Research article

Analysis of competing risks model using the generalized progressive hybrid censored data from the generalized Lomax distribution

  • The competing risk (CR) model is crucial for studying various areas, such as biology, econometrics, and engineering. When multiple factors could cause a product to fail, these factors often work against each other, resulting in the product's failure. This scenario is known as the CR problem. This study focused on parameter estimation of the generalized Lomax distribution under a generalized progressive hybrid censoring scheme in the presence of CR when the cause of failure for each item was known and independent. Both maximum likelihood (ML) and Bayesian approaches were used to estimate the unknown parameters, reliability characteristics, and relative risks due to two causes. Bayesian estimators under gamma priors with different loss functions were generated using Markov chain Monte Carlo, and confidence intervals (CIs) were generated using the ML estimation method. Additionally, two bootstrap CIs for the unknown parameters were presented. According to the conditional posterior distribution, credible intervals and the highest posterior density intervals were further generated. The performance of different estimators was compared using Monte Carlo simulation, and real-data applications were used to verify the proposed estimates.

    Citation: Amal Hassan, Sudhansu Maiti, Rana Mousa, Najwan Alsadat, Mahmoued Abu-Moussa. Analysis of competing risks model using the generalized progressive hybrid censored data from the generalized Lomax distribution[J]. AIMS Mathematics, 2024, 9(12): 33756-33799. doi: 10.3934/math.20241611

    Related Papers:

    [1] Yijia Zhang, Tao Xie, Yunlong Ma . Robustness analysis of exponential stability of Cohen-Grossberg neural network with neutral terms. AIMS Mathematics, 2025, 10(3): 4938-4954. doi: 10.3934/math.2025226
    [2] Pratap Anbalagan, Evren Hincal, Raja Ramachandran, Dumitru Baleanu, Jinde Cao, Chuangxia Huang, Michal Niezabitowski . Delay-coupled fractional order complex Cohen-Grossberg neural networks under parameter uncertainty: Synchronization stability criteria. AIMS Mathematics, 2021, 6(3): 2844-2873. doi: 10.3934/math.2021172
    [3] Ruoyu Wei, Jinde Cao, Wenhua Qian, Changfeng Xue, Xiaoshuai Ding . Finite-time and fixed-time stabilization of inertial memristive Cohen-Grossberg neural networks via non-reduced order method. AIMS Mathematics, 2021, 6(7): 6915-6932. doi: 10.3934/math.2021405
    [4] Biwen Li, Yibo Sun . Stability analysis of Cohen-Grossberg neural networks with time-varying delay by flexible terminal interpolation method. AIMS Mathematics, 2023, 8(8): 17744-17764. doi: 10.3934/math.2023906
    [5] Er-Yong Cong, Yantao Wang, Xian Zhang, Li Zhu . A new approach for accuracy-preassigned finite-time exponential synchronization of neutral-type Cohen–Grossberg memristive neural networks involving multiple time-varying leakage delays. AIMS Mathematics, 2025, 10(5): 10917-10942. doi: 10.3934/math.2025496
    [6] Shuting Chen, Ke Wang, Jiang Liu, Xiaojie Lin . Periodic solutions of Cohen-Grossberg-type Bi-directional associative memory neural networks with neutral delays and impulses. AIMS Mathematics, 2021, 6(3): 2539-2558. doi: 10.3934/math.2021154
    [7] R. Sriraman, R. Samidurai, V. C. Amritha, G. Rachakit, Prasanalakshmi Balaji . System decomposition-based stability criteria for Takagi-Sugeno fuzzy uncertain stochastic delayed neural networks in quaternion field. AIMS Mathematics, 2023, 8(5): 11589-11616. doi: 10.3934/math.2023587
    [8] Qinghua Zhou, Li Wan, Hongshan Wang, Hongbo Fu, Qunjiao Zhang . Exponential stability of Cohen-Grossberg neural networks with multiple time-varying delays and distributed delays. AIMS Mathematics, 2023, 8(8): 19161-19171. doi: 10.3934/math.2023978
    [9] Mohammed D. Kassim . A fractional Halanay inequality for neutral systems and its application to Cohen-Grossberg neural networks. AIMS Mathematics, 2025, 10(2): 2466-2491. doi: 10.3934/math.2025115
    [10] Zhiying Li, Wangdong Jiang, Yuehong Zhang . Dynamic analysis of fractional-order neural networks with inertia. AIMS Mathematics, 2022, 7(9): 16889-16906. doi: 10.3934/math.2022927
  • The competing risk (CR) model is crucial for studying various areas, such as biology, econometrics, and engineering. When multiple factors could cause a product to fail, these factors often work against each other, resulting in the product's failure. This scenario is known as the CR problem. This study focused on parameter estimation of the generalized Lomax distribution under a generalized progressive hybrid censoring scheme in the presence of CR when the cause of failure for each item was known and independent. Both maximum likelihood (ML) and Bayesian approaches were used to estimate the unknown parameters, reliability characteristics, and relative risks due to two causes. Bayesian estimators under gamma priors with different loss functions were generated using Markov chain Monte Carlo, and confidence intervals (CIs) were generated using the ML estimation method. Additionally, two bootstrap CIs for the unknown parameters were presented. According to the conditional posterior distribution, credible intervals and the highest posterior density intervals were further generated. The performance of different estimators was compared using Monte Carlo simulation, and real-data applications were used to verify the proposed estimates.



    The lattice Boltzmann (LB) method, originating from lattice gas automata (LGA), is a powerful computational fluid technique that has achieved much progress in the past three decades. In an LGA model, the flow of fluids is simulated by the movement and collision of a large number of indistinguishable particles on a regular spatial lattice. The Boolean variables are used to describe the particle distribution in the system. The density and velocity of the fluids are calculated through statistical processing of these Boolean variables. Although the LGA appears promising in simulating fluid problems, it has several disadvantages due to the iteration of Boolean variables. To improve on the LGA, in a general LB model, the ensemble-averaged particle distribution functions and the linearized Bhatnagar-Gross-Krook (BGK) approximation is applied to overcome the statistical noise and exponential complexity from which the LGA suffers [1,2,3]. Among the various numerical methods, the LB model has emerged as an impressive candidate because of its efficiency and simplicity in simulating multiphase flows [4,5,6,7,8], compressible flows [9,10], turbulent flows [11,12], combustion [13,14], non-Newtonian flows [15,16] and more.

    In addition, by selecting specific forms of distribution functions, the LB method has been widely employed to solve partial differential equations (PDEs) numerically, such as wave equations [17,18,19], Korteweg-de Vries (KdV) equations [20,21,22], convection-diffusion equations [23,24,25], reaction-diffusion equations [26,27], and nonlinear Schrödinger equations [28,29].

    In this research, the following (2+1)-dimensional Kadomtsev-Petviashvili (KP) equation will be investigated:

    x(ut+6uux+3ux3)+γ2uy2=0. (1)

    If the parameter is γ=3, Eq (1) is called the Kadomtsev-Petviashvili-Ⅰ type (KPI) equation. Conversely, in the case γ=3, Equation (1) is called the Kadomtsev-Petviashvili-Ⅱ type (KPII) equation. Both the KPI and KPII equations are fully integrable. The equation was first introduced by Kadomtsev and Petviashvili to analyze the stability of one-dimensional solitary pulses under transverse perturbations [30]. Regarded as an extension of the KdV equation in two-dimensional space, Eq (1) was developed for many application areas. For example, under the assumptions of long wavelengths and micro amplitudes, the water waves are governed by KP equations [30]. Bryant found that the propagation of weakly dispersive waves can be described with KP equations [31]. The two-dimensional shallow water waves with finite amplitude can be modeled from the KP equation [32]. Moreover, Xue found that several dust-acoustic solitons can be obtained by KP equations [33].

    Given a wide range of applications in nonlinear science, KP equations have attracted much attention. To date, considerable theoretical studies and numerical simulations have been performed on KP equations. For example, Kricher et al. investigated the explicit solutions of KP equations [34,35]. Zhao proposed the extended mapping method to derive several exact solutions of KP equations and analyzed the interactions among different solitary waves [36]. Qin et al. introduced the extended homoclinic test method to study the breather wave and rogue wave solutions of the KP equations, which are important for describing several phenomena in plasma physics and fluid mechanics [37]. The Hirota bilinear method, which can be used to find the analytical solutions of PDEs [38,39], has been widely used to develop both rational and rogue wave solutions of KP equations [40,41,42,43,44]. The variable-coefficient symbolic computation method is carried out to obtain several multi-rogue wave solutions of the KP equation [45]. Using the generalized extended tanh method combined with the F-expansion method, several solitary wave solutions of the KP equations were exploited by Seadawy et al. [46]. The explicit finite difference model for the initial or boundary-value problems of KP equations were developed by Bratsos and Twizell [47]. To improve the stability of the algorithm, Feng and Mitsui utilized a linearized implicit finite difference method based on the Crank-Nicolson scheme to solve KP equations [48]. The pseudo-spectral method was carried out by Minzoni and Smyth to analyze the evolution of lump solitons of KP equations [49]. A computational approach based on the Adomian decomposition method was developed by Wazwaz to study the movement of solitons in KP equations [50]. A higher-order moment LB method was constructed by Wang to simulate single-line solitons and lump solitons in KP equations [51]. Cai et al. proposed a linearized local energy-preserving method to analyze the evolution of solitons in KP equations [52].

    Notably, although the higher-order moment LB model presented by Wang successfully simulated the evolution of KP equations [51], the error of the model was unsatisfactory. The macroscopic quantity of the model was selected as Eq (2):

    ux=αfeqα(x,y,t). (2)

    Thus, the true macroscopic quantity u must be obtained by the central difference in the x direction. This could cause error accumulation, which reduces the accuracy of the model. In this research, a more reliable numerical scheme for the KPI equation based on the LB model will be developed.

    Inspired by [49], to achieve the aim of solving KPI equations more effectively, a splitting LB scheme is proposed in this paper. First, Eq (1) is translated as follows:

    ut+6uux+3ux3=Kw, (3)
    wx=δK2uy2, (4)

    where δ=γ. We can see that Eq (3) is a KdV equation with the source term Kw.

    It is reasonable to rewrite the KPI equation into Eqs (3) and (4). On one hand, as an extension of the KdV equation in two-dimensional space, the (2+1)-dimensional KP equation is derived from one-dimensional solitary pulses under transverse perturbations [30]. Equation (4) describes the second-order derivative term in the y-direction as transverse perturbations, which becomes the source term for the movement of solitons governed by the KdV equation in the x-direction. On the other hand, Beji [53] noted that in the nonlinear water wave equation regarding surface displacement, the KP equation can be obtained by taking the x-direction as the main propagation direction of waves, discarding the nonlinear and dispersive terms in the y-direction and retaining only the non-dispersive term in the y-direction. This point of view also verifies the rationality of Eqs (3) and (4).

    The KdV equations with the source term were first calculated by Fornberg and Whitham [54]. In their work, the pseudo-spectral method combined with the leap-frog scheme was used. Meanwhile, the form of Eq (4) is similar to a diffusion-type equation. Although the characteristic of Eq (4) is different from the diffusion equation because the quantities u and w are not linearly related, Eq (4) can be integrated by using the Crank-Nicolson scheme.

    In this paper, we focus on the LB solutions for these two equations. Our strategy is that two sets of distribution functions will be employed to recover these equations. A one-dimensional LB model is used to simulate the KdV equation with a source term, and a spatial evolution LB model is applied to develop (4).

    The remainder of this research is constructed as follows. In Section 2, a splitting LB scheme for KPI equations is proposed. In Section 3, some detailed numerical simulations are conducted to verify the scheme. Finally, conclusions are provided in the last section.

    A one-dimensional LB equation with a BGK collision term is considered as follows:

    fα(x+eαδt,t+δt)fα(x,t)=1τ[fα(x,t)feqα(x,t)]+ωα(x,t), (5)

    where the relaxation time is denoted as τ. fα(x,t) and feqα(x,t) represent the discrete distribution function and equilibrium distribution function in the α direction, respectively. They should satisfy the following conservation law:

    αfeqα(x,t)=αfα(x,t). (6)

    The additional term ωα(x,t) is used to simulate the source term of the macroscopic equation.

    Now, applying the Chapman-Enskog expansion [55] to fα(x,t), it yields:

    fα(x,t)=i=0εif(i)α(x,t). (7)

    Here, in Eq (7), f(0)α(x,t)feqα(x,t). The parameter ε is called the Knudsen number. It is reasonable to assume that ε is a small number. Therefore, we can take it as the time step: ε=δt [56]. Thus, the LB equation becomes:

    fα(x+εeα,t+ε)fα(x,t)=1τ[fα(x,t)feqα(x,t)]+ωα(x,t). (8)

    Since the Knudsen number ε is small, we can employ the Taylor expansion to the left-hand side of the LB equation:

    fα(x+εeα,t+ε)fα(x,t)=i=1εii!(t+xeα)ifα(x,t). (9)

    Moreover, the multiscale expansion to the additional term ωα(x,t) is obtained as follows:

    ωα(x,t)=i=1εiω(i)α(x,t). (10)

    To quantify changes in the LB equation at different time scales, the following is introduced:

    ti=εit,i=0,1, (11)

    and

    t=i=0εiti. (12)

    Next, Eqs (7), (9), (10) and (12) are substituted into Eq (8), and the terms are separated based on the orders of ε:

    C1Δf(0)α=1τf(1)α+ω(1)α, (13)
    C2Δ2f(0)α+t1f(0)α+Δτω(1)α=1τf(2)α+ω(2)α, (14)
    C3Δ3f(0)α+2C2Δt1f(0)α+t2f(0)α+τt1ω(1)α+C2τΔ2ω(1)α+τΔω(2)α=1τf(3)α+ω(3)α, (15)
    C4Δ4f(0)α+3C3Δ2t1f(0)α+2C2Δt2f(0)α+t3f(0)α+C22t21f(0)α+τt2ω(1)α+t1[2C2Δτω(1)α+τω(2)α]+τC3Δ3ω(1)α+τC2Δ2ω(2)α+τΔω(3)α=1τf(4)α+ω(4)α (16)

    In the above equations, Δ=/t0+eα/x is a kind of partial differential operator. Ci are several polynomials related to τ:

    Ci=i1n=1τCn(in)!+1i!i=1,2,3,4. (17)

    To recover the KdV equation with the source term, u(x,t) is considered as:

    u(x,t)=αfα(x,t). (18)

    Due to Eq (6), the distribution functions take the following forms:

    αf(0)α(x,t)=u(x,t) (19)

    and

    αf(i)α(x,t)=0.i=1,2, (20)

    Now, the following functions of f(0)α(x,t) are selected:

    m(x,t)=αf(0)α(x,t)eα=3u2, (21)
    π(x,t)=αf(0)α(x,t)e2α=12u3, (22)
    P(x,t)=αf(0)α(x,t)e3α=54u4+χu, (23)
    Q(x,t)=αf(0)α(x,t)e4α=12965u5+12χu2. (24)

    In Eqs (23) and (24), the parameter χ=1/ε2C3 can be determined. These functions are equivalent to those in [20].

    By taking a summation (13)+(14)×ε+(15)×ε2+(16)×ε3 with respect to α, we can obtain the following macroscopic equation:

    ut+6uux+3ux3=Kw+O(ε4). (25)

    This is the fourth-order accuracy KdV equation with a source term, in which the recovery of the source term Kw depends on the selection of additional distribution functions ω(i)α(x,t). More detailed information regarding this aspect can be found in Appendix A.

    Equations (21)–(24) can be simply used to determine feqα(x,t) by solving linear algebraic equations. For a one-dimensional five-bit lattice (D1Q5) where the discrete velocities are selected as eα={e0,e1,e2,e3,e4}={0,c,c,2c,2c}, the equilibrium distribution functions are:

    feq1(x,t)=16c4(4mc3+4πc2PcQ), (26)
    feq2(x,t)=16c4(4mc3+4πc2+PcQ), (27)
    feq3(x,t)=124c4(2mc3πc2+2Pc+Q), (28)
    feq4(x,t)=124c4(2mc3πc22Pc+Q), (29)
    feq0(x,t)=u(x,t)4α=1feqα(x,t). (30)

    For the purpose of simulating Eq (4), we consider the following spatial evolution LB equation with the BGK collision term:

    gβ(y + eβδx,x+δx)gβ(y,x)=1˜τ[gβ(y,x)geqβ(y,x)]. (31)

    In Eq (31), ˜τ is a new relaxation time. δx is the spatial step in the x-direction. gβ(y,x) and geqβ(y,x) are the distribution function and equilibrium distribution function at position (y,x) with velocity eβ, respectively. They satisfy the following conservation condition:

    βgeqβ(y,x)=βgβ(y,x). (32)

    Now, introducing a new dimensionless parameter ˜ε that numerically equals δx. Then, Eq (31) can be rewritten as:

    gβ(y + eβ˜ε,x+˜ε)gβ(y,x)=1˜τ[gβ(y,x)geqβ(y,x)]. (33)

    Next, the Taylor expansion

    gβ(y + eβ˜ε,x+˜ε)gβ(y,x)=j=1˜εnj!(x+eβy)jgβ(y,x) (34)

    and the Chapman–Enskog expansion [55]:

    gβ(y,x)=j=0˜εjg(j)β(y,x) (35)

    can be adopted when ˜ε is a small parameter. In (35), g(0)β(y,x)geqβ(y,x). By denoting different spatial scales x0, x1, ..., they are

    xj=˜εjx,j=0,1, (36)
    x=j=0˜εjxj. (37)

    Substitute Eqs (34), (35) and (37) into Eq (33) and separate terms based on different orders of ˜ε:

    ˜Δg(0)β=1˜τg(1)β, (38)
    x1g(0)β+˜C2˜Δ2g(0)β=1˜τg(2)β, (39)

    where ˜C2=0.5˜τ and the partial differential operator is ˜Δ=/x0+eβ/y.

    The macroscopic quantity w(y,x) in Eq (4) is defined as

    w(y,x)=βgβ(y,x). (40)

    By reverting back to Eqs (32) and (35), we can obtain

    w(y,x)=βg(0)β(y,x) (41)

    and

    βg(j)β=0.j=1,2, (42)

    Furthermore, several functions related to g(0)β(y,x) are selected as:

    ˜m(y,x)=βg(0)β(y,x)eβ=0, (43)
    ˜π(y,x)=βg(0)β(y,x)e2β=δuK˜ε˜C2. (44)

    By taking (38)+(39)טε and summing about β, we can obtain the following:

    wx+˜my+˜C2˜ε[x0(wx0+˜my)+y(˜mx0+˜πy)]=O(˜ε2). (45)

    Due to Functions (43), (44) and Eq (38), Eq (4) with second-order accuracy of truncation error can be recovered:

    wx=δK2uy2 + O(˜ε2). (46)

    For the D1Q5 lattice where the discrete velocities are selected as eβ={˜e0,˜e1,˜e2,˜e3,˜e4}={0,˜c,˜c,2˜c,2˜c}, the equilibrium distribution functions can be derived by combining Eqs (41), (43) and (44). They are represented as follows:

    geqβ(y,x)=λu6˜c2,β=1,2 (47)
    geqβ(y,x)=λu12˜c2,β=3,4 (48)
    geq0(y,x)=wλu2˜c2. (49)

    Here, the parameter is λ=δ/(K˜ε˜C2).

    In this section, three numerical experiments are proposed to verify the model.

    First, we consider the single-line soliton solution of the KPI equation:

    u(x,y,t)=2ξ2sech2{ξ[x+ηy(4ξ23η2)tx0]}. (50)

    The following initial condition is employed:

    u(x,y,0)=2ξ2sech2[ξ(x+ηyx0)]. (51)

    Equation (50) describes the propagation process of a single-line soliton wave. The propagation speed is 4ξ23η2, and arctan(η1) is the angle between the propagation direction and the positive x-axis [48].

    The initial condition and the splitting LB result when t=2 are shown in Figure 1. The parameters are as follows: δt=0.0005, lattice size 200×100, τ=1.3, ˜τ=1.0, c=200, ˜c=1, γ=3, ξ=1.0, η=1.0/2, x0=4.0, K=200.0, δx=0.1 and δy=0.1. This numerical simulation is carried out on the domain 20×10, and the exact Dirichlet boundary conditions are applied.

    Figure 1.  The initial condition and the splitting LB result when t=2. (a) Initial condition; (b) splitting LB result when t=2. The parameters are as follows δt=0.0005, lattice size 200×100, τ=1.3, ˜τ=1.0, c=200, ˜c=1, γ=3, ξ=1.0, η=1.0/2, x0=4.0, K=200.0, δx=0.1 and δy=0.1.

    Additionally, with the parameters given in Figure 1, the comparison between the theoretical solutions and splitting LB results at y=5.0 when t=1.0 is presented in Figure 2(a), from which it can be seen that the splitting LB results are in good agreement with the exact solutions.

    Figure 2.  (a) Comparison between the theoretical solutions and the splitting LB results at y=5.0 when t=1.0; and (b) curve of relative errors at line y=5.0 when t=1.0.

    The relative errors at line y=5.0 when t=1.0 are also plotted in Figure 2(b). Here, the relative errors are defined as e=|uNuE|/|uE|, in which uN is the splitting LB solution and uE is the exact solution. Figure 2(b) illustrates that the relative errors are lower than 1.5×105. The result demonstrates that the splitting LB solutions are acceptable.

    The comparison of the general relative errors G between the splitting LB model and the traditional higher-order moment LB model is presented in Table 1. Here, the general relative errors G are defined as:

    G=|uNuE||uE|. (52)
    Table 1.  Comparison of G between different kinds of computational methods at different times.
    Splitting LB Higher-order moment LB [51] Linearized local energy-preserving method [52]
    t = 1 7.432065×106 6.932046×102 2.607653×102
    t = 2 6.942704×106 8.490834×102 2.119188×102
    t = 3 7.547621×106 9.748673×102 3.286301×102
    t = 4 6.783254×106 1.079479×101 2.955938×102

     | Show Table
    DownLoad: CSV

    From Table 1, it can be clearly seen that the general relative errors of the splitting LB scheme slightly fluctuate but are consistently lower than 1.0×105. However, the general relative errors of the traditional higher-order moment LB model are approximately 101, which is significantly higher than the G in the splitting LB scheme. Furthermore, in the higher-order moment LB model, the general relative errors increase over time. This is due to the error accumulation of the model.

    With time step δt=0.01, other parameters are the same as those in LB models, the general relative errors of the linearized local energy-preserving method [52] are also presented in Table 1, from which we can observe that the errors of the splitting LB scheme are also lower than those of the linearized local energy-preserving method.

    In addition, the CPU times of these three numerical methods are considered. Here, the experiment is conducted on a computer with an Intel i5 (2.50 GHz) processor, and the computing program is written in Fortran and compiled in Gfortran. The CPU times of the splitting LB scheme, traditional higher-order moment LB model and linearized local energy-preserving method are 33.73s, 36.97s and 22.19s, respectively. Here, we can see that due to the large time step, the linearized local energy-preserving method has the lowest CPU time. The CPU time of the splitting LB scheme is lower than that of the higher-order moment LB model.

    From the discussion above we can see that the splitting LB scheme has an advantage over the traditional high-order moment LB model in simulating KPI equations.

    For the purpose of testing the convergence order of the splitting LB scheme, the relation between the general relative errors G and spatial step δx is shown in Figure 3(a). To compute the numerical convergence order, the linear fit is also adopted. The linear fit line is log10G=2.5547×log10δx +0.03765, which means that the model's convergence order is 2.5547 in space.

    Figure 3.  (a) The relation between G and lattice size δx; (b) Curve of ρ versus time t(0,1) at x=10.0, y=5.0.

    To quantify the order of the truncation error, we introduce another parameter ρ=e/(δx)2. Here, δx is the spatial step in the x-direction, and e is the absolute error. Parameter ρ represents the scale factor of the truncation error e and the square of the spatial step (δx)2. In Figure 3(b), the curve of ρ at times from t=0.0 to t=1.0 is plotted. From the graph, we can observe that ρ is a finite small number in the range of [0.12,0.16] in this example, which indicates that the splitting LB scheme in this paper has a second-order accuracy of the truncation error.

    We consider the KPI equation with the following initial condition:

    u(x,y,0)=22i=1ξ2isech2{ξi[x+ηiyx0,i]}. (53)

    This problem has the following theoretical solution:

    u(x,y,t)=22i=1ξ2isech2{ξi[x+ηiy(4ξ2i3η2i)tx0,i]}. (54)

    The computational domain is [0,40]×[0,40], and the exact Dirichlet boundary conditions are used in this experiment.

    In Figure 4, the splitting LB solutions at different times t=0, t=3, t=5 and t=8 are carried out. The parameters are as follows: δt=0.0005, lattice size 200×100, τ=1.3, ˜τ=1.0, c=400, ˜c=2, γ=3, ξ1=1.0, ξ2=1.0/2, η1=1.0/3, η2=1.0, x0,1=4.0, x0,2=14.0, K=200.0, δx=0.2 and δy=0.4. Figure 4(a) shows the initial condition Eq (53) in which two line solitons are allowed a collision to take place. Figure 4(b) demonstrates that two solitons collide when t=3. In Figure 4(c), when t=5, we find that the solitons collide at y>10. Finally, in Figure 4(d), the two solitons have separated completely when t=8. The simulation results in Figure 4 are consistent with the classical results [48].

    Figure 4.  Splitting LB results for the interaction of two line-solitons. (a) t=0; (b) t=3; (c) t=5 and (d) t=8. The parameters are as follows: δt=0.0005, lattice size 200×100, τ=1.3, ˜τ=1.0, c=400, ˜c=2, γ=3, ξ1=1.0, ξ2=1.0/2, η1=1.0/3, η2=1.0, x0,1=4.0, x0,2=14.0, K=200.0, δx=0.2 and δy=0.4.

    To simulate lump soliton, the KPI equation with the following initial condition is given:

    u(x,y,0)=4[(xx0)2+μ2(yy0)2+1/μ2][(xx0)2+μ2(yy0)2+1/μ2]2. (55)

    The theoretical solution to this problem is as follows:

    u(x,y,0)=4[(xx0)2+μ2(yy0)2+1/μ2][(xx0)2+μ2(yy0)2+1/μ2]2. (56)

    which shows that the lump soliton will propagate along the x-direction at a speed of 3μ2. In this case, the exact Dirichlet boundary conditions are considered with the computation domain: [0,20]×[0,20].

    In Figure 5(a), the initial condition is shown. The parameters are as follows: δt=0.0005, lattice size 200×100, τ=1.3, ˜τ=1.0, c=200, ˜c=2, γ=3, μ=1.0, x0=10.0, y0=10.0, K=200.0, δx=0.1 and δy=0.2. Figures 5(b) and 5(c) show the splitting LB results at t=0.5 and t=1.0, respectively. These numerical results are consistent with those in [48].

    Figure 5.  Splitting LB results for lump soliton. (a) t=0; (b) t=0.5; and (c) t=1.0. The parameters are as follows: δt=0.0005, lattice size 200×100, τ=1.3, ˜τ=1.0, c=200, ˜c=2, γ=3, μ=1.0, x0=10.0, y0=10.0, K=200.0, δx=0.1 and δy=0.2.

    In this paper, a splitting LB scheme for solving KPI equations was presented. In this algorithm, the variable substitution method was used. As a result, the KPI equation has been written into two macroscopic equations. Two sets of distribution functions are employed for the construction of these two macroscopic equations. This splitting scheme contains both time evolution and spatial evolution in which the second equation is based on a space variable rather than time. Three numerical examples were conducted to show that this splitting LB scheme was more suitable for simulating KPI equations than the traditional higher-order moment LB model.

    It was laborious to apply the traditional LB model to higher order PDEs due to the complexity of the higher-order Chapman-Enskog expansion. However, the splitting LB method appeared promising in simulating higher order PDEs because the splitting technique can reduce the order of the macroscopic equation. How the splitting LB method can be applied to these equations still requires further research.

    The author declares he has not used Artificial Intelligence (AI) tools in the creation of this article.

    The research was funded by the Doctoral Research Project of Northeast Electric Power University (BSJXM-2021235).

    The author declares no conflicts of interest.

    In this section, the multiscale expansion technique is applied to recover the KdV equation with a source term. First, we selected the following summations of the additional distribution functions:

    ξ1=αω(1)α=0, (A.1)
    ξ2=αω(2)α=Kωε, (A.2)
    ξ3=αω(3)α=τδε2(3u2)y2, (A.3)
    ξ4=αω(4)α=Kδ2ε22wy2dx+2C2τKc2ε2wx2+τδ2ε2y2(12u3)x. (A.4)

    By taking Eq (13) and summing over α, according to Eqs (19) and (21), the following relation can be derived:

    ut0=(3u2)x. (A.5)

    The macroscopic Eq (4) and the summation Eq (A.1) can be modified to obtain the following:

    wt0=δK2(3u2)y2. (A.6)

    Equations (A.5) and (A.6) are called conservation laws in the t0 scale.

    Similarly, we take Eq (14) and sum over α. Based on Eqs (19), (21), (22) and (A.2), the following can be derived:

    ut1=Kwε. (A.7)

    Because of the macroscopic Eq (4), we can obtain the following:

    wt1=δε2wy2dx. (A.8)

    Equations (A.7) and (A.8) are called conservation laws in the t1 scale.

    To recover the macroscopic equation, we take (13)+ε×(14)+ε2×(15) and sum over α. Thus, we obtain the following:

    ut+mx+εC2[t0(ut0+mx)+x(mt0+πx)]+ε2C3[2t20(ut0+mx)+22t0x(mt0+πx)+2x2(πt0+Px)]+τε2ξ2t0=εξ2+ε2ξ3+O(ε3). (A.9)

    Due to Functions (21)–(22), the third term on the left-hand side of Eq (9) is equal to zero. To recover the term 3u/x3 in the macroscopic equation, the function P(x,t) should be selected in Eq (23). Substituting Eqs (A.3) and (A.6) into Eq (A.9) yields the following:

    ut+6uux+ε2C3χ3ux3=Kw+O(ε3). (A.10)

    This is the KdV equation with a source term if χ=1/ε2C3.

    Furthermore, to improve the accuracy of the equation, we take Eq (16) and sum it over α on account of the conservation law Eq (A.5), thus getting:

    αC4(t0+xeα)4f(0)α=C44x4(12χu212965u5+Q). (A.11)

    If we select:

    Q(x,t)=12965u5+12χu, (24)

    then

    αC4(t0+xeα)4f(0)α=0. (A.12)

    Moreover, several terms that are not equal to zero are:

    αC22t21f(0)α=C2Kδε22wy2dx, (A.13)
    ατt1ω(2)α=τKδε22wy2dx, (A.14)
    ατ(t0+xeα)ω(3)α=τ2δε2y2(12u3)x. (A.15)

    We assume that the additional distribution functions ω(i)α(i=1,2,3,4) are independent of α. Hence, for the D1Q5 lattice, the following can be obtained:

    αC2τ(t0+xeα)2ω(2)α=C2τδε2y2(12u3)x+2C2τKc2ε2wx2. (A.16)

    Because of the summation Eq (A.4), we derive:

    ut3=0. (A.17)

    Taking (13)+ε×(14)+ε2×(15)+ε3×(16) and summing over α, the KdV equation with a source term and fourth-order accuracy of truncation error can finally be achieved:

    ut+6uux+3ux3=Kw+O(ε4). (25)

    From the summations Eqs (A.1)–(A.4) that we select, the additional distribution functions can finally be obtained:

    ω(i)α=15ξiα=0,1,,4 (A.18)


    [1] J. Boag, Maximum likelihood estimates of the proportion of patients cured by cancer therapy, J. R. Stat. Soc., 11 (1949), 15–44. https://doi.org/10.1111/j.2517-6161.1949.tb00020.x doi: 10.1111/j.2517-6161.1949.tb00020.x
    [2] M. Pintilie, Competing risks: a practical perspective, John Wiley & Sons, Inc., 2006.
    [3] T. Chen, S. Zheng, H. Luo, X. Liu, J. Feng, Reliability analysis of multiple causes of failure in presence of independent competing risks, Qual. Reliab. Eng. Int., 32 (2016), 363–372. https://doi.org/10.1002/qre.1755 doi: 10.1002/qre.1755
    [4] L. Liu, X. Liu, X. Wang, Y. Wang, C. Li, Reliability analysis and evaluation of a brake system based on competing risk, J. Eng. Res., 5 (2017), 150–161.
    [5] H. Li, M. Yazdi, Stochastic game theory approach to solve system safety and reliability decision-making problem under uncertainty, In: H. Li, M. Yazdi, Advanced decision-making methods and applications in system safety and reliability problems, Springer, 2022. https://doi.org/10.1007/978-3-031-07430-1-8
    [6] M. Yazdi, E. Zarei, S. Adumene, R. Abbassi, P. Rahnamayiezekavat, Uncertainty modeling in risk assessment of digitalized process systems, Methods Chem. Process Saf., 6 (2022), 389–416. https://doi.org/10.1016/bs.mcps.2022.04.005 doi: 10.1016/bs.mcps.2022.04.005
    [7] E. Zarei, M. Yazdi, R. Moradi, A. B. Toroody, Expert judgment and uncertainty in sociotechnical systems analysis, In: E. Zarei, Safety causation analysis in sociotechnical systems: advanced models and techniques, Springer, 2024. https://doi.org/10.1007/978-3-031-62470-4_18
    [8] N. Balakrishnan, Progressive censoring methodology: an appraisal, Test, 16 (2007), 211–259. https://doi.org/10.1007/s11749-007-0061-y doi: 10.1007/s11749-007-0061-y
    [9] H. K. Ng, P. S. Chan, Comments on: progressive censoring methodology: an appraisal, Test, 16 (2007), 287–289. https://doi.org/10.1007/s11749-007-0071-9 doi: 10.1007/s11749-007-0071-9
    [10] Y. Cho, H. Sun, K. Lee, Exact likelihood inference for an exponential parameter under generalized progressive hybrid censoring scheme, Stat. Methodol., 23 (2015), 18–34. https://doi.org/10.1016/j.stamet.2014.09.002 doi: 10.1016/j.stamet.2014.09.002
    [11] D. Kundu, A. Joarder, Analysis of type-II progressively hybrid censored competing risks data, J. Mod. Appl. Stat. Methods, 5 (2006), 152–170. https://doi.org/10.22237/JMASM/1146456780 doi: 10.22237/JMASM/1146456780
    [12] H. Liao, W. Gui, Statistical inference of the Rayleigh distribution based on progressively type II censored competing risks data, Symmetry, 11 (2019), 898. https://doi.org/10.3390/sym11070898 doi: 10.3390/sym11070898
    [13] L. Wang, Y. M. Tripathi, C. Lodhi, Inference for Weibull competing risks model with partially observed failure causes under generalized progressive hybrid censoring, J. Comput. Appl. Math., 368 (2020), 112537. https://doi.org/10.1016/j.cam.2019.112537 doi: 10.1016/j.cam.2019.112537
    [14] A. M. Almarashi, A. Algarni, G. A. Abd-Elmougod, Statistical analysis of competing risks lifetime data from Nadarajaha and Haghighi distribution under type-II censoring, J. Intell. Fuzzy Syst., 38 (2020), 2591–2601. https://doi.org/10.3233/JIFS-179546 doi: 10.3233/JIFS-179546
    [15] M. R. Mahmoud, H. Z. Muhammed, A. R. El-Saeed, Analysis of progressively type-I censored data in competing risks models with generalized inverted exponential distribution, J. Stat. Appl. Probab., 9 (2020), 109–117. https://doi.org/10.18576/jsap/090110 doi: 10.18576/jsap/090110
    [16] A. M. Abd El-Raheem, M. Hosny, M. H. Abu-Moussa, On progressive censored competing risks data: real data application and simulation study, Mathematics, 9 (2021), 1805. https://doi.org/10.3390/math9151805 doi: 10.3390/math9151805
    [17] T. A. Abushal, A. A. Soliman, G. A. Abd-Elmougod, Inference of partially observed causes for failure of Lomax competing risks model under type-II generalized hybrid censoring scheme, Alex. Eng. J., 61 (2022), 5427–5439. https://doi.org/10.1016/j.aej.2021.10.058 doi: 10.1016/j.aej.2021.10.058
    [18] X. Qin, W. Gui, Statistical inference of Lomax distribution based on adaptive progressive type-II hybrid censored competing risks data, Commun. Stat., 52 (2023), 8114–8135. https://doi.org/10.1080/03610926.2022.2056750 doi: 10.1080/03610926.2022.2056750
    [19] A. S. Hassan, R. M. Mousa, M. H. Abu-Moussa, Analysis of progressive type-II competing risks data, with applications, Lobachevskii J. Math., 43 (2022), 2279–2292. https://doi.org/10.1134/S1995080222120149 doi: 10.1134/S1995080222120149
    [20] A. Elshahhat, M. Nassar, Inference of improved adaptive progressively censored competing risks data for Weibull lifetime models, Stat. Papers, 65 (2024), 1163–1196. https://doi.org/10.1007/s00362-023-01417-0 doi: 10.1007/s00362-023-01417-0
    [21] A. S. Hassan, R. M. Mousa, M. H. Abu-Moussa, Bayesian analysis of generalized inverted exponential distribution based on generalized progressive hybrid censoring competing risks data, Ann. Data Sci., 11 (2024), 1225–1264. https://doi.org/10.1007/s40745-023-00488-y doi: 10.1007/s40745-023-00488-y
    [22] Y. Tian, Y. Liang, W. Gui, Inference and optimal censoring scheme for a competing-risks model with type-II progressive censoring, Math. Popul. Stud., 31 (2024), 1–39. https://doi.org/10.1080/08898480.2023.2225349 doi: 10.1080/08898480.2023.2225349
    [23] Q. Lv, R. Hua, W. Gui, Statistical inference of Gompertz distribution under general progressive type II censored competing risks sample, Commun. Stat., 53 (2024), 682–701. https://doi.org/10.1080/03610918.2022.2028834 doi: 10.1080/03610918.2022.2028834
    [24] S. A. Salem, O. Abo-Kasem, A. A. Khairy, Inference for generalized progressive hybrid type-II censored Weibull lifetimes under competing risk data, Comput. J. Math. Stat. Sci., 3 (2024), 177–202. https://doi.org/10.21608/cjmss.2024.256760.1035 doi: 10.21608/cjmss.2024.256760.1035
    [25] R. Maurya, Y. Tripathi, C. Lodhi, M. Rastogi, On a generalized Lomax distribution, Int. J. Syst. Assur. Eng. Manag., 10 (2019), 1091–1104. https://doi.org/10.1007/s13198-019-00839-0 doi: 10.1007/s13198-019-00839-0
    [26] A. Hassan, S. M. Assar, A. Shelbaia, Optimum step stress accelerated life test plan for Lomax distribution with an adaptive type-II progressive hybrid censoring, Br. J. Math. Comput. Sci., 13 (2016), 1–9. https://doi.org/10.9734/BJMCS/2016/21964 doi: 10.9734/BJMCS/2016/21964
    [27] A. Alghamdi, Study of generalized Lomax distribution and change point problem, Ph. D. thesis, Bowling Green State University, 2018.
    [28] G. Box, D. Cox, An analysis of transformations, J. R. Stat. Soc., 26 (1964), 211–243. https://doi.org/10.1111/j.2517-6161.1964.tb00553.x doi: 10.1111/j.2517-6161.1964.tb00553.x
    [29] S. Varde, Life testing and reliability estimtation for the two parameter exponential distribution, J. Amer. Statist. Assoc., 64 (1969), 621–631. https://doi.org/10.1080/01621459.1969.10501000 doi: 10.1080/01621459.1969.10501000
    [30] H. Varian, A Bayesian approach to real estate assessment, In: L. J.Savage, S. E. Feinberg, A. Zellner, Studies in Bayesian econometric and statistics, North-Holland Publication, 1975.
    [31] A. Basu, N. Ibrahimi, Bayesian approach to life testing and reliability estimating using asymmetric loss function, J. Stat. Plan. Inference, 29 (1991), 21–31. https://doi.org/10.1016/0378-3758(92)90118-C doi: 10.1016/0378-3758(92)90118-C
    [32] R. Calabria, G. Pulcini, Point estimation under asymmetric loss functions for left-truncated exponential samples, Commun. Stat., 25 (1996), 585–600. https://doi.org/10.1080/0361092960883171583 doi: 10.1080/0361092960883171583
    [33] N. Metropolis, A. Rosenbluth, M. Rosenbluth, A. Teller, E. Teller, Equation of state calculations by fast computing machine, J. Chem. Phys., 21 (1953), 1087–1092. https://doi.org/10.1063/1.1699114 doi: 10.1063/1.1699114
    [34] A. Cohen, Maximum likelihood estimation in the Weibull distribution based on complete and on censored samples, Technometrics, 7 (1965), 579–588. https://doi.org/10.1080/00401706.1965.10490300 doi: 10.1080/00401706.1965.10490300
    [35] W. Greene, Econometric analysis, 5 Eds., Pearson Education, Inc., 2003.
    [36] B. Efron, The Jackknife, the Bootstrap and other resampling plans, CBMS-NSF Regional Conference Series in Applied Mathematics, 1982.
    [37] P. Hall, Theoretical comparison of bootstrap confidence intervals, Ann. Stat., 16 (1988), 927–953. https://doi.org/10.1214/aos/1176350933 doi: 10.1214/aos/1176350933
    [38] D. Kundu, N. Kannan, N. Balakrishnan, Analysis of progressively censored competing risks data, Handb. Stat., 23 (2003), 331–348. https://doi.org/10.1016/S0169-7161(03)23018-2 doi: 10.1016/S0169-7161(03)23018-2
    [39] N. Balakrishnan, R. Sandhu, A simple simulational algorithm for generating progressive type-II censored samples, Amer. Stat., 49 (1995), 229–230. https://doi.org/10.1080/00031305.1995.10476150 doi: 10.1080/00031305.1995.10476150
    [40] M. M. El-Din, M. Nagy, M. Abu-Moussa, Estimation and prediction for Gompertz distribution under the generalized progressive hybrid censored data, Ann. Data Sci., 6 (2019), 673–705. https://doi.org/10.1007/s40745-019-00199-3 doi: 10.1007/s40745-019-00199-3
    [41] Z. Xia, J. Yu, L. Cheng, L. Liu, W. Wang. Study on the breaking strength of jute fibers using modified Weibull distribution, Compos. Part A, 40 (2009), 54–59. https://doi.org/10.1016/j.compositesa.2008.10.001 doi: 10.1016/j.compositesa.2008.10.001
    [42] D. Kundu, B. Pradhan, Bayesian analysis of progressively censored competing risks data, Sankhya B, 73 (2011), 276–296. https://doi.org/10.1007/s13571-011-0024-x doi: 10.1007/s13571-011-0024-x
    [43] M. Chen, Q. Shao, Monte Carlo estimation of Bayesian credible and HPD intervals, J. Comput. Graph. Stat., 6 (1988), 66–92. https://doi.org/10.1080/10618600.1999.10474802 doi: 10.1080/10618600.1999.10474802
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(690) PDF downloads(76) Cited by(0)

Figures and Tables

Figures(11)  /  Tables(21)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog