Research article

Stability analysis of Caputo fractional time-dependent systems with delay using vector lyapunov functions

  • In this study, we investigate the stability and asymptotic stability properties of Caputo fractional time-dependent systems with delay by employing vector Lyapunov functions. Utilizing the Caputo fractional Dini derivative on Lyapunov-like functions, along with a new comparison theorem and differential inequalities, we derive and prove sufficient conditions for the stability and asymptotic stability of these complex systems. An example is included to showcase the method's practicality and to specifically illustrate its advantages over scalar Lyapunov functions. Our results improves, extends, and generalizes several existing findings in the literature.

    Citation: Jonas Ogar Achuobi, Edet Peter Akpan, Reny George, Austine Efut Ofem. Stability analysis of Caputo fractional time-dependent systems with delay using vector lyapunov functions[J]. AIMS Mathematics, 2024, 9(10): 28079-28099. doi: 10.3934/math.20241362

    Related Papers:

    [1] Ruifang Yang, Shilin Yang . Representations of a non-pointed Hopf algebra. AIMS Mathematics, 2021, 6(10): 10523-10539. doi: 10.3934/math.2021611
    [2] Fengxia Gao, Jialei Chen . Conjugacy classes of left ideals of Sweedler's four-dimensional algebra H4. AIMS Mathematics, 2022, 7(5): 7720-7727. doi: 10.3934/math.2022433
    [3] Haijun Cao, Fang Xiao . The category of affine algebraic regular monoids. AIMS Mathematics, 2022, 7(2): 2666-2679. doi: 10.3934/math.2022150
    [4] Yaguo Guo, Shilin Yang . Projective class rings of a kind of category of Yetter-Drinfeld modules. AIMS Mathematics, 2023, 8(5): 10997-11014. doi: 10.3934/math.2023557
    [5] Faiza Shujat, Faarie Alharbi, Abu Zaid Ansari . Weak (p,q)-Jordan centralizer and derivation on rings and algebras. AIMS Mathematics, 2025, 10(4): 8322-8330. doi: 10.3934/math.2025383
    [6] Mingze Zhao, Huilan Li . A pair of dual Hopf algebras on permutations. AIMS Mathematics, 2021, 6(5): 5106-5123. doi: 10.3934/math.2021302
    [7] Panpan Jia, Jizhu Nan, Yongsheng Ma . Separating invariants for certain representations of the elementary Abelian p-groups of rank two. AIMS Mathematics, 2024, 9(9): 25603-25618. doi: 10.3934/math.20241250
    [8] Zehra Velioǧlu, Mukaddes Balçik . On the Tame automorphisms of differential polynomial algebras. AIMS Mathematics, 2020, 5(4): 3547-3555. doi: 10.3934/math.2020230
    [9] Qining Li . Double Ore extensions of anti-angle type for Hopf algebras. AIMS Mathematics, 2022, 7(7): 12566-12586. doi: 10.3934/math.2022696
    [10] Simone Costa, Marco Pavone . Orthogonal and oriented Fano planes, triangular embeddings of K7, and geometrical representations of the Frobenius group F21. AIMS Mathematics, 2024, 9(12): 35274-35292. doi: 10.3934/math.20241676
  • In this study, we investigate the stability and asymptotic stability properties of Caputo fractional time-dependent systems with delay by employing vector Lyapunov functions. Utilizing the Caputo fractional Dini derivative on Lyapunov-like functions, along with a new comparison theorem and differential inequalities, we derive and prove sufficient conditions for the stability and asymptotic stability of these complex systems. An example is included to showcase the method's practicality and to specifically illustrate its advantages over scalar Lyapunov functions. Our results improves, extends, and generalizes several existing findings in the literature.



    In the experiments of various fields such as sciences, public health, and medicine, a proper censoring scheme is often considered because censored data arise commonly. The most famous censoring scheme is the progressive Type-II (PT-II) censoring scheme, where the observation number m(n) and the associated censoring scheme R=(R1,,Rm) are pre-fixed, and the Ri surviving units are randomly withdrawn when the ith failure arises from the experiment. The PT-II censoring scheme is attractive in that cost and time are saved by withdrawing surviving units during the experiment. This advantage has given significant attention to this censoring scheme in the literature [1,2,3]. In particular, some authors developed inference methods based on a pivotal quantity as an alternative to the maximum likelihood method under the PT-II censoring scheme. Wang et al. [4] proved that a pivotal approach is superior to the maximum likelihood approach in parameter estimation of the two-parameter Weibull distribution for a small sample size. Seo and Kang [5] discussed a pivotal-based inference for estimating a scale parameter of the scaled half logistic distribution. They demonstrated the superiority of estimators based on a pivotal quantity for a small sample size, compared to the maximum likelihood estimator (MLE) and approximate MLEs. Seo et al. [6] studied an estimation method for unknown parameters of a Pareto distribution based on the regression-type framework using a pivotal quantity by extending the idea of Lu and Tao [7].

    However, the PT-II censoring scheme has a drawback in that the total experiment time can still be long. To overcome this issue, Ng et al. [8] proposed the use of the ideal experiment time T as an adapted version, and adapted the PT-II censoring scheme as follows: If the mth failure arises before time T, then the experiment is terminated at the time Xm:m:n, which is the same as the PT-II censoring scheme. If the mth failure arises after time T, then surviving units are not withdrawn from the experiment by setting RL+1==Rm1=0, where L(<m1) is the number of observed failures until time T. At the time of the mth failure, all remaining Rm=nmLi=1Ri surviving units are withdrawn. This censoring scheme is called the adaptive PT-II (APT-II) censoring scheme. The basic idea of the APT-II censoring scheme is to finish the experiment as fast as possible when the experiment duration exceeds a predetermined time T. So, this censoring scheme can save both the total experiment time and cost, and increase the efficiency of statistical analysis. Due to this efficiency, the APT-II censoring scheme has been discussed by some authors such as Sobhi and Soliman [9], Ye et al. [10], and Mohan and Chacko [11].

    This paper proposes an inference method based on a pivotal quantity under the APT-II censoring scheme. For an illustration of the proposed methodology, a Pareto distribution with the following cumulative distribution function (CDF) and probability density function is employed:

    F(x;λ,θ)=1(θx)λ (1.1)

    and

    f(x;λ,θ)=λθλx(λ+1),x>θ,λ>0,θ>0,

    respectively, where λ is the shape parameter of interest and θ is the scale parameter. The Pareto distribution is one of the most widely used distributions to model a wide range of real-world cases in various fields such as economics, sociology, and engineering. For example, the distribution of income, internet traffic, and urban population is known to follow the Pareto distribution. To improve the estimation performance of the Pareto distribution, some authors have studied the inference for unknown parameters of this distribution by applying a pivotal quantity. Chen [12] used a pivotal quantity to obtain a joint confidence region for unknown parameters. Wu [13] introduced a pivotal-based method for obtaining a joint confidence region for unknown parameters under the doubly Type-II censoring scheme. Zhang [14] provided simplified versions of Chen [12] and Wu [13] to avoid computational difficulties. Kim et al. [15] proposed an estimation method based on the regression-type framework using a pivotal quantity, which provides a consistent estimator for the shape parameter. However, despite the superiority of the pivotal-based method, Mohie El-Din et al. [16] discussed a Bayesian approach for the Pareto distribution under the APT-II censoring scheme, and the approach has a substantial computational burden. Alternatively, by extending a pivotal approach to the APT-II censoring scheme, this paper proposes an inference method based on its excellent scalability, and the superiority and applicability of the proposed method are substantiated. Significantly, this study marks a novel approach by utilizing a pivotal-based method for the first time, aimed at estimating the unknown parameters of the Pareto distribution within the context of the APT-II censoring scheme.

    For the Pareto distribution with CDF (1.1), classical methods such as the maximum likelihood and bootstrap methods have limitations in estimating confidence intervals (CIs) for λ and θ. The maximum likelihood method yields not exact but approximate CIs with the burden of computing the Fisher information matrix (FIM), and the approximate CIs do not ensure the satisfaction of the nominal levels when a sample size is not large enough. In addition, the asymptotic variance-covariance matrix (AVCM) of the MLEs suffers from a constraint. In the case of the bootstrap method, the CIs fail to satisfy nominal levels. These issues are expounded in Section 2. On the other hand, the proposed pivotal-based method not only easily leads to exact CIs (ECIs) for λ and θ without any conditions even in a situation where a sample size is not large enough, but also provides closed-form inference results.

    Furthermore, this paper introduces the generalized pivotal quantity (GPQ) under the APT-II censoring scheme, which is applicable to the inference for functions with unknown parameters. As a specific example, we develop a method of generating the replicated data from the marginal distribution for the observed APT-II censored sample, inferring the distribution.

    The rest of this paper is organized as follows: Section 2 proposes a pivotal-based estimation method for the unknown parameters of the Pareto distribution under the APT-II censoring scheme. Section 3 provides an algorithm, that generates the replicated data of the observed APT-II censored sample, based on GPQs. Section 4 conducts the Monte Carlo simulation and the real data analysis to assess the proposed methodology. Section 5 concludes this paper.

    Let X1:m:nXm:m:n be an APT-II censored sample with the censoring scheme

    R={R,if Xm:m:n<T,(R1,,RL,0mL1,nmLi=1Ri),if Xm:m:n>T, (2.1)

    where 0mL1 denotes a vector of zeros of the size mL1. The censoring scheme (2.1) means that the APT-II censoring scheme is the same as the PT-II censoring scheme for Xm:m:n<T, and does not allow the removal of experimental units by setting RL+1==Rm1=0 for Xm:m:n>T.

    Suppose that the APT-II censored sample has a Pareto distribution with CDF (1.1). The corresponding likelihood and its logarithm functions are given by

    L(λ,θ)λmθλnmi=1xλ(1+Ri)1i:m:n

    and

    logL(λ,θ)mlogλ+λnlogθλmi=1(1+Ri)logxi:m:n, (2.2)

    respectively. Since the log-likelihood function (2.2) is a monotonically increasing function of θ, the MLE of θ is obtained as ˆθ=X1:m:n. Then, the MLE of λ is obtained as ˆλ=m/(mi=1(1+Ri)logXi:m:nnlogX1:m:n) by maximizing the log-likelihood function with θ=X1:m:n. Note that the MLEs ˆλ and ˆθ are biased estimators. This is proved after stating Lemma 2.1. Moreover, constructing approximate CIs based on the MLEs is straightforward due to the asymptotic normality of the MLEs. However, this process necessitates the variance of the MLEs, which can be derived from the following FIM, calculated using the second partial derivatives of the negative log-likelihood function:

    I(λ,θ)=[E(2logL(λ,θ)λ2)E(2logL(λ,θ)λθ)E(2logL(λ,θ)θλ)E(2logL(λ,θ)θ2)]=(m/λ2n/θn/θnλ/θ2). (2.3)

    By inverting the FIM (2.3), the AVCM of the MLEs ˆλ and ˆθ is obtained as

    ˆΣ=(m/λ2n/θn/θnλ/θ2)1|(λ=ˆλ,θ=ˆθ)=ˆθ2ˆλn(mnˆλ)(nˆλ/ˆθ2n/ˆθn/ˆθm/ˆλ2),ˆλ<mn. (2.4)

    The diagonal elements of the AVCM (2.4) are the variances of the MLEs ˆλ and ˆθ, respectively. Note that the AVCM (2.4) does not always exist because of the constraint ˆλ<m/n. In other words, the construction of approximate CIs is not always possible. Alternatively, we propose inference based on the pivotal quantity under the APT-II censoring scheme.

    Let

    Yi:m:n=log(1F(xi:m:n;λ,θ))=λlog(Xi:m:nθ),i=1,,m. (2.5)

    Then, Y1:m:nYm:m:n is an APT-II censored sample that has a standard exponential distribution with mean E(Yi:m:n)=ij=11/Γj, where Γ1=n and Γj=nj1k=1(1+Rk) for j=2,,m. It is readily apparent that, as the quantity (2.5) is expressed as Yi:m:nd=log(1Ui:m:n), using the relationship F(Xi:m:n;λ,θ)d=Ui:m:n, where Ad=B denotes that A and B have the same distribution, and Ui:m:n is an ith APT-II censored order statistic from a standard uniform distribution. In addition, the quantity (2.5) induces the normalized spacings

    Zi=Γi(Yi:m:nYi1:m:n)=λΓilog(Xi:m:nXi1:m:n),i=1,,m,

    where Y0:m:n=0. Note that Zi (i=1,,m) are independent standard exponential random variables [17], which leads to some pivotal quantities that play an important role in deriving estimation equations. These pivotal quantities are provided in Lemma 2.1. Before introducing Lemma 2.1, to simply express the frequently used distributions, we declare two notations as follows: χ2v and F(d1,d2) denote a χ2 distribution with v degrees of freedom and an F distribution with (d1,d2) degrees of freedom, respectively.

    Lemma 2.1. Let X1:m:nXm:m:n be an APT-II censored sample with the censoring scheme R from the Pareto distribution with CDF (1.1). Then,

    (a)X1(λ)=2λ(mi=1(1+Ri)logXi:m:nnlogX1:m:n),(b)F(θ)=mi=1(1+Ri)logXi:m:nnlogX1:m:nn(m1)log(X1:m:n/θ),

    and

    (c)X2(θ)=2(m1)log(mj=1(1+Rj)logXj:m:nnlogθ)2m1i=1log[ij=1(1+Rj)logXj:m:n+(nij=1(1+Rj))logXi:m:nnlogθ],

    which have χ22(m1), F(2(m1),2), and χ22(m1) distributions, respectively.

    Proof. (a) and (b) are clear from X1(λ)=2mi=2Zi and F(θ)=(2mi=2Zi/[2(m1)])/(2Z1/2) since Zi(i=1,,m) are independent standard exponential random variables as mentioned earlier. In addition, the quantity ij=1Zj/mj=1Zj(i=1,,m1) are the order statistics from a standard uniform distribution with the sample size m1. Then, (c) is proved from

    X2(θ)=2m1i=1log(ij=1Zjmj=1Zj).

    This completes the proof.

    The following subsections provide inference results based on the pivotal quantities in Lemma 2.1.

    From the pivotal quantity X1(λ) in Lemma 2.1, it is easily proved that the MLE ˆλ is a biased estimator because it has an inverse gamma distribution with parameters (m1,λm). Alternatively, an estimator of λ is obtained as

    ˆλu=m2mi=1(1+Ri)logXi:m:nnlogX1:m:n.

    Theorem 2.2. The estimator ˆλu has unbiasedness and consistency.

    Proof. The estimator ˆλu has an inverse gamma distribution with parameters (m1,λ(m2)) from the pivotal quantity X1(λ) in Lemma 2.1. This indicates E(ˆλu )=λ and Var(ˆλu)=λ2/(m3). In addition, the variance Var(ˆλu) converges to zero in probability as m. This completes the proof.

    We introduce another consistent estimator for λ under the APT-II censoring scheme, which is derived from a weighted least squares approach based on a regression-type framework using the quantity (2.5).

    Let Di:m:n=Yi:m:nY1:m:n (i=2,,m). Then, its expectation is given by

    E(Di:m:n)=E(Yi:m:n)E(Y1:m:n)=ij=11Γj1Γ1=ij=21Γj,i=2,,m.

    Using it, we can consider the following linear regression model:

    E(Di:m:n)=λlog(Xi:m:nX1:m:n)+εi,i=2,,m, (2.6)

    where εi is the error term with E(εi)=0. Note that the regression model (2.6) is a simple regression model with no intercept and does not depend on θ. Then, the weighted least squares estimator for λ is obtained from Eq (2.6) by minimizing the quantity mi=2wi:m:n[E(Di:m:n)λlog(Xi:m:n/X1:m:n)]2 with respect to λ as

    ˆλw=mi=2wi:m:nE(Di:m:n)log(Xi:m:n/X1:m:n)mi=2wi:m:n[log(Xi:m:n/X1:m:n)]2, (2.7)

    where wi:m:n is the weight of each data point and assumes that it is not an identical constant.

    Theorem 2.3. Let wi:m:n=1/Var(Di:m:n) in the estimator (2.7), where Var(Di:m:n)=ij=2Γ2j,i=2,,m. Then, the estimator ˆλw is a consistent estimator.

    Proof. The estimator ˆλw with wi:m:n=1/Var(Di:m:n) can be written as

    ˆλw=λmi=2Di:m:nE(Di:m:n)/Var(Di:m:n)mi=2D2i:m:n/Var(Di:m:n)=λmi=2Q1,i:m:n+mi=2Q3,i:m:nmi=2Q2,i:m:n+mi=2Q3,i:m:n=λmi=2Q1,i:m:n/m2+mi=2Q3,i:m:n/m2mi=2Q2,i:m:n/m2+mi=2Q3,i:m:n/m2, (2.8)

    where

    Q1,i:m:n=Di:m:nE(Di:m:n)E2(Di:m:n)Var(Di:m:n),Q2,i:m:n=D2i:m:nE2(Di:m:n)Var(Di:m:n),Q3,i:m:m=E2(Di:m:n)Var(Di:m:n).

    In Eq (2.8), the quantities mi=2Q1,i:m:n/m2 and mi=2Q2,i:m:n/m2 converge to zero in probability as m. In addition, since the quantity mi=2Q3,i:m:n/m2 converges to a constant in probability as m, the fraction term in Eq (2.8) converges to 1 in probability as m. The results for these probability convergences can be easily shown according to Seo et al. [6]. The proof in Seo et al. [6] is restated to match our notation.

    The quantities mi=2Q1,i:m:n/m2 and mi=2Q2,i:m:n/m2 converge in the mean to 0 since

    E(|1m2mi=2Q1,i:m:n|)=0

    and

    E(|1m2mi=2Q2,i:m:n|)=m1m2,

    which implies convergence in probability [18]. In addition,

    1m2mi=2Q3,i:m:n=1m2mi=2{ij=2[mk=j(1+Rk)]1}2ij=2[mk=j(1+Rk)]21m2mi=2[ij=2(m1+mk=jRk)1]2ij=2(mi+1)2=1m2mi=2(i1)(mi+1m1+mk=jRk)2=1m2(m1+mk=jRk)2(m2mj=1j+mj=1j32mmj=1j2),

    which converges to a constant as m. This completes the proof.

    The estimation for θ can be accomplished by a similar argument to that used for obtaining the estimator ˆλu. To do this, we employ the pivotal quantity F(θ) in Lemma 2.1. The inverse of the pivotal quantity F(θ) is written as

    1F(θ)=2Z1/22mi=2Zi/[2(m1)], (2.9)

    which has an F(2,2(m1)) distribution. By Slutsky's theorem [19], the distribution of 2/F(θ) converges to a χ22 distribution as m since the denominator term in (2.9) converges to 1 in probability as m. Then, using the mean of a χ22 distribution, an equation for θ is obtained as 2/F(θ)=2. From the equation, an estimator of θ is derived as

    ˆθp=X1:m:nexp(mi=1(1+Ri)logXi:m:nnlogX1:m:nn(m1)).

    Theorem 2.4. The estimator ˆθp is an asymptotic unbiased and consistent estimator.

    Proof. Since the quantity (mi=1(1+Ri)logXi:m:nnlogX1:m:n)/[n(m1)] has a gamma distribution with parameters (m1,nλ(m1)), by its moment generating function, we have

    E[exp(mi=1(1+Ri)logXi:m:nnlogX1:m:nn(m1))]=[1+1nλ(m1)](m1) (2.10)

    and

    E[exp(2(mi=1(1+Ri)logXi:m:nnlogX1:m:n)n(m1))]=[1+2nλ(m1)](m1). (2.11)

    In addition, the first and second moments of X1:m:n are

    E(X1:m:n)=θnλ(θx)λndx=nλθnλ1,λ>1n (2.12)

    and

    E(X21:m:n)=θnλx(θx)λndx=nλθ2nλ2,λ>2n, (2.13)

    respectively. Then, using (2.10) and (2.12), the mean of the estimator ˆθp is obtained as

    E(ˆθp)=E[X1:m:nexp(mi=1(1+Ri)logXi:m:nnlogX1:m:nn(m1))]=E(X1:m:n)E[exp(mi=1(1+Ri)logXi:m:nnlogX1:m:nn(m1))]=nλθ(nλ1)[1+1nλ(m1)](m1)

    and using (2.10)–(2.13), the variance of the estimator ˆθp is obtained as

    Var(ˆθp)=Var[X1:m:nexp(mi=1(1+Ri)logXi:m:nnlogX1:m:nn(m1))]={E[exp(mi=1(1+Ri)logXi:m:nnlogX1:m:nn(m1))]}2Var(X1:m:n)+Var[exp(mi=1(1+Ri)logXi:m:nnlogX1:m:nn(m1))]E(X21:m:n)=[1+1nλ(m1)]2(m1)n2λ2θ2(nλ1)2+[1+2nλ(m1)](m1)nλθ2(nλ2)=[1+1(m+mi=1Ri)λ(m1)]2(m1)(m+mi=1Ri)2λ2θ2[(m+mi=1Ri)λ1]2+[1+2(m+mi=1Ri)λ(m1)](m1)(m+mi=1Ri)λθ2[(m+mi=1Ri)λ2].

    The mean E(ˆθp) converges to θ in probability as m, and the variance Var(ˆθp) converges to zero in probability as m. This completes the proof.

    Note that the estimator ˆθp is not unbiased because of E(ˆθp)θ. So, we provide another estimator for θ that is improved in terms of the bias. From (2.12), an unbiased estimator of θ is obtained as X1:m:n[11/(nλ)] for known λ. Then, by substituting λ with the MLE ˆλ, an unbiased estimator of θ is derived as

    ˆθu=X1:m:n[1mn(m1)ˆλ]=X1:m:n[1mi=1(1+Ri)logXi:m:nnlogX1:m:nn(m1)].

    The relationship ˆθpˆθu is satisfied because of exp(a)1a for all real numbers a which can be easily shown from the Maclaurin series exp(a)=1+a+i=2ai/i! for all real numbers a.

    Theorem 2.5. The estimator ˆθu has unbiasedness and consistency.

    Proof. The inverse of MLE ˆλ has a gamma distribution with parameters (m1,λm), and its first and second moments are

    E(1ˆλ)=m1λm (2.14)

    and

    E(1ˆλ2)=m1λ2m, (2.15)

    respectively. Then, using (2.12) and (2.14), the mean of the estimator ˆθu is obtained as

    E(ˆθu)=E[X1:m:n(1mn(m1)ˆλ)]=E(X1:m:n)E(X1:m:n)E[mn(m1)ˆλ]=nλθnλ1θnλ1=θ.

    Using (2.12)–(2.15), the variance of the estimator ˆθu is obtained as

    Var(ˆθu)=Var[X1:m:n(1mn(m1)ˆλ)]={E[1mn(m1)ˆλ]}2Var(X1:m:n)+Var[1mn(m1)ˆλ]E(X2i:m:n)=mθ2nλ(nλ2)(m1)=mθ2(m+mi=1Ri)λ[(m+mi=1Ri)λ2](m1),

    which converges to zero as m. This completes the proof.

    On the other hand, the pivotal quantity X2(θ) yields an estimation equation X2(θ)=2(m2) from the fact that X2(θ)/2(m2) converges to 1 in probability as m. However, the equation does not provide a closed form of solution, so it is not considered here.

    As mentioned earlier, the approximate CIs based on the MLEs are constructed when the condition ˆλ<m/n is satisfied. Another classical method of constructing CIs for λ and θ is based on the bootstrap method. It is conducted through the following steps: First, the MLEs ˆλ and ˆθ are calculated based on the original APT-II censored sample. Second, B bootstrap APT-II censored samples are generated from the marginal distribution with the MLEs ˆλ and ˆθ, which is denoted as X(b)1:m:nX(b)m:m:n,b=1,,B. Then, the MLEs for λ and θ are calculated based on the bootstrap APT-II censored sample {X(b)1:m:n,,X(b)m:m:n}, and it is denoted as ˆλ(b) and ˆθ(b),b=1,,B, respectively. After obtaining {ˆλ(1),,ˆλ(B)} and {ˆθ(1),,ˆθ(B)}, we can construct the CIs for λ and θ using their percentiles. In other words, 100(1α)% CIs for λ and θ are constructed as (ˆλ([(α/2)B]),ˆλ([(1α/2)B])) and (ˆθ([(α/2)B]),ˆθ([(1α/2)B])) for 0<α<1, where ˆλ([αB]) and ˆθ([αB]) denote the [αB]th smallest values of {ˆλ(1),,ˆλ(B)} and {ˆθ(1),,ˆθ(B)}, respectively. However, the CI for θ does not satisfy nominal levels because ˆθ(b)=X(b)1:m:n,b=1,,B is always greater than the true value of θ.

    The pivotal-based interval inference we now provide can address these limitations, and it does not require complex mathematical calculations, unlike the FIM. Even for a small sample size, the estimated interval from the pivotal quantity satisfies nominal levels well. Here, ECIs for λ and θ are provided using the pivotal quantities in Lemma 2.1.

    For λ, since the pivotal quantity X1(λ) in Lemma 2.1 has a χ22(m1) distribution, it follows that

    1α=P[χ21α/2,2(m1)<2λ(mi=1(1+Ri)logXi:m:nnlogX1:m:n)<χ2α/2,2(m1)]

    for 0<α<1, where χ2α,2(m1) denotes the upper α percentile of a χ22(m1) distribution. Then, an exact 100(1α)% CI for λ is given by

    [χ21α/2,2(m1)2(mi=1(1+Ri)logXi:m:nnlogX1:m:n),χ2α/2,2(m1)2(mi=1(1+Ri)logXi:m:nnlogX1:m:n)].

    For θ, since the pivotal quantity F(θ) in Lemma 2.1 has an F(2(m1),2) distribution, it follows that

    1α=P[F1α/2(2(m1),2)<mi=1(1+Ri)logXi:m:nnlogX1:m:nn(m1)log(X1:m:n/θ)<Fα/2(2(m1),2)]

    for 0<α<1, where Fα(2(m1),2) denotes the upper α percentile of an F(2(m1),2) distribution. Then, an exact 100(1α)% CI for θ is given by

    [X1:m:nexp(Fα/2(2,2(m1))g(X)),X1:m:nexp(F1α/2(2,2(m1))g(X))],

    where g(X)=(mi=1(1+Ri)logXi:m:nnlogX1:m:n)/[n(m1)].

    Let Xrepi:m:n(i=1,,m) be the replicated data of the observed APT-II censored sample x={x1:m:n,,xm:m:n} with the censoring scheme R. The replicated data Xrepi:m:n is generated by inferring the marginal distribution F(Xrepi:m:n|x;λ,θ) based on the observed APT-II censored sample. To achieve it, GPQs for λ and θ are first defined as

    G1(λ)=X1(λ)2(mi=1(1+Ri)logxi:m:nnlogx1:m:n)

    and

    G2(θ)=exp(logx1:m:nmi=1(1+Ri)logxi:m:nnlogx1:m:nn(m1)F(θ)),

    respectively, according to the argument of Weerahandi [20]. The GPQs G1(λ) and G2(θ) obviously have two properties: The distributions of the GPQs G1(λ) and G2(θ) are free of unknown parameters, and the realization of the GPQs G1(λ) and G2(θ) does not depend on the nuisance parameter.

    The realization of the GPQs G1(λ) and G2(θ) is obtained by using a pseudorandom sequence from a χ22 distribution based on an idea on which the pivotal quantities X1(λ) and F(θ) in Lemma 2.1 are derived. Then, by substituting λ and θ in the marginal distribution F(Xrepi:m:n|x;λ,θ) with the realization of the GPQs G1(λ) and G2(θ), respectively, the replicated data Xrepi:m:n is generated. The detailed steps are given in the following algorithm:

    Algorithm 1

    (a) Generate ζ1,,ζm from a χ22 distribution.

    (b) Compute X=mi=2ζi, followed by G1(λ)=X2(mi=1(1+Ri)logxi:m:nnlogx1:m:n).

    (c) Compute F=mi=2ζi/[2(m1)]/(ζ1/2), followed by G2(θ)=exp(logx1:m:nmi=1(1+Ri)logxi:m:nnlogx1:m:nn(m1)F).

    (d) Generate Xrepi:m:n from the sampling distribution F(Xrepi:m:n|x;G1(λ),G2(θ)).

    (e) Repeat N(10,000) times (a)–(d).

    From Algorithm 1, a 100(1α)% interval for the replicated data Xrepi:m:n is constructed as

    (Xrep,([(α/2)N])i:m:n,Xrep,([(1α/2)N])i:m:n),

    where Xrep,([αN])i:m:n denotes the [αN]th smallest value of {Xrep,1i:m:n,,Xrep,Ni:m:n}. This interval is employed to evaluate the uncertainty of the replicated data Xrepi:m:n in Section 4.2.

    The proposed methodology is evaluated using the Monte Carlo simulation technique. Moreover, its applicability and scalability are examined by performing real-world data analysis.

    To verify the estimation performance of the proposed estimators in comparison with the MLEs, Monte Carlo simulations with 10,000 replications are conducted through the R software. For the Pareto distribution, the shape parameter of interest, λ, is assigned 0.5(0.5)1.5 to showcase the variations in results according to the values of λ, and the scale parameter θ is assigned 1 without loss of generality. In addition, the following censoring scheme is employed to emphasize the strength of the proposed methodology for a sample size that is not large enough in various situations:

    Scheme I : n=20,m=8,R=(13,04,9),II : n=20,m=8,R=(22,05,8),III : n=20,m=6,R=(12,03,12),IV : n=20,m=6,R=(2,04,12),V : n=40,m=16,R=(17,08,17),VI : n=40,m=16,R=(26,09,12),VII : n=40,m=12,R=(15,06,23),VIII : n=40,m=12,R=(24,07,20).

    For each censoring scheme, an APT-II censored sample is generated using the following steps:

    (a) Generate an ordinary PT-II censored sample X1:m:n,,Xm:m:n with the censoring scheme R from the algorithms of Balakrishnan and Sandhu [21] as follows:

    (1) Generate m random numbers W1,,Wm from a standard uniform distribution.

    (2) Compute Vi=W1/(i+Rm++Rmi+1)i, i=1,,m.

    (3) Compute Ui=1VmVmi+1, i=1,,m, where U1,,Um is a PT-II censored sample of size m from a standard uniform distribution.

    (4) Compute Xi:m:n=θ/(1Ui)1/λ, i=1,,m, to obtain a PT-II censored sample from the Pareto distribution with CDF (1.1).

    (b) Determine the value of L, where XL:m:n<T<XL+1:m:n.

    (c) Generate the first ml1 order statistics from a truncated distribution f(x)/[1F(xl+1:m:n)] with sample size nli=1(1+Ri)1.

    (d) Substitute Xl+2:m:n,,Xm:m:n with the first ml1 order statistics obtained in (c).

    To ensure that the number of simulated APT-II censored samples observed until T is greater than 1, we assign T=2.5. Based on the generated APT-II censored samples, the mean squared errors (MSEs) and biases of the provided estimators are computed for each censoring scheme. The results are reported in Figure 1. In addition, the coverage probabilities (CPs) for the exact 95% CIs are provided in Figure 2. As mentioned earlier, the approximate and bootstrap CIs based on the MLEs suffer from constraints. Accordingly, only the results of the proposed ECIs for λ and θ are reported.

    Figure 1.  MSEs and biases of estimators for (a) λ and (b) θ.
    Figure 2.  CPs of ECIs for λ and θ.

    In Figure 1, the length of the line indicates the difference from the true value, so the shorter this is, the better the performance of the corresponding estimator. Based on this argument, the results are summarized as follows: For λ, ˆλu has the best performance in terms of the MSE and bias, followed by ˆλw. For θ, ˆθp and ˆθu are more efficient than ˆθ in terms of the MSE and bias. To be specific, ˆθu has the smallest bias, as expected, while ˆθp is slightly better than ˆθu in terms of the MSE. Taken together, the proposed estimators have generally better performance than the corresponding MLEs in terms of MSE and bias. Furthermore, the use of the proposed estimators, especially ˆλu and ˆθu, is strongly recommended to infer the unknown parameters of the Pareto distribution with CDF (1.1) when the sample size is not large enough. In Figure 2, the length of the line represents the difference from the considered nominal level 0.95. According to this argument, the proposed intervals have a highly closer CP to the considered nominal level.

    In conclusion, the results in Figures 1 and 2 reveal that the proposed estimation method yields more satisfactory results than the maximum likelihood estimation method in a situation where the sample size is not large enough.

    The Pareto distribution is often employed for modeling a wide range of real-world datasets, such as insurance, reliability, engineering, and economics. In this subsection, the mortality rate of COVID-19 studied by Almetwally et al. [22] and Nik et al. [23] is analyzed to validate the practical application of the proposed approaches for a real-world dataset, where the mortality rate refers to the proportion of individuals who have died in a specific population or group affected by a particular disease. Nik et al. [23] applied a new Pareto-type distribution to the mortality rate of COVID-19 for 25 days, from 10 April to 4 May 2020, in Canada, and the data is as follows:

    3.1091 3.3825 3.1444 3.2135 2.4946 3.5146 4.9274 3.3769 6.8686 3.0914 4.9378 3.1091 3.2823
    3.8594 4.0480 4.1685 3.6426 3.2110 2.8636 3.2218 2.9078 3.6346 2.7957 4.2781 4.2202

    For analysis, an APT-II censored sample is generated from the above dataset by setting R=(2,111) with m=12 and T=3.15. The generated APT-II censored sample and the analysis results are reported in Tables 1 and 2, respectively.

    Table 1.  An APT-II censored sample from the mortality rate of COVID-19.
    i 1 2 3 4 5 6 7 8 9 10 11 12
    xi:12:25 2.4946 2.7957 2.8636 2.9078 3.1091 3.1091 3.2218 3.2823 3.3769 3.3825 3.6346 3.6426

     | Show Table
    DownLoad: CSV
    Table 2.  Estimates and 95% CIs of λ and θ.
    Estimates 95% CIs
    ˆλ ˆλu ˆλw ˆθ ˆθp ˆθu ECI for λ ECI for θ
    2.050 1.708 1.209 2.495 2.441 2.442 (0.938,3.141) (2.272,2.493)

     | Show Table
    DownLoad: CSV

    Additionally, to examine the applicability of Algorithm 1 in Section 3, the 95% intervals for the replicated data Xrepi:12:25 are obtained based on N=20000. The resulting plot is presented in Figure 3, which shows that the observed APT-II censored sample lies well within the 95% intervals. This result reveals the applicability of the provided Algorithm 1 for real-world data analysis. In addition, Figure 3 shows the goodness-of-fit test results obtained through the plug-in method. The plug-in method generates the replicated data Xrepi:12:25 by substituting the unknown parameters λ and θ in the marginal distribution F(Xrepi:12:25|x;λ,θ) with their estimators. Here, 20,000 replicated data Xrepi:12:25 are from F(Xrepi:12:25|x;ˆλ,ˆθ) and F(Xrepi:12:25|x;ˆλu,ˆθp), and the empirical mean is computed. From Figure 3, it can be seen that the APT-II censored sample reported in Table 1 has the Pareto distribution because the points are close to a straight line.

    Figure 3.  95% intervals for Xrepi:12:25 and the scatter plot between the APT-II censored sample xi:12:25 and the empirical mean of Xrepi:12:25.

    The main goal of this paper is the proposal of an efficient inference method compared to classical methods under the APT-II censoring scheme. To achieve this goal, we employed the pivotal quantity. For illustration, the proposed method was applied to the Pareto distribution and provided closed-form estimators with excellent properties for the unknown parameters. In addition, the pivotal approach led to the exact inference results for the unknown parameters even when a sample size is not large enough, unlike the maximum likelihood and bootstrap methods which suffer from constraints. Additionally, an algorithm was proposed that generates the replicated data based on the GPQs.

    The proposed methodology was evaluated through Monte Carlo simulations for small and middle sample sizes. Our results showed that the provided estimators are superior to the MLEs in terms of MSE and bias, and, especially, the unbiased and consistent estimators ˆλu and ˆθu have the best performance. In addition, the proposed intervals are clearly exact for unknown parameters, and it is demonstrated that their CPs are highly close to the considered nominal level in simulation results. These results reveal the usefulness of the proposed method in a situation where the sample size is not large enough. Additionally, the mortality rate of COVID-19 in Canada was analyzed, through which the applicability of the proposed methodology for a real-world dataset is demonstrated.

    In conclusion, for the Pareto distribution, the proposed methodology has superior performance when the sample size is not large enough, in comparison to the classical method. While this paper primarily provided insights into the Pareto distribution, future studies will delve into several critical aspects. First, the efficiency and accuracy of the proposed methodology will be assessed in various realistic scenarios, to extend its practical utility. Second, the applicability of our approach to various other probability distributions will be explored, broadening the scope of the study. In addition, a sensitivity analysis will also be conducted to ascertain the robustness of our methodology, especially in situations where the distribution estimation may be incorrect. Finally, subsequent studies will focus on validating the performance of our approach in real-world applications, and a deeper exploration of applicability in industrial settings will be undertaken.

    The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.

    The authors declare there is no conflict of interest.



    [1] J. B. Hu, G. P. Lu, S. B. Zhang, L. D. Zhao, Lyapunov stability theorem about fractional system without and with delay, Commun. Nonlinear Sci. Numer. Simul., 20 (2015), 905–913. https://doi.org/10.1016/j.cnsns.2014.05.013 doi: 10.1016/j.cnsns.2014.05.013
    [2] A. A. Kilbas, H. M. Srivastava, J. J. Trujillo, Theory and applications of fractional differential equations, Elsevier, 2006.
    [3] K. S. Miller, B. Ross, An introduction to the fractional calculus and fractional differential equations, New York: Wiley, 1993.
    [4] I. Podlubny, Fractional differential equations: An introduction to fractional derivatives, fractional differential equations, to methods of their solution and some of their applications, San Diego: Academic Press, 1999.
    [5] R. P. Agarwal, Y. Zhou, Y. He, Existence of fractional neutral functional differential equations, Comput. Math. Appl., 59 (2010), 1095–1100. https://doi.org/10.1016/j.camwa.2009.05.010 doi: 10.1016/j.camwa.2009.05.010
    [6] M. Benchohra, J. Henderson, S. K. Ntouyas, A. Ouahab, Existence results for fractional order functional differential equations with infinite delay, J. Math. Anal. Appl., 338 (2008), 1340–1350. https://doi.org/10.1016/j.jmaa.2007.06.021 doi: 10.1016/j.jmaa.2007.06.021
    [7] A. Chauhan, J. Dabas, Local and global existence of mild solution to an impulsive fractional functional integro-differential equation with nonlocal condition, Commun. Nonlinear Sci. Numer. Simul., 19 (2014), 821–829. https://doi.org/10.1016/j.cnsns.2013.07.025 doi: 10.1016/j.cnsns.2013.07.025
    [8] T. Jankowski, Existence results to delay fractional differential equations with nonlinear boundary conditions, Appl. Math. Comput., 219 (2013), 9155–9164. https://doi.org/10.1016/j.amc.2013.03.045 doi: 10.1016/j.amc.2013.03.045
    [9] W. Deng, C. Li, J. Lü, Stability analysis of linear fractional differential system with multiple time delays, Nonlinear Dyn., 48 (2007), 409–416. https://doi.org/10.1007/s11071-006-9094-0 doi: 10.1007/s11071-006-9094-0
    [10] J. Čermák, Z. Došlá, T. Kisela, Fractional differential equations with a constant delay: Stability and asymptotics of solutions, Appl. Math. Comput., 298 (2017), 336–350. https://doi.org/10.1016/j.amc.2016.11.016 doi: 10.1016/j.amc.2016.11.016
    [11] H. T. Tuan, H. Trinh, A linearized stability theorem for nonlinear delay fractional differential equations, IEEE Trans. Automat. Control, 63 (2018), 3180–3186. https://doi.org/10.1109/TAC.2018.2791485 doi: 10.1109/TAC.2018.2791485
    [12] M. Li, J. Wang, Exploring delayed Mittag-Leffler type matrix functions to study finite time stability of fractional delay differential equations, Appl. Math. Comput., 324 (2018), 254–265. https://doi.org/10.1016/j.amc.2017.11.063 doi: 10.1016/j.amc.2017.11.063
    [13] N. T. Thanh, V. N. Phat, P. Niamsup, New finite-time stability analysis of singular fractional differential equations with time-varying delay, Fract. Calc. Appl. Anal., 23 (2020), 504–519. https://doi.org/10.1515/fca-2020-0024 doi: 10.1515/fca-2020-0024
    [14] Y. Chen, K. L. Moore, Analytical stability bound for a class of delayed fractional-order dynamic systems, Nonlinear Dyn., 29 (2002), 191–200. https://doi.org/10.1023/A:1016591006562 doi: 10.1023/A:1016591006562
    [15] E. Kaslik, S. Sivasundaram, Analytical and numerical methods for the stability analysis of linear fractional delay differential equation, J. Comput. Appl. Math., 236 (2012), 4027–4041. https://doi.org/10.1016/j.cam.2012.03.010 doi: 10.1016/j.cam.2012.03.010
    [16] M. P. Lazarevic, Finite time stability analysis of PDα fractional control of robotic time-delay systems, Mech. Res. Commun., 33 (2006), 269–279. https://doi.org/10.1016/j.mechrescom.2005.08.010 doi: 10.1016/j.mechrescom.2005.08.010
    [17] A. Mesbahi, M. Haeri, Stability of linear time invariant fractional delay systems of retardee type in the space of delay parameters, Automatica, 49 (2013), 1287–1294. https://doi.org/10.1016/j.automatica.2013.01.041 doi: 10.1016/j.automatica.2013.01.041
    [18] S. B. Bhalekar, Stability analysis of a class of fractional delay differential equations, Pramana J. Phys., 81 (2013), 215–224. https://doi.org/10.1007/s12043-013-0569-5 doi: 10.1007/s12043-013-0569-5
    [19] V. Lakshmikantham, Theory of fractional functional differential equations, Nonlinear Anal. Theory Methods Appl., 69 (2008), 3337–3343. https://doi.org/10.1016/j.na.2007.09.025 doi: 10.1016/j.na.2007.09.025
    [20] I. Stamova, Global Mittag-Leffler stability and synchronization of impulsive fractional-order neural networks with time-varying delays, Nonlinear Dyn., 77 (2014), 1251–1260. https://doi.org/10.1007/s11071-014-1375-4 doi: 10.1007/s11071-014-1375-4
    [21] S. J. Sadati, R. Ghaderi, N. Ranjbar, Some fractional comparison results and stability theorem for fractional time delay systems, Rom. Rep. Phys., 65 (2013), 94–102.
    [22] R. Agarwal, R. Almeida, S. Hristova, D. O'Regan, Caputo fractional differential equation with state dependent delay and practical stability, Dyn. Syst. Appl., 28 (2019), 715–742.
    [23] Y. Li, Y. Chen, I. Podlubny, Stability of fractional-order nonlinear dynamic systems: Lyapunov direct method and generalized Mittag-Leffler stability, Comput. Math. Appl., 59 (2010), 1810–1821. https://doi.org/10.1016/j.camwa.2009.08.019 doi: 10.1016/j.camwa.2009.08.019
    [24] R. Agarwal, S. Hristova, D. O'Regan, Lyapunov functions and strict stability of Caputo fractional differential equations, Adv. Differ. Equ., 2015 (2015), 346. https://doi.org/10.1186/s13662-015-0674-5 doi: 10.1186/s13662-015-0674-5
    [25] R. Agarwal, S. Hristova, D. O'regan, Lyapunov functions and stability of Caputo fractional differential equations with delays, Differ. Equ. Dyn. Syst., 30 (2022), 513–534. https://doi.org/10.1007/s12591-018-0434-6 doi: 10.1007/s12591-018-0434-6
    [26] R. Agarwal, D. O'Regan, S. Hristova, Stability of Caputo fractional differential equations by Lyapunov functions, Appl. Math., 60 (2015), 653–676. https://doi.org/10.1007/s10492-015-0116-4 doi: 10.1007/s10492-015-0116-4
    [27] R. Agarwal, S. Hristova, D. O'Regan, A survey of Lyapunov functions, stability and impulsive Caputo fractional differential equations, Fract. Calc. Appl. Anal., 19 (2016), 290–318. https://doi.org/10.1515/fca-2016-0017 doi: 10.1515/fca-2016-0017
    [28] R. Agarwal, D. O'Regan, S. Hristova, M. Cicek, Practical stability with respect to initial time difference for Caputo fractional differential equations, Commun. Nonlinear Sci. Numer. Simul., 42 (2017), 106–120. https://doi.org/10.1016/j.cnsns.2016.05.005 doi: 10.1016/j.cnsns.2016.05.005
    [29] W. M. Haddad, V. Chellaboina, Nonlinear dynamical systems and control: A Lyapunov-based approach, Princeton University Press, 2008.
    [30] H. K. Khalil, Control of nonlinear systems, New York: Prentice Hall, 2002.
    [31] K. S. Narendra, J. Balakrishnan, A common Lyapunov function for stable LTI systems with commuting A-matrices, IEEE Trans. Automat. Control, 39 (1994), 2469–2471. https://doi.org/10.1109/9.362846 doi: 10.1109/9.362846
    [32] S. Raghavan, J. K. Hedrick, Observer design for a class of nonlinear systems, Int. J. Control, 59 (1994), 515–528. https://doi.org/10.1080/00207179408923090 doi: 10.1080/00207179408923090
    [33] E. P. Akpan, On the ϕ0-stability of functional differential equations, Aequationes Math., 52 (1996), 81–104. https://doi.org/10.1007/BF01818328 doi: 10.1007/BF01818328
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(996) PDF downloads(56) Cited by(3)

Figures and Tables

Figures(1)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog