of the gamma distribution, are compared numerically in this section. Based on their average biases and mean squared errors (MSE), the MLEs and Bayes estimates are compared. On the other hand, for the interval estimates, we contrast them in light of their average lengths. For this aim, each simulation uses N s = 1000 PFF censored samples. The following steps were used to simulate a PFF-censored sample from the gamma distribution with parameters α and β for given values of n, m, k, and a progressive censoring scheme R = ( R 1 , , R m ) :
(1)
Create a random sample of size m from standard uniform distribution, denoted by W 1 , , W m .
(2)
Set V i = W i 1 / a i for i = 1 , , m where a i = i + j = m i + 1 m R j .
(3)
Set U i : m : n R = 1 j = m i + 1 m V i for i = 1 , , m . Thus, ( U 1 : m : n R , , U m : m : n R ) is a progressively Type-II censored sample from standard uniform distribution.
(4)
Set Z i : m : n : k R = 1 ( 1 U i : m : n R ) 1 / k for i = 1 , , m . The data set ( Z 1 : m : n : k R , , Z m : m : n : k R ) is a progressively first-failure censored sample from standard uniform distribution.
(5)
Finally, set X 1 : m : n : k R = F 1 Z i : m : n : k R with i = 1 , , m , and hence, the required progressively first-failure censored sample is ( X 1 : m : n : k R , , X m : m : n : k R ).
Three different sample sizes, n = 20 , 30 , and 50, as well as four failure sample sizes, m = 15 , 25 , and 40, were used in this study. Using different censoring schemes, we first derived progressively first-failure type-II censored samples that follow the gamma distribution with α = 0.6 and β = 1.5 . Then, we calculated the MLEs of α , β , H S h ( f ) , and H R ( λ ) based on the NR method, using (10)–(15). Next, according to (35)–(38), the EM algorithm was applied to compute the MLEs. To compute the Bayes estimates based on the NIP and informative prior of α and β , using the MH algorithm, we ran the iterative process up to N M C = 11,000 iterations by discarding the first M = 1000 iterations as a burn-in period. For the informative prior, the values of the hyperparameters were taken as a = 2.25 , b = 1.5 , c = 5.0 , and d = 5.0 . Moreover, the Bayes estimates with respect to the LINEX loss function were computed for the values of v = 2.0 and v = + 2.0 . Recall that the notation ( 0 3 , 2 ) used in the tables expresses the censoring scheme ( 0 , 0 , 0 , 2 ). The average bias values (in the first row) and the MSEs (in the second row) of the MLEs and Bayes estimates are presented in Table 5, Table 6, Table 7, Table 8 and Table 9. The bias and mean-squared errors (MSEs) of the estimates were computed using the following formula:
b i a s = 1 N s i = 1 N s Θ ^ l i Θ l , and M S E = 1 N s i = 1 N s Θ ^ l i Θ l 2 , l = 1 , 2 , 3 , 4 .
For the problem under study, Θ 1 = α , Θ 2 = β , Θ 3 = H S h ( f ) , Θ 4 = H R ( λ ) , and N = 1000 .
Besides the point estimates, log-transformed MLEs, EM, and Bayesian methods were used to obtain the 95% confidence/credible intervals for α , β , H S h ( f ) , and H R ( λ = 0.25 ) . Table 9 and Table 10 give the average lengths (ALs) and coverage probabilities (CPs) of the resulting intervals of α , β , H S h ( f ) , and H R ( λ = 0.25 ) with k = 1 , 2 , respectively. In general, we notice from Table 6, Table 7, Table 8 and Table 9 that the Bayes estimates have superior performance compared to the MLEs in terms of the MSEs. For the case of the LINEX loss function, the Bayes estimate of α and β seems to be a reasonable choice when v = 2 . However, the best choice of H S h ( f ) , and H R ( λ = 0.25 ) is when v = 2 . Additionally, it was found that the Bayes estimates derived using the informative prior (IP) perform better in terms of MSEs than those acquired using the NIP. Furthermore, the average biases and MSEs both tend to decrease with increasing effective sampling sizes. As a result, increasing the sample size generally yields better-estimating results. Moreover, in most cases considered, the MSEs of all estimates decrease as k increases, while n and m remain fixed. The ALs of the NIP are also longer than IP ALs. Then, the IP outperforms the NIP. Table 9 and Table 10 show that for all censoring schemes, the EM technique produces more precise confidence intervals than NR intervals. Comparing all three methods, it is evident that Bayes credible intervals have the best average lengths. Then, the Bayes approach is more suited to obtaining the confidence intervals of α , β , H S h ( f ) , and H R ( λ ) . Additionally, compared to the IP, the NIP ALs have greater lengths. Then, the IP outperforms the NIP. Finally, it can be noted that all average interval lengths decrease when the effective sample sizes increase. Moreover, it was observed that the CPs of the asymptotic and credible intervals of α , β , H S h ( f ) , and H R ( λ = 0.25 ) were all close to the desired level of 0.95.

7. Conclusions

To date, many mindsets have developed different methods of information measurement to explore information in a hazy environment, and researchers are still working hard to develop such information measures that are more reliable, accurate, and reasonably useful with current measurement techniques. One of these methods is the study of entropy functions. In this paper, the entropy of the gamma distribution was investigated and estimated by the classical and Bayesian approach. When the provided data are progressively first-failure Type-II censored, the point and interval estimations of the unknown gamma distribution parameters are produced using the maximum likelihood and Bayesian estimations. The MLEs of the model parameters and entropy indices were created here using the NR and EM processes. To construct CIs for the unknown parameters and entropy indexes, the log transformation method was developed. It was found that this approach is better than the direct asymptotic normal technique. The EM algorithm is also considered to derive the interval estimates of the unknown parameters as well as the Shannon and Rényi entropies. Meanwhile, CIs for entropy indexes have also been provided, along with the delta technique. The EM estimates have the smallest root MSE and interval lengths when compared with those based on the NR method. We also considered the Bayes estimates of the unknowns and associated credible intervals. The Bayesian estimates were obtained using the MCMC method based on both symmetric and asymmetric loss functions, including the squared error and LINEX loss functions. The effectiveness of the various proposed estimators was assessed and contrasted using Monte Carlo simulations and a real-world application case. The Bayesian estimates with informative prior under LINEX loss function are the best among all estimates, according to the simulation analysis in this paper. In addition, when compared to alternative CIs, the Bayes credible intervals consistently have the lowest interval length.
The feature of the proposed work makes it easier for decision makers to deal with the ambiguity that arises due to neutral variables in complex cases, as well as in the case of censored data. Although many studies have theoretically investigated the properties of the gamma distribution, there is still a serious lack of statistical tools dedicated to facilitating their practical applications to be studied in the future, such as predictions and accelerated life tests. In this paper, very important and recent applied data (radio transceiver data) that had not been used before in statistical inference were used, and we expect that these data will be used in many research papers in the near future in the field of various life tests and statistical predictions. The following issue may be a topic for further investigation in the next paper:
“Objective Bayesian analysis for the differential entropy of the two parameter Gamma distribution based on progressively type-II censored samples: Informative and non-informative priors”.

Author Contributions

Conceptualization, E.A.A. and M.S.E.; methodology, M.E.-M. and L.A.A.-E.; software, E.A.A. and M.E.-M.; validation, L.A.A.-E.; formal analysis, E.A.A. and M.S.E.; investigation, M.E.-M.; resources, L.A.A.-E.; data curation, M.E.-M., L.A.A.-E. and M.S.E.; writing—original draft preparation, E.A.A. and M.S.E.; writing—review and editing, M.S.E., M.E.-M. and E.A.A.; visualization, M.E.-M., M.S.E. and E.A.A. All authors have read and agreed to the published version of the manuscript.

Funding

Princess Nourah bint Abdulrahman University Researchers Supporting Project and Prince Sattam bin Abdulaziz Universities under project numbers (PNURSP2023R443) and (PSAU/2023/R/1444), respectively.

Data Availability Statement

The data sets are available in the article.

Acknowledgments

Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2023R443), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia. This study is supported via funding from Prince Sattam bin Abdulaziz University, project number (PSAU/2023/R/1444).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Lawless, J.F. Statistical Models and Methods for Lifetime Data; John Wiley & Sons: Hoboken, NJ, USA, 2011. [Google Scholar]
  2. Son, Y.S.; Oh, M. Bayesian estimation of the two-parameter Gamma distribution. Commun. Stat. Simul. Comput. 2006, 35, 285–293. [Google Scholar] [CrossRef]
  3. Pradhan, B.; Kundu, D. Bayes estimation and prediction of the two-parameter gamma distribution. J. Stat. Simul. 2011, 81, 1187–1198. [Google Scholar] [CrossRef]
  4. Basak, I.; Balakrishnan, N. Estimation for the three-parameter gamma distribution based on progressively censored data. Stat. Methodol. 2012, 9, 305–319. [Google Scholar] [CrossRef]
  5. de Almeida, M.H.; Ramos, P.L.; Rao, G.S.; Moala, F.A. Objective Bayesian inference for the capability index of the Gamma distribution. Qual. Reliab. Eng. Int. 2021, 37, 2235–2247. [Google Scholar] [CrossRef]
  6. Dey, S.; Elshahhat, A.; Nassar, M. Analysis of progressive type-II censored gamma distribution. Comput. Stat. 2023, 38, 481–508. [Google Scholar] [CrossRef]
  7. Singh, V.P. Entropy Theory and Its Application in Environmental and Water Engineering; John Wiley & Sons: Hoboken, NJ, USA, 2013. [Google Scholar]
  8. Rényi, A. On measures of entropy and information. In Proceedings of the Fourth Berkeley Symposium on Mathematical Statistics and Probability, Volume 1: Contributions to the Theory of Statistics, Davis, CA, USA, 30 June–30 July 1960; University of California Press: Oakland, CA, USA, 1961; Volume 4, pp. 547–562. [Google Scholar]
  9. Amigó, J.M.; Balogh, S.G.; Hernández, S. A brief review of generalized entropies. Entropy 2018, 20, 813. [Google Scholar] [CrossRef]
  10. Shannon, C.E. A mathematical theory of communication. Bell Syst. Tech. J. 1948, 27, 379–423. [Google Scholar] [CrossRef]
  11. Acharya, J.; Orlitsky, A.; Suresh, A.T.; Tyagi, H. Estimating Rényi entropy of discrete distributions. IEEE Trans. Inf. Theory 2016, 63, 38–56. [Google Scholar] [CrossRef]
  12. Cornforth, D.J.; Tarvainen, M.P.; Jelinek, H.F. Using renyi entropy to detect early cardiac autonomic neuropathy. In Proceedings of the 2013 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), Osaka, Japan, 3–7 July 2013; IEEE: Piscataway, NJ, USA; pp. 5562–5565. [Google Scholar]
  13. Kang, S.B.; Cho, Y.S.; Han, J.T.; Kim, J. An estimation of the entropy for a double exponential distribution based on multiply Type-II censored samples. Entropy 2012, 14, 161–173. [Google Scholar] [CrossRef]
  14. Cho, Y.; Sun, H.; Lee, K. An estimation of the entropy for a Rayleigh distribution based on doubly-generalized Type-II hybrid censored samples. Entropy 2014, 16, 3655–3669. [Google Scholar] [CrossRef]
  15. Cho, Y.; Sun, H.; Lee, K. Estimating the entropy of a Weibull distribution under generalized progressive hybrid censoring. Entropy 2015, 17, 102–122. [Google Scholar] [CrossRef]
  16. Chacko, M. Estimation of entropy for generalized exponential distribution based on record values. J. Indian Soc. Probab. Stat. 2018, 19, 79–96. [Google Scholar] [CrossRef]
  17. Liu, S.; Gui, W. Estimating the entropy for Lomax distribution based on generalized progressively hybrid censoring. Symmetry 2019, 11, 1219. [Google Scholar] [CrossRef]
  18. Yu, J.; Gui, W.; Shan, Y. Statistical inference on the Shannon entropy of inverse Weibull distribution under the progressive first-failure censoring. Entropy 2019, 21, 1209. [Google Scholar] [CrossRef]
  19. Balakrishnan, N.; Aggarwala, R. Progressive Censoring: Theory, Methods, and Applications; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2000. [Google Scholar]
  20. Wu, S.J.; Kuş, C. On estimation based on progressive first-failure-censored sampling. Comput. Stat. Data Anal. 2009, 53, 3659–3670. [Google Scholar] [CrossRef]
  21. Dube, M.; Krishna, H.; Garg, R. Generalized inverted exponential distribution under progressive first-failure censoring. J. Stat. Comput. Simul. 2016, 86, 1095–1114. [Google Scholar] [CrossRef]
  22. Maurya, R.K.; Tripathi, Y.M.; Rastogi, M.K. Estimation and prediction for a progressively first-failure censored inverted exponentiated Rayleigh distribution. J. Stat. Theory Pract. 2019, 13, 1–48. [Google Scholar] [CrossRef]
  23. Mathai, A.M. A Handbook of Generalized Special Functions for Statistical and Physical Sciences; Oxford University Press: New York, NY, USA, 1993. [Google Scholar]
  24. Askey, R.A.; Daalhuis, A.B.O. Generalized Hypergeometric Functions and Meijer G-Function; Cambridge University Press: Cambridge, UK, 2010. [Google Scholar]
  25. Meeker, W.Q.; Escobar, L.A. Statistical Methods for Reliability Data; John Wiley and Sons, Inc.: Hoboken, NJ, USA, 1998. [Google Scholar]
  26. Dempster, A.P.; Laird, N.M.; Rubin, D.B. Maximum likelihood from incomplete data via the EM algorithm. J. R. Stat. Soc. Ser. B (Methodol.) 1977, 39, 1–22. [Google Scholar]
  27. Ng, H.K.T.; Chan, P.S.; Balakrishnan, N. Estimation of parameters from progressively censored data using EM algorithm. Comput. Stat. Data Anal. 2002, 39, 371–386. [Google Scholar] [CrossRef]
  28. McLachlan, G.J.; Krishnan, T. The EM Algorithm and Extensions; John Wiley & Sons: Hoboken, NJ, USA, 2007. [Google Scholar]
  29. Louis, T.A. Finding the observed information matrix when using the EM algorithm. J. R. Stat. Ser. B (Methodol.) 1982, 44, 226–233. [Google Scholar]
  30. Zhuang, L.; Xu, A.; Wang, X. A prognostic driven predictive maintenance framework based on Bayesian deep learning. Reliab. Eng. Syst. Saf. 2023, 234, 109181. [Google Scholar] [CrossRef]
  31. Luo, C.; Shen, L.; Xu, A. Modelling and estimation of system reliability under dynamic operating environments and lifetime ordering constraints. Reliab. Eng. Syst. Saf. 2022, 218, 108136. [Google Scholar] [CrossRef]
  32. Qin, S.; Wang, B.; Wu, W.; Ma, C. The prediction intervals of remaining useful life based on constant stress accelerated life test data. Eur. J. Oper. Res. 2022, 301, 47–755. [Google Scholar] [CrossRef]
  33. Varian, H.R. A Bayesian approach to real estate assessment. In Studies in Bayesian Econometric and Statistics in Honor of Leonard J; Savage: Brule, WI, USA, 1975; pp. 195–208. [Google Scholar]
  34. Geman, S.; Geman, D. Stochastic relaxation, Gibbs distributions, and the Bayesian restoration of images. IEEE Trans. Pattern Anal. Mach. Intell. 1984, PAMI-6, 721–741. [Google Scholar] [CrossRef] [PubMed]
  35. Hastings, W.K. Monte Carlo sampling methods using Markov chains and their applications. Biometrika 1970, 57, 97–109. [Google Scholar] [CrossRef]
  36. Aitkin, M. Introduction to Statistical Modelling and Inference; CRC Press: Boca Raton, FL, USA, 2022. [Google Scholar]
  37. Geweke, J.F. Evaluating the Accuracy of Sampling-Based Approaches to the Calculation of Posterior Moments (No. 148); Federal Reserve Bank of Minneapolis: Minneapolis, MN, USA, 1991. [Google Scholar]
Figure 1. Parametric and nonparametric plots of radio transceiver data.
Figure 1. Parametric and nonparametric plots of radio transceiver data.
Mathematics 11 02298 g001
Figure 2. The 3D plot of the observed log-likelihood function of radio transceiver data.
Figure 2. The 3D plot of the observed log-likelihood function of radio transceiver data.
Mathematics 11 02298 g002
Figure 3. Contour plot of the log-likelihood function for two parameters α , β under radio transceiver data.
Figure 3. Contour plot of the log-likelihood function for two parameters α , β under radio transceiver data.
Mathematics 11 02298 g003
Figure 4. The profile log-likelihood functions for each parameter. The vertical lines signify the MLEs α ^ = 1.538 and β ^ = 0.0073 . (a) The profile log-likelihood for α ; (b) the profile log-likelihood for β .
Figure 4. The profile log-likelihood functions for each parameter. The vertical lines signify the MLEs α ^ = 1.538 and β ^ = 0.0073 . (a) The profile log-likelihood for α ; (b) the profile log-likelihood for β .
Mathematics 11 02298 g004
Figure 5. Trace MCMC plots for radio transceiver data.
Figure 5. Trace MCMC plots for radio transceiver data.
Mathematics 11 02298 g005
Figure 6. Histograms with estimated kernel density of α , β , H S h ( f ) , and H R ( λ ) under radio transceiver data.
Figure 6. Histograms with estimated kernel density of α , β , H S h ( f ) , and H R ( λ ) under radio transceiver data.
Mathematics 11 02298 g006
Table 1. Point and 95% confidence interval estimates of α , β , H S h ( f ) , and H R ( λ = 0.5 ) .
Table 1. Point and 95% confidence interval estimates of α , β , H S h ( f ) , and H R ( λ = 0.5 ) .
Parameter α β
MethodLoss FunctionEstimateLowerUpperLengthEstimateLowerUpperLength
MLE 1.53831.17492.01410.83920.00730.00530.01000.0047
BayesSEL1.53021.14711.97560.82850.00730.00520.00980.0046
LINEX ( v = 2 )1.5764 0.0073
LINEX ( v = + 2 )1.4881 0.0073
Entropy H S h ( f ) H R ( λ = 0.5 )
MLE 6.30126.12606.48150.35557.27506.92667.64090.7144
BayesSEL6.30406.13236.48880.35657.25486.87807.58450.7065
LINEX ( v = 2 )6.3124 7.2862
LINEX ( v = + 2 )6.2958 7.2208
Table 2. PFF censored samples under the given censoring schemes when k = 2 , n = 44 , m = 30 .
Table 2. PFF censored samples under the given censoring schemes when k = 2 , n = 44 , m = 30 .
Censoring SchemePFF Censored Samples
CS1 = (14, 0 29 )8, 16, 16, 32, 40, 40, 56, 72, 72, 72, 80, 96, 108, 112, 136, 152, 168,
168, 184, 216, 224, 240, 256, 264, 280, 304, 340, 358, 384, 438.
CS2 = (2, 0 5 , 2, 0 5 , 1, 0 7 )8, 16, 16, 32, 40, 56, 72, 80, 80, 96, 108, 112, 120, 152, 156, 168, 184,
184, 208, 216, 224, 256, 264, 280, 328, 340, 384, 400, 438, 536
CS3 = (0 29 , 14)8, 16, 16, 32, 40, 40, 56, 60, 72, 72, 72, 80, 80, 96, 108, 112, 120, 136,
152, 156, 168, 168, 168, 184, 184, 208, 216, 224, 224, 240.
Table 3. Point and interval estimates of α , β , H S h ( f ) , and H R ( λ = 0.5 ) from the real data.
Table 3. Point and interval estimates of α , β , H S h ( f ) , and H R ( λ = 0.5 ) from the real data.
Parameter α β
Method SchemaEstimateLowerUpperLengthEstimateLowerUpperLength
MLENRCs11.443130.981682.121491.139810.004960.002760.008900.00614
Cs21.460650.992162.150351.158190.003580.001910.006730.00482
Cs31.376900.913082.076331.163250.003710.001830.007500.00567
EMCs11.445470.983082.125341.142260.004980.002770.008930.00616
Cs21.463990.994162.155861.161700.003600.001920.006760.00484
Cs31.381160.915462.083781.168320.003730.001840.007550.00571
BayesSELCs11.543100.935422.911911.976490.005450.002390.012130.00974
Cs21.433200.974542.087551.113010.003480.001680.006300.00462
Cs31.344350.869971.907461.037490.003600.001550.006200.00465
Entropy H S h ( f ) H R ( λ = 0.5 )
MLENRCs16.636346.298106.992750.694657.521567.089097.980400.89131
Cs26.970806.604857.357020.752177.872837.481858.284240.80239
Cs36.888606.484347.318080.833747.708217.322438.114320.79189
EMCs16.634346.296226.990630.694417.521827.089557.980450.89090
Cs26.967896.602087.353980.751907.873117.482448.284170.80173
Cs36.884806.480647.314150.833517.708737.323218.114550.79134
BayesSELCs16.631016.213447.069220.855787.540587.043897.941380.89749
Cs27.012536.645727.431730.786017.860927.463508.213970.75047
Cs36.931076.562977.384940.821977.691297.267218.057650.79044
Table 4. Bayes estimates under LINEX loss function of α , β , H S h ( f ) , and H R ( λ = 0.5 ) .
Table 4. Bayes estimates under LINEX loss function of α , β , H S h ( f ) , and H R ( λ = 0.5 ) .
Scheme α β H Sh ( f ) H R ( λ = 0.5 )
v = 2 Cs12.455030.0054606.755407.65798
Cs21.678470.0034857.069247.94963
Cs31.544190.0036066.996357.78387
v = + 2 Cs11.281810.0054406.525377.38995
Cs21.280981.2809806.924197.75558
Cs31.188430.0035986.834547.57856
Table 5. Average biases (first row) and MSEs (second row) of α when α = 1.5 and β = 1.0 .
Table 5. Average biases (first row) and MSEs (second row) of α when α = 1.5 and β = 1.0 .
k = 1 MLEBayes under SE LFBayes Estimates under LINEX LF
v = 2.0 v = 2.0
(n,m)SchemeNREMNIPIPNIPIPNIPIP
( 30 , 16 ) ( 16 , 0 * 15 ) 0.4126370.4122320.1886420.1744760.2093250.1885210.1803070.171575
0.3493730.349160.0576310.0484930.0731090.0586380.0504230.045174
( 0 * 13 , 16 , 0 * 2 ) 0.4743860.4726990.1582110.1505840.1698790.1568880.1565060.152586
0.4785040.4771890.0417750.0366820.0500480.0417030.0385170.035809
( 0 * 15 , 16 ) 0.4855020.4841350.1593660.1489910.1745600.1582570.1539840.147972
0.5357460.5343180.0403050.0348620.0489440.0401990.0367910.033704
( 30 , 25 ) ( 5 , 0 * 24 ) 0.3432230.3431230.1645890.1575040.1747130.1641630.1613520.157501
0.2206980.2206700.0439140.0397510.0505180.0442940.0411170.03859
( 0 * 4 , 5 , 0 * 20 ) 0.3495210.3495400.1628240.1558480.1721430.1622510.1593140.154365
0.2393610.2393470.0414150.0373440.0477840.0418220.0385170.035973
( 0 * 24 , 5 ) 0.3792320.3791030.1549320.1485350.1629510.1537740.1520490.148169
0.2865600.2864280.0379990.0344630.0435370.0382530.0356420.033479
( 60 , 35 ) ( 25 , 0 * 34 ) 0.2454390.2451160.1290870.1253570.1348620.1291770.1274780.125676
0.1116970.1115710.0273470.0254410.0305370.0277410.0258730.024718
( 0 * 24 , 25 , 0 * 35 ) 0.2709590.2701250.1149760.1114740.1199660.1149110.1127330.110562
0.1258650.1254450.0215080.0200650.0235770.0215380.0204710.019577
( 0 * 34 , 25 ) 0.2889380.2877220.1157140.1116340.1214960.1158850.1129690.110111
0.1511410.1505070.0214350.0197030.0237090.0214530.0201250.018942
( 60 , 50 ) ( 10 , 0 * 49 ) 0.2322880.2322510.1129700.1092360.1185910.1135780.1097820.107324
0.0951160.0950940.0202440.0188070.0224540.0205230.0189880.017992
( 0 * 9 , 10 , 0 * 40 ) 0.2186450.2186260.1108940.1074420.1163800.1118670.1077180.105421
0.0867690.0867560.0191270.0179440.0209890.0193930.0181130.017283
( 0 * 49 , 10 ) 0.2313420.2312190.1052530.1028780.1091030.1055410.1038490.102602
0.0938560.0937760.0177980.0168670.0192900.0179770.0170290.016473
( 100 , 80 ) ( 20 , 0 * 79 ) 0.1745250.174450.0880670.0869130.0895560.0878450.0879340.087392
0.0509000.050870.0126780.0121740.0132760.0126030.0124280.012084
( 0 * 19 , 20 , 0 * 60 ) 0.1679750.1679080.0885690.0873820.0899920.0882380.0881560.087368
0.0469180.0469030.0120930.0116770.0125370.0119980.0119190.011634
( 0 * 79 , 20 ) 0.1672680.1669120.0792630.0777970.0809700.0789990.0786410.077602
0.0464770.0463940.0099830.0095810.0104510.0099030.0097960.009521
k = 2
( 30 , 16 ) ( 16 , 0 * 15 ) 0.3693830.3687080.1585260.1475020.1740510.1576610.1514300.144355
0.2717270.2705910.0404330.0343880.0493610.0402330.0355420.032098
( 0 * 13 , 16 , 0 * 2 ) 0.4183690.4166820.1355390.1249520.1483170.1340800.1279360.120555
0.3731920.3691990.0287920.0243390.0348800.0281300.0258890.022993
( 0 * 15 , 16 ) 0.4749620.4699110.1332410.1236470.1463870.1312800.1273740.121860
0.4896780.4836860.0279480.0238370.0338250.0273450.0252470.022772
( 30 , 25 ) ( 5 , 0 * 24 ) 0.3012050.3007230.1262950.1202350.1342320.1257310.1221840.118361
0.1652830.1646390.0255040.0229690.0292380.0255510.0236550.022057
( 0 * 4 , 5 , 0 * 20 ) 0.3325980.3320460.1311070.1239710.1407150.1312480.1254720.120389
0.2168520.2161100.0282090.0250960.0326340.0283290.0256450.023482
( 0 * 24 , 5 ) 0.3355330.3343000.1236070.1173770.1311470.1225090.1201430.115812
0.2133750.2121970.0242850.0217170.0277460.0239820.0226400.020919
( 60 , 35 ) ( 25 , 0 * 34 ) 0.2549620.2534870.1107990.1074480.1158650.1110380.1084860.106148
0.1142890.1133740.0190540.0177160.0209390.0191000.0180290.017126
( 0 * 24 , 25 , 0 * 35 ) 0.2374060.2360310.0925280.0891570.0965280.0921680.0904870.088283
0.1013230.0999030.0133140.0124550.0145710.0132420.0128520.012224
( 0 * 34 , 25 ) 0.2689880.2662510.0944800.0905180.0988400.093840.0921790.089179
0.1325780.1301450.0140720.0128650.0155320.013880.0132910.012424
( 60 , 50 ) ( 10 , 0 * 49 ) 0.2049820.2046550.0935330.0911700.0962360.0929810.0924090.090859
0.0746750.0743060.0138080.0130530.0147770.0136710.0133100.012855
( 0 * 9 , 10 , 0 * 40 ) 0.1916040.1912520.0909740.0889510.0938900.0912140.0893580.087992
0.0639280.0636130.0128980.0122500.0137620.0128750.0124800.012014
( 0 * 49 , 10 ) 0.2088360.2075860.0841970.0824300.0865590.0838120.0834120.082771
0.0751630.0744630.0113250.0107570.0120010.0112130.0110570.010668
( 100 , 80 ) ( 20 , 0 * 79 ) 0.1536100.1534110.0707910.0694130.0721890.0704370.0701510.069288
0.0394580.0391850.0079990.0076460.0083190.0078780.0078460.007580
( 0 * 19 , 20 , 0 * 60 ) 0.1479330.1470760.0680250.0667570.0696270.0679030.0672690.066379
0.0361530.0358150.0075020.0071670.0078400.0074010.0073540.007077
( 0 * 79 , 20 ) 0.1612740.1596720.0656830.0645040.0668190.0652050.0652740.064609
0.0428410.0421050.0070130.0067000.0072430.0068520.0069290.006688
Table 6. Average biases (first row) and MSEs (second row) of β when α = 1.5 and β = 1.0 .
Table 6. Average biases (first row) and MSEs (second row) of β when α = 1.5 and β = 1.0 .
k = 1 MLEBayes under SE LFBayes Estimates under LINEX LF
v = 2.0 v = 2.0
(n,m)SchemeNREMNIPIPNIPIPNIPIP
( 30 , 16 ) ( 16 , 0 * 15 ) 0.3704120.3678980.1036800.0798630.1436390.1037770.0879980.073615
0.3084400.3066440.0172090.0098120.0335060.0171630.0118150.008243
( 0 * 13 , 16 , 0 * 2 ) 0.5022250.4993710.1006630.0740110.1480840.1025480.0846630.069586
0.5742570.571640.0157510.0085760.0334500.0159250.0113900.007901
( 0 * 15 , 16 ) 0.5056620.5033480.0919970.0680220.1398700.0957860.0797200.066547
0.6121670.6096970.0134620.0072040.0302280.0141650.0099720.006893
( 30 , 25 ) ( 5 , 0 * 24 ) 0.2858540.2854000.0765710.0644240.0983640.0790600.0689250.061183
0.1603260.1599880.0093910.0064770.0153090.0097740.0074480.005842
( 0 * 4 , 5 , 0 * 20 ) 0.2892060.2891700.0769640.0634640.0999790.0789770.0679470.060210
0.1695730.1694950.0095730.0064990.0156240.0098220.0075640.005859
( 0 * 24 , 5 ) 0.3290830.3288740.0758020.0631220.0975360.0772090.0684380.060844
0.2132700.2131210.0089120.0061550.0147850.0092830.0072590.005783
( 60 , 35 ) ( 25 , 0 * 34 ) 0.2108060.2088740.0640750.0572010.0756750.0652010.0600330.055835
0.0778890.0769830.0065840.0051900.0090780.0066870.0058600.005041
( 0 * 24 , 25 , 0 * 35 ) 0.2619850.2605950.0659940.0577820.0803380.0679340.0610870.055865
0.1275760.1268130.0068510.0051860.0098670.0070090.0059860.004963
( 0 * 34 , 25 ) 0.2785230.2766830.0619490.0536260.0775430.0642910.0568710.052037
0.1402320.1392950.0060480.0044750.0089970.0062060.0053220.004384
( 60 , 50 ) ( 10 , 0 * 49 ) 0.1844330.1841770.0518750.0474030.0586890.0522520.0495690.046715
0.0611060.0610320.0043420.0035750.0055370.0043530.0039740.003477
( 0 * 9 , 10 , 0 * 40 ) 0.1820360.1819410.0511550.0469680.0584950.0522050.0487710.046390
0.0608990.0608460.0043340.0035390.0055060.0043900.0039020.003391
( 0 * 49 , 10 ) 0.2033010.2030870.0506480.0460470.0577380.0511680.0486490.045642
0.0733850.0732890.0041410.0033080.0054660.0041710.0036140.003189
( 100 , 80 ) ( 20 , 0 * 79 ) 0.1419580.1415790.0412730.0387420.0450610.0414950.0395980.038054
0.0334140.0333270.0027520.0023550.0032410.0026990.0025680.002287
( 0 * 19 , 20 , 0 * 60 ) 0.1403600.1401760.0416410.0394090.0448550.0416590.0406300.039240
0.0323860.032320.0027560.0023910.0031980.0026790.0026420.002384
( 0 * 79 , 20 ) 0.1469660.1464730.0377390.0356010.0414290.0382960.0370430.035721
0.0369450.0368120.0023470.0020080.0027830.0023000.0022630.002018
k = 2
( 30 , 16 ) ( 16 , 0 * 15 ) 0.3979140.3687080.1585280.1475020.1740420.1576610.1514300.144355
0.3625480.2705910.0404350.0343880.0493540.0402330.0359360.032098
( 0 * 13 , 16 , 0 * 2 ) 0.5389850.5240340.1038750.0732130.1565670.1026070.0883150.071065
0.6787090.6639180.0167760.0082750.0374600.0160060.0126320.008096
( 0 * 15 , 16 ) 0.6134530.5982260.1042580.0723570.1632890.1052320.0862110.069542
0.8931100.8753840.0167680.0081440.0388460.0163300.0121760.007834
( 30 , 25 ) ( 5 , 0 * 24 ) 0.3100240.3078410.0809500.0664500.1043770.0817780.0727610.063742
0.1795260.1779780.0102140.0068220.0167610.0102870.0083140.006343
( 0 * 4 , 5 , 0 * 20 ) 0.3438650.3413340.0853010.0697650.1105370.0864510.0754160.065725
0.2494680.2476840.0116620.0076590.0192450.0117190.0089780.006734
( 0 * 24 , 5 ) 0.3564770.3532250.0790190.0631810.1053740.0809290.0693270.059215
0.2622650.2599290.0097200.0061600.0169130.0099790.0077190.005652
( 60 , 35 ) ( 25 , 0 * 34 ) 0.2571230.2501150.0725590.0635370.0856420.0728200.0677900.061164
0.1253800.1221360.0084480.0063430.0118100.0083960.0072790.005900
( 0 * 24 , 25 , 0 * 35 ) 0.2838620.2761550.0696270.0590830.0855810.0700640.0641650.056991
0.1535390.1494580.0075700.0054090.0113870.0076580.0064650.005081
( 0 * 34 , 25 ) 0.321040.3115340.0651520.0546760.0840620.0682910.0584500.052634
0.2076470.2017730.0067490.0046950.0108710.0070650.0055010.004374
( 60 , 50 ) ( 10 , 0 * 49 ) 0.2043350.2023570.0554090.0493460.0650540.0564870.0512280.047345
0.0772050.0762560.0048490.0037960.0065780.0049650.0041690.003470
( 0 * 9 , 10 , 0 * 40 ) 0.1947800.1919090.0542190.0491680.0615660.0543260.0524050.049195
0.0692180.0681570.0046040.0038050.0061270.0047290.0043820.003704
( 0 * 49 , 10 ) 0.2223470.2191340.0539580.0485270.0630650.0550800.0511110.047660
0.0889600.0874230.0046770.0036920.0062330.0047120.0042280.003576
( 100 , 80 ) ( 20 , 0 * 79 ) 0.1510460.1480060.0428510.0399350.0466980.0425970.0417070.039768
0.0391290.0382130.0029890.0025210.0035510.0028890.0028150.002482
( 0 * 19 , 20 , 0 * 60 ) 0.1579090.1543230.0452140.0424800.0493360.0456080.0436350.041567
0.0403980.0393440.0031750.0027040.0038050.0031520.0029360.002600
( 0 * 79 , 20 ) 0.1750360.1710540.0431180.0402010.0475290.0435070.0416140.039685
0.0515060.0497830.0029470.0024990.0035570.0029170.0027550.002452
Table 7. Average biases (first row) and MSEs (second row) of H S h ( f ) = 1.3610 when α = 1.5 and β = 1.0 .
Table 7. Average biases (first row) and MSEs (second row) of H S h ( f ) = 1.3610 when α = 1.5 and β = 1.0 .
k = 1 MLEBayes under SE LFBayes Estimates under LINEX LF
v = 2.0 v = 2.0
(n,m)SchemeNREMNIPIPNIPIPNIPIP
( 30 , 16 ) ( 16 , 0 * 15 ) 0.1808230.1783930.1319410.1231770.1316380.1223950.1453850.133168
0.0526390.0516190.0279570.0240220.0270530.0235200.0345910.028547
( 0 * 13 , 16 , 0 * 2 ) 0.2219050.2204770.1173230.1082500.1177840.1084790.1292970.116068
0.0792190.0786380.0217140.0182120.0214770.0181370.0268860.021491
( 0 * 15 , 16 ) 0.2178490.2167100.1108210.1040030.1140330.1060380.1206340.110441
0.0783000.0778020.0195090.0168440.0199580.0171220.0241510.019742
( 30 , 25 ) ( 5 , 0 * 24 ) 0.1471380.1467750.1157550.1107140.1143800.1092930.1242890.117803
0.0343730.0342040.0215220.0195940.0204550.0187320.0253330.022571
( 0 * 4 , 5 , 0 * 20 ) 0.1446250.1444700.1096710.1050940.1091670.1046630.1177490.111717
0.0336360.0335960.0193250.0175270.0185610.0169740.0226500.020079
( 0 * 24 , 5 ) 0.1513440.1512640.1048310.1007700.1044360.1004350.1126300.106943
0.0368510.0368230.0174110.0158910.0169210.0155570.0203370.018082
( 60 , 35 ) ( 25 , 0 * 34 ) 0.1207510.1190330.0959970.0925580.0954340.0922190.1000240.096073
0.0222490.0216690.0143500.0133010.0143860.0133510.0156530.014326
( 0 * 24 , 25 , 0 * 35 ) 0.1373140.1364940.0839950.0809540.0850220.0821780.0870090.083065
0.0298590.0296230.0111660.0102860.0112530.0104180.0121440.011018
( 0 * 34 , 25 ) 0.1382020.1372700.0778950.0752180.0796460.0772810.0799700.076593
0.0299260.0296760.0094870.0088100.0097900.0091430.0102610.009320
( 60 , 50 ) ( 10 , 0 * 49 ) 0.0959240.0956820.0773780.0752700.0784350.0762980.0789500.076669
0.0147390.0146740.0094450.0088510.0095140.0090260.0099230.009241
( 0 * 9 , 10 , 0 * 40 ) 0.0989200.0987630.0772310.0754630.0780350.0763310.0789950.076871
0.0156230.0155940.0093720.0089280.0095160.0090070.0099890.009386
( 0 * 49 , 10 ) 0.1036510.1035620.0744750.0724640.0754140.0733240.0759160.073745
0.0174980.0174750.0089900.0083800.0089310.0083850.0095090.00888
( 100 , 80 ) ( 20 , 0 * 79 ) 0.0757890.0754360.0611460.0602460.0610770.0602390.0626120.061561
0.0090430.0089720.0059870.0056700.0058290.0055970.0063010.005974
( 0 * 19 , 20 , 0 * 60 ) 0.0782710.0780370.0605300.0596180.0607390.0598840.0616750.060508
0.0095890.0095520.0058110.0055860.0058170.0055660.0061240.00582
( 0 * 79 , 20 ) 0.0797780.0795490.0558830.0551110.0560250.0552850.0569940.056168
0.0099090.0098670.0049780.0047210.0049930.0047440.0051810.004899
k = 2
( 30 , 16 ) ( 16 , 0 * 15 ) 0.1974880.1909050.1135970.1036560.1181450.1070730.1229370.109979
0.0643220.0620140.0207630.0170960.0219000.0180220.0243280.019223
( 0 * 13 , 16 , 0 * 2 ) 0.2534350.2436320.1011760.0894680.1114110.0979880.1068290.091902
0.1034490.0991020.0165540.0128930.0191200.0147210.0192500.014110
( 0 * 15 , 16 ) 0.2724770.2632480.0957150.0853530.1033080.0911140.1065320.090900
0.1180720.1133920.0148890.011540.0170350.0130510.0180230.013086
( 30 , 25 ) ( 5 , 0 * 24 ) 0.1587620.1568330.0921560.0867510.0940150.0887090.0972100.090388
0.0396380.0390840.0135320.0118770.0139680.0123480.0150200.012925
( 0 * 4 , 5 , 0 * 20 ) 0.1670190.1652170.0932800.0873160.0961090.0902960.0971620.089896
0.0464010.0458140.0142260.0124300.0146310.0129490.0157210.013395
( 0 * 24 , 5 ) 0.1711990.1689370.0855470.0804570.0879960.0829010.0907960.084090
0.0479490.0472760.0120080.0104960.0123300.0108420.0137650.011616
( 60 , 35 ) ( 25 , 0 * 34 ) 0.1340370.1279550.0787720.0750690.0808150.0772440.0811700.076638
0.0295000.0279790.0102310.0091550.0104660.0094370.0109820.009683
( 0 * 24 , 25 , 0 * 35 ) 0.1559270.1501870.0717420.0674230.0726420.0687570.0753230.069888
0.0381170.0365660.0082680.0071890.0084850.0074860.0090250.007696
( 0 * 34 , 25 ) 0.1668050.1602080.0684700.0650930.0700560.0670510.0716430.066844
0.0443060.0424450.0072910.0064610.0075530.0068110.0080870.006925
( 60 , 50 ) ( 10 , 0 * 49 ) 0.1108640.1089870.0673420.0649290.0664050.0642990.0705390.067535
0.0197480.0193710.0072670.0066720.0070750.0065990.0078650.007170
( 0 * 9 , 10 , 0 * 40 ) 0.1099310.1077080.0663170.0642930.0671420.0653460.0679470.065445
0.0192670.0187730.0069090.0064070.0069970.0065630.0072920.006671
( 0 * 49 , 10 ) 0.1199260.1175840.0621250.0598250.0623400.0603120.0644990.061639
0.0229820.0224540.0062630.0057420.0062980.0058330.0066010.00607
( 100 , 80 ) ( 20 , 0 * 79 ) 0.0847200.0820830.0516110.0502870.0520540.0509330.0521980.050651
0.0114580.0110120.0043870.0040570.0043220.0041160.0045120.004173
( 0 * 19 , 20 , 0 * 60 ) 0.0913300.0886860.0529890.0517200.0532390.0519950.0538970.052465
0.0127370.0122500.0044710.0041740.0044860.0042120.0046580.004309
( 0 * 79 , 20 ) 0.0980330.0952250.0497450.0483990.0497440.0487050.0507260.049196
0.0148510.0142780.0039280.0036330.0039290.0036680.0040110.003770
Table 8. Average biases (first row) and MSEs (second row) of H R ( λ = 0.25 ) = 2.2768 when α = 1.5 and β = 1.0 .
Table 8. Average biases (first row) and MSEs (second row) of H R ( λ = 0.25 ) = 2.2768 when α = 1.5 and β = 1.0 .
k = 1 MLEBayes under SE LFBayes Estimates under LINEX LF
v = 2.0 v = 2.0
(n,m)SchemeNREMNIPIPNIPIPNIPIP
( 30 , 16 ) ( 16 , 0 * 15 ) 0.1576420.1555240.1595210.1506990.1623870.1520420.1705780.159280
0.0396930.0387570.0407250.0359810.0419170.0369780.0463510.039985
( 0 * 13 , 16 , 0 * 2 ) 0.1679500.1671030.1396320.1313550.1407090.1321380.1491410.138466
0.0441720.0438540.0303470.0268070.0305520.0269950.0350930.030020
( 0 * 15 , 16 ) 0.1624640.1618150.1342610.1280560.1373780.1300390.1414850.133305
0.0419460.0416820.0279920.0252630.0289600.0258770.0319710.027980
( 30 , 25 ) ( 5 , 0 * 24 ) 0.1367400.1364170.1424830.1369560.1426230.1365220.1494730.143425
0.0298880.0297360.0320190.0296450.0318110.0294240.0355700.032565
( 0 * 4 , 5 , 0 * 20 ) 0.1335720.1334640.1361260.1316150.1369260.1316910.1421240.136822
0.0275910.0275580.0289380.0267810.0290350.0268330.0319150.029244
( 0 * 24 , 5 ) 0.1305990.1305710.1299990.1255900.1303860.1258210.1360340.130918
0.0265130.0265030.0261540.0243360.0262850.0244340.0288370.026484
( 60 , 35 ) ( 25 , 0 * 34 ) 0.1125130.1109540.1172480.1136690.1175670.1139150.1206820.116619
0.0197910.0192510.0213190.0200670.0218390.0204890.0224360.021017
( 0 * 24 , 25 , 0 * 35 ) 0.1127730.1122950.1013870.0985800.1002960.1029760.1007210.103001
0.0200040.0198730.0161190.0152610.0155790.0163560.0160550.016899
( 0 * 34 , 25 ) 0.1102070.1096960.0952910.0928020.0972440.0946420.0965860.094097
0.0189030.0187790.0142510.0135360.0147280.0140150.0147900.013934
( 60 , 50 ) ( 10 , 0 * 49 ) 0.0914380.0912110.0969860.0945250.0988370.0962490.0975720.095193
0.0128180.0127540.0145570.0137790.0151160.0142690.0148400.014031
( 0 * 9 , 10 , 0 * 40 ) 0.0921780.0920710.0960190.0940430.0976940.0954750.0968280.094903
0.0132070.0131840.0143800.0137020.0147330.0140270.0147890.014060
( 0 * 49 , 10 ) 0.0913090.0912720.0922410.0900460.0933500.0910380.0936270.091589
0.0133060.0132970.0135710.0128710.0136980.0130190.0140170.013335
( 100 , 80 ) ( 20 , 0 * 79 ) 0.0719130.0715750.0764250.0754330.0765050.0753650.0777110.076766
0.0080610.0079920.0091530.0088170.0091840.0087970.0094720.009142
( 0 * 19 , 20 , 0 * 60 ) 0.0732790.0731240.0751690.0741610.0754820.0743990.0760140.075026
0.0084220.0083940.0088910.0085850.0089130.0086000.0091200.008835
( 0 * 79 , 20 ) 0.0696970.0695840.0693470.0685090.0697820.0688650.0699360.069207
0.0075330.0075120.0075350.0072520.0075890.0073090.0077130.007434
k = 2
( 30 , 16 ) ( 16 , 0 * 15 ) 0.1607250.1559290.1331510.1250290.1391000.1292790.1393880.129585
0.0410440.0392580.0285710.0249970.0305980.0264780.0312450.026703
( 0 * 13 , 16 , 0 * 2 ) 0.1878530.1807760.1160030.1066940.1257220.1141550.1183570.108355
0.0565470.0534980.0215440.0183510.0240860.0201550.0233790.019259
( 0 * 15 , 16 ) 0.1949930.1883950.1098390.1026640.1165560.1070750.1163840.106307
0.0596950.0565160.0193210.0165690.0214230.0179830.0216690.017840
( 30 , 25 ) ( 5 , 0 * 24 ) 0.1273230.1260740.1094300.1049420.1123130.1072880.1128130.107557
0.0255500.0251810.0189950.0173650.0198170.0180740.0202240.018252
( 0 * 4 , 5 , 0 * 20 ) 0.1311950.1300220.1097050.1048110.1136690.1085390.1126250.107043
0.0279730.0275770.0199830.0182350.0208810.0190720.0210180.018922
( 0 * 24 , 5 ) 0.1293980.1280190.1024180.0984240.1049970.1007910.1056310.100999
0.0274090.0270020.0169510.0154760.0172360.0159300.0182900.016452
( 60 , 35 ) ( 25 , 0 * 34 ) 0.1077080.1033190.0931290.0903080.0954890.0923590.0947220.091228
0.0189960.0178560.0140110.0130230.0144820.0134320.0145130.013445
( 0 * 24 , 25 , 0 * 35 ) 0.1204170.1164780.0821410.0789540.0832460.0802150.0846880.080796
0.0229320.0218870.0107430.0098270.0110100.0100960.0113700.010268
( 0 * 34 , 25 ) 0.125870.1214660.0803980.0778540.0820090.0795470.0820110.078880
0.0245380.0233930.0099650.0092290.0102590.0095670.0104420.009585
( 60 , 50 ) ( 10 , 0 * 49 ) 0.0922530.0910830.0804830.0786100.0799740.0781810.0830150.080793
0.0134310.0131770.0103260.0098220.0102300.0097850.0109350.010301
( 0 * 9 , 10 , 0 * 40 ) 0.0924660.0910070.0797330.0779460.0803890.0788870.0807550.078579
0.0132800.0129290.0098190.0093180.0099920.0095120.0101120.009548
( 0 * 49 , 10 ) 0.0943000.0928460.0733570.0715380.0734580.0718210.0751600.073046
0.0141380.0138240.0086360.0082170.0087840.0083000.0090060.008534
( 100 , 80 ) ( 20 , 0 * 79 ) 0.0698690.0681070.0613450.0602880.0618340.0608950.0617750.060487
0.0078610.0075450.0061670.0058530.0062130.0059260.0062900.005960
( 0 * 19 , 20 , 0 * 60 ) 0.0747360.0729830.0619550.0608540.0622170.0611540.0625790.061430
0.0087070.0083660.0061720.0058750.0062220.0059250.0063150.005994
( 0 * 79 , 20 ) 0.0773520.0756160.0583990.0574000.0584230.0575340.0591990.058012
0.0092080.0088760.0054110.0051310.0054270.0051550.0055290.005267
Table 9. Average lengths (ALs) and coverage probabilities (CPs) of 95% confidence and credible intervals with ML and Bayes methods for α , β , H S h ( f ) , and H R ( λ = 0.25 ) , when α = 1.5 , β = 1.0 , and k = 2 .
Table 9. Average lengths (ALs) and coverage probabilities (CPs) of 95% confidence and credible intervals with ML and Bayes methods for α , β , H S h ( f ) , and H R ( λ = 0.25 ) , when α = 1.5 , β = 1.0 , and k = 2 .
ParameternmSchemeMLE NRMLE EMBayes under NIPBayes under IP
ALCPALCPALCPALCP
α 3016 ( 14 , 15 0 ) 2.019610.9381.945810.9320.943860.9540.909510.963
( 7 0 , 14 , 7 0 ) 2.276500.9172.289750.9240.851130.9590.813420.956
( 15 0 , 14 ) 2.405060.9232.416370.9290.855740.9640.817490.954
3025 ( 10 , 24 0 ) 1.679510.9421.585070.9290.796330.9500.774310.947
( 12 0 , 10 1 , 12 0 ) 1.658380.9301.574940.9490.776910.9520.758260.949
( 24 0 , 10 ) 1.785490.9271.707880.9340.761980.9530.742740.953
6035 ( 10 , 34 0 ) 1.266900.9431.194110.9110.656420.9590.643750.955
( 17 0 , 10 1 , 17 0 ) 1.294330.9501.278250.9370.587050.9560.575640.950
( 34 0 , 10 ) 1.415200.9351.397480.9270.588310.9580.576020.963
6050 ( 10 , 34 0 ) 1.123020.9371.041050.9260.569680.9540.561860.961
( 17 0 , 10 1 , 17 0 ) 1.087330.9401.019900.9240.551750.9570.543490.954
( 34 0 , 10 ) 1.159300.9471.097310.9140.540590.9600.532800.960
10080 ( 10 , 34 0 ) 0.860930.9430.795860.9390.448690.9520.443560.953
( 17 0 , 10 1 , 17 0 ) 0.815760.9510.767010.9180.427450.9570.423140.952
( 34 0 , 10 ) 0.879530.960.832840.9390.421020.9610.417350.963
β 3016 ( 14 , 15 0 ) 1.827880.9251.825760.9260.982010.9590.859600.959
( 7 0 , 14 , 7 0 ) 2.506720.9112.503370.9121.041290.9650.897290.967
( 15 0 , 14 ) 2.645400.9112.643330.9111.045530.9650.901260.958
3025 ( 10 , 24 0 ) 1.403780.9311.403460.9310.788940.9760.720030.971
( 12 0 , 10 1 , 12 0 ) 1.422200.9251.422160.9250.791740.9710.722400.965
( 24 0 , 10 ) 1.569310.9241.569260.9240.802510.9720.729610.954
6035 ( 10 , 34 0 ) 1.070800.9441.069860.9450.656870.9690.614140.950
( 17 0 , 10 1 , 17 0 ) 1.281910.9421.281530.9430.687930.9750.641380.957
( 34 0 , 10 ) 1.404940.9311.404440.9320.693520.9820.647250.961
6050 ( 10 , 34 0 ) 0.903270.9330.903230.9330.546080.9800.521450.959
( 17 0 , 10 1 , 17 0 ) 0.910460.9320.910490.9320.550950.9750.525190.957
( 34 0 , 10 ) 0.996870.9440.996850.9410.559790.9650.533510.964
10080 ( 10 , 34 0 ) 0.696260.9420.696250.9420.433020.9720.418870.957
( 17 0 , 10 1 , 17 0 ) 0.695120.9490.695150.9490.437110.9770.421000.963
( 34 0 , 10 ) 0.763510.9590.763500.9600.441950.9850.429500.961
H R ( f ) 3016 ( 14 , 15 0 ) 0.857600.9550.857620.9550.862360.9860.770380.968
( 7 0 , 14 , 7 0 ) 1.000660.9541.000640.9540.881680.9920.782920.957
( 15 0 , 14 ) 1.027750.9631.027700.9630.880920.9910.789740.962
3025 ( 10 , 24 0 ) 0.680580.9550.680580.9560.693870.9870.657150.956
( 12 0 , 10 1 , 12 0 ) 0.685090.9430.684250.9430.696690.9890.669020.960
( 24 0 , 10 ) 0.706770.9440.706760.9440.736490.9900.687960.958
6035 ( 10 , 34 0 ) 0.575280.9610.575300.9620.607800.9890.538220.960
( 17 0 , 10 1 , 17 0 ) 0.636450.9450.636430.9450.598230.9870.556820.962
( 34 0 , 10 ) 0.665040.9590.665020.9590.593720.9880.568490.966
6050 ( 10 , 34 0 ) 0.477350.9480.477350.9490.507540.9900.439810.963
( 17 0 , 10 1 , 17 0 ) 0.481900.9560.481890.9560.514720.9920.462920.959
( 34 0 , 10 ) 0.496210.9410.496200.9410.520460.9890.495740.965
10080 ( 10 , 34 0 ) 0.377050.9560.377010.9570.317390.9920.307830.963
( 17 0 , 10 1 , 17 0 ) 0.383860.9560.383820.9560.400980.9910.379920.954
( 34 0 , 10 ) 0.396700.9580.396690.9580.402570.9900.394020.966
H S H ( f ) 3016 ( 14 , 15 0 ) 0.846310.9660.785090.9430.856620.9780.763960.953
( 7 0 , 14 , 7 0 ) 0.980990.9840.777360.920.883890.9810.753800.962
( 15 0 , 14 ) 1.006730.9890.780750.9290.799480.9850.749840.957
3025 ( 10 , 24 0 ) 0.675330.9410.640930.9280.703920.9770.610100.953
( 12 0 , 10 1 , 12 0 ) 0.679660.9540.631270.9370.649110.9730.606460.958
( 24 0 , 10 ) 0.700880.9660.620150.9330.670720.9780.586980.951
6035 ( 10 , 34 0 ) 0.572340.9610.544130.9440.566050.9770.530140.965
( 17 0 , 10 1 , 17 0 ) 0.632330.9770.526160.9340.556220.9750.510360.961
( 34 0 , 10 ) 0.660360.9850.526890.9350.547640.9800.471680.952
6050 ( 10 , 34 0 ) 0.475710.9610.455940.9550.466520.9730.449750.958
( 17 0 , 10 1 , 17 0 ) 0.480190.9700.449370.9530.453120.9810.407450.952
( 34 0 , 10 ) 0.494330.9660.441030.9400.539600.9690.393510.964
10080 ( 10 , 34 0 ) 0.376240.9660.362170.9570.348570.9760.339720.954
( 17 0 , 10 1 , 17 0 ) 0.383050.9640.356600.9450.434640.9750.324960.952
( 34 0 , 10 ) 0.395760.9740.349730.9560.420730.9790.313200.963
Table 10. Average lengths (ALs) and coverage probabilities (CPs) of 95% confidence and credible intervals with ML and Bayes methods for α , β , H S h ( f ) , and H R ( λ = 0.25 ) , when α = 1.5 , β = 1.0 , and k = 2 .
Table 10. Average lengths (ALs) and coverage probabilities (CPs) of 95% confidence and credible intervals with ML and Bayes methods for α , β , H S h ( f ) , and H R ( λ = 0.25 ) , when α = 1.5 , β = 1.0 , and k = 2 .
ParameternmSchemeMLE NRMLE EMBayes NIPBayes IP
ALCPALCPALCPALCP
α 3016 ( 14 , 15 0 ) 1.786740.9411.819810.9470.816760.9620.776120.966
( 7 0 , 14 , 7 0 ) 2.031980.9372.157370.9750.762130.9680.714710.977
( 15 0 , 14 ) 2.213560.9242.355940.9690.767550.9810.715330.979
3025 ( 10 , 24 0 ) 1.483990.9381.487530.9400.674630.9700.654150.969
( 12 0 , 10 1 , 12 0 ) 1.493200.9141.508440.9280.666490.9620.645420.962
( 24 0 , 10 ) 1.601000.9321.632560.9410.657660.9640.634150.966
6035 ( 10 , 34 0 ) 1.151080.931.160220.9320.559110.9670.543890.968
( 17 0 , 10 1 , 17 0 ) 1.160610.9471.231570.9700.516050.9720.500810.974
( 34 0 , 10 ) 1.303300.9441.384740.9760.523410.9650.503730.973
6050 ( 10 , 34 0 ) 1.000510.9471.000620.9450.476530.9630.467550.960
( 17 0 , 10 1 , 17 0 ) 0.954780.9440.963390.9490.468210.9590.458500.961
( 34 0 , 10 ) 1.035290.9541.055040.9610.462110.9720.453270.971
10080 ( 10 , 34 0 ) 0.762100.9430.759250.9470.378120.9640.372660.971
( 17 0 , 10 1 , 17 0 ) 0.733550.9590.744060.9610.364210.9660.359960.959
( 34 0 , 10 ) 0.797860.9570.816990.9630.363880.9610.356920.965
β 3016 ( 14 , 15 0 ) 2.035060.9322.029460.9331.028910.9590.886430.965
( 7 0 , 14 , 7 0 ) 2.843530.9132.828150.9131.096530.9550.928370.967
( 15 0 , 14 ) 3.172840.9113.156950.9131.115880.9690.940930.962
3025 ( 10 , 24 0 ) 1.557360.9361.556740.9360.819210.9660.744050.961
( 12 0 , 10 1 , 12 0 ) 1.609330.9111.608340.9110.827690.9640.749180.964
( 24 0 , 10 ) 1.796980.9271.795770.9280.843770.9610.762820.959
6035 ( 10 , 34 0 ) 1.213260.9171.211890.9190.688190.9570.640400.967
( 17 0 , 10 1 , 17 0 ) 1.437950.9431.435790.9460.727100.9680.671630.960
( 34 0 , 10 ) 1.646050.9381.643230.9390.743420.9670.683620.955
6050 ( 10 , 34 0 ) 1.022480.9421.021640.9430.579310.9630.549300.963
( 17 0 , 10 1 , 17 0 ) 0.999590.9480.999300.9480.577230.9570.547830.966
( 34 0 , 10 ) 1.121650.9421.120620.9440.590820.9620.589460.971
10080 ( 10 , 34 0 ) 0.764200.9420.764070.9440.453510.9630.560490.963
( 17 0 , 10 1 , 17 0 ) 0.771870.9530.771180.9560.457320.9670.442340.962
( 34 0 , 10 ) 0.864840.9400.863630.9420.468920.9620.451950.961
H R ( f ) 3016 ( 14 , 15 0 ) 0.954210.9520.954200.9550.869870.9660.775160.967
( 7 0 , 14 , 7 0 ) 1.210930.9831.210610.9830.884220.9680.771040.965
( 15 0 , 14 ) 1.269100.9871.268700.9880.889280.9750.773440.971
3025 ( 10 , 24 0 ) 0.761570.9620.701580.9960.703560.9770.652050.974
( 12 0 , 10 1 , 12 0 ) 0.768140.9410.768130.9430.698740.9810.648300.975
( 24 0 , 10 ) 0.826510.9580.826470.9590.699650.9740.647220.977
6035 ( 10 , 34 0 ) 0.639060.9450.639050.9460.590230.9780.557520.980
( 17 0 , 10 1 , 17 0 ) 0.748300.9610.748270.9630.592980.9750.555300.974
( 34 0 , 10 ) 0.809730.9580.809690.9590.595830.9710.556710.975
6050 ( 10 , 34 0 ) 0.534780.9580.534800.9580.494890.9800.476020.973
( 17 0 , 10 1 , 17 0 ) 0.543730.9540.543720.9550.493690.9790.473020.971
( 34 0 , 10 ) 0.582880.9530.582880.9530.493220.9840.473030.976
10080 ( 10 , 34 0 ) 0.421910.9810.353170.9430.392510.9830.383880.982
( 17 0 , 10 1 , 17 0 ) 0.432280.9550.432300.960.387430.9820.378190.977
( 34 0 , 10 ) 0.468350.9470.468360.9520.389120.9890.380690.971
H S H ( f ) 3016 ( 14 , 15 0 ) 0.938550.9860.779550.9330.866010.9880.766620.978
( 7 0 , 14 , 7 0 ) 1.174800.9890.900070.9300.844250.9910.751430.993
( 15 0 , 14 ) 1.226010.9930.924750.9170.847810.9900.751270.990
3025 ( 10 , 24 0 ) 0.754330.9840.623070.9460.705630.9860.603530.986
( 12 0 , 10 1 , 12 0 ) 0.760420.9750.619370.9180.697440.9840.655470.979
( 24 0 , 10 ) 0.816810.9880.638570.9380.690780.9890.646470.988
6035 ( 10 , 34 0 ) 0.634940.9780.531640.9440.591030.9870.513560.985
( 17 0 , 10 1 , 17 0 ) 0.741480.9830.584970.9380.570210.9920.540340.990
( 34 0 , 10 ) 0.800860.9910.609120.9430.568220.9930.536780.995
6050 ( 10 , 34 0 ) 0.532380.9780.441810.9410.497490.9910.481980.983
( 17 0 , 10 1 , 17 0 ) 0.541270.9850.449110.9510.492800.9920.475770.989
( 34 0 , 10 ) 0.579810.9870.460810.9490.485340.9900.469490.989
10080 ( 10 , 34 0 ) 0.421910.9810.353170.9430.392660.9810.383880.982
( 17 0 , 10 1 , 17 0 ) 0.431060.9810.356850.9590.386050.9820.378070.985
( 34 0 , 10 ) 0.466800.9870.370320.9470.382130.9870.372200.989
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Ahmed, E.A.; El-Morshedy, M.; Al-Essa, L.A.; Eliwa, M.S. Statistical Inference on the Entropy Measures of Gamma Distribution under Progressive Censoring: EM and MCMC Algorithms. Mathematics 2023, 11, 2298. https://doi.org/10.3390/math11102298

AMA Style

Ahmed EA, El-Morshedy M, Al-Essa LA, Eliwa MS. Statistical Inference on the Entropy Measures of Gamma Distribution under Progressive Censoring: EM and MCMC Algorithms. Mathematics. 2023; 11(10):2298. https://doi.org/10.3390/math11102298

Chicago/Turabian Style

Ahmed, Essam A., Mahmoud El-Morshedy, Laila A. Al-Essa, and Mohamed S. Eliwa. 2023. "Statistical Inference on the Entropy Measures of Gamma Distribution under Progressive Censoring: EM and MCMC Algorithms" Mathematics 11, no. 10: 2298. https://doi.org/10.3390/math11102298

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop