Académique Documents
Professionnel Documents
Culture Documents
ABSTRACT
When the empirical likelihood (EL) of a parameter is constructed with right censored data, literature shows
that 2 log(empirical likelihood ratio) typically has an asymptotic scaled chi-squared distribution, where
the scale parameter is a function of some unknown asymptotic variances. Therefore, the EL construction
of confidence intervals for requires an additional estimation of the scale parameter. Additional estimation would reduce the coverage accuracy for . By using a special influence function as an estimating function, we prove that under very general conditions, 2 log(empirical likelihood ratio) has an asymptotic standard chi-squared distribution with one degree of freedom. This eliminates the need for estimating the scale
parameter as well as eases some of the often demanding computations of the EL method. Our estimating
function yields a smaller asymptotic variance than those of Wang and Jing (2001) and Qin and Zhao (2007).
Thus, it is not surprising that confidence intervals using the special influence functions give a better coverage accuracy as demonstrated by simulations.
1. Introduction
Let Y and C be two independent, nonnegative random variables with respective distribution functions F (y) = P[Y y]
and G(s) = P[C s]. Y represents a lifetime whose observation is subject to right censoring by C such that instead of Y we
observe Z = min(Y, C) and the indicator = I[Y C] of the
event [Y C].
This article is concerned with using the empirical likelihood
(EL) method with right-censored data to construct confidence
intervals for a parameter , a functional of the distribution F,
defined by
E g(Y, ) =
g(s, ) dF (s) = 0,
(1.1)
n =
(1.2)
where Fn is the Kaplan-Meier (KM) or the product-limit estimator of F defined in (2.3) below. For continuous F and G, under
the finite second moment condition for (s),
2 (s)
dF (s) < ,
1 G(s)
gly@math.umd.edu
(1.3)
ARTICLE HISTORY
Received October
Revised December
KEYWORDS
Condence intervals;
Empirical likelihood;
Inuence function;
Parameter estimation;
Right-censored lifetimes.
the asymptotic distribution of n(n ), as n , is normal N(0, 2 ), see, for example, Yang (1994), where
(F (s) (s) (s))2
2
=
dF (s),
2
0
F (s)G(s)
(y) dF (y), s 0,
(1.4)
(s) =
s
where F = 1 F and G = 1 G.
Confidence intervals for can be constructed using the
asymptotic normal distribution N(0, 2 ). To use N(0, 2 ), it
is necessary to estimate the unknown variance 2 in (1.4). For
instance, Stute (1996) proposes a jackknife estimator for 2 .
Although any consistent estimator n2 of 2 can be employed,
the convergence rate of n2 is generally unknown. Substitution of
2 by n2 tends to reduce the coverage accuracy for as compare
to the case of known 2 . In the example of = F (y) for a fixed y,
the coverage accuracy was studied by Thomas and Grunkemeier
(1975), who proposed the EL method and illustrated by simulation its superiority over the method of normal approximation.
The ensuing theoretical work on the EL method was carried out
by Owen (1988) and followed by a rapid growth of literature.
The usefulness of the EL method for constructing confidence
interval/regions has been well established in a wide variety of
situations, see for example, DiCiccio, Hall, and Romano (1991),
Chen (1994), and a standard reference, Owen (2001) and references therein. An article by Zheng, Zhao, and Yu (2012) contains
an excellent review of some recent development.
Let R( ) denote the EL ratio function of and l( ) =
2 log R( ). If R( ) is computed from a complete sample of
n iid observations, then in many cases, l( ) has asymptotic 12
distribution. Confidence intervals for can be constructed using
the asymptotic 12 distribution. However, if R( ) is obtained
n
{pi }
n
n
npi
pi = 1,
pi g(yi , ) = 0,
i=1
i=1
pi 0, i = 1, 2, . . . , n ,
i=1
(1.5)
n
i=1
n
n
npi
pi = 1,
piWni = 0,
i=1
i=1
pi 0, i = 1, 2, . . . , n .
647
(1.6)
1i
n
EL =
{pi }i
pj
i=1
Z j >Zi
648
S. HE ET AL.
in Theorem 3.1 that asymptotically 0 g(y, )dFn (y) is a partial sum of n independent influence functions W (Zi , i , ), or
is asymptotically linear. The weak convergence of 2 log R( )
to the standard 12 distribution without any scale parameter is
established in Theorem 3.2. Theorem 3.2 is used for the EL construction of confidence intervals for right-censored data. In Section 4, simulation comparisons of the new method with that
of the scaled 12 distribution is presented. If is the survival
function F (y) at a fixed y or the expected value EY , the coverage ratios computing from Wang and Jing (2001), Qin and
Zhao (2007), and our EL method are about the same. For more
complicated , the proposed EL procedure performs better. The
amount of improvement depends on the form of . In Section 5,
an example with real data is provided. The data are taken from
Andrews and Herzberg (1985). The proofs of Theorems 3.1, 3.2,
and Lemma 3.1 are relegated to the Appendix.
(2.1)
So that [0, bH ] is the range of H. The symbols bF and bG are similarly defined for F and G.
Given a sample of n iid random vectors (Zi , i ), i =
1, 2, . . . , n, of (Z, ), their empirical distribution functions are
given by
Hn1 (x) =
1
I[Z j x, j = 1],
n j=1
Hn0 (x) =
1
I[Z j x, j = 0],
n j=1
(2.2)
1
I[Z j x].
n j=1
n
(2.4)
dHn1 (x)
F n (x)Gn (x)
(2.5)
It follows that
dHn1 (x) = Gn (x) dFn (x), dHn0 (x) = F n (x) dGn (x).
(2.6)
Put
H 0 (x) = P(Z x, = 0), H 1 (x) = P(Z x, = 1).
(2.7)
Then
H 0 (x) =
b
a
stands for
(a,b]
E{(Y t0 )I[Y t0 ]}
,
P(Y t0 )
5. g(x, ) = x2 x. Then
1
=
EY
(3.2)
The Wi are functions of random variables Zi , i , and the parameter . It can be calculated that
= var(Wi ) =
=
G(Zi )
g2 (s, )
G(s)
= ,
(3.3)
dF (s)
2
(F (s)g(s, ) (s))2
2
F (s)G(s)
i
n (Zi )
H n (Zi )
Gn (Zi )
I[Zi s]
n (s) 2
dHn0 (s).
H n (s)
2 (s)
2
F (s)G (s)
dF (s).
dG(s)
(3.7)
The price to pay for the approximation is that Wni s are not
stochastically independent which complicates the ensuing analysis.
The following theorem indicates the possibility of using Wni
to construct EL ratio and to obtain asymptotically a standard 2
distribution.
Theorem 3.1. Let Wni be given by (3.7) and E g(Y, ) = 0. Then
under Assumption A, as n , we have
1
Wni = n
n i=1
n
1
g(y, ) dFn (y) =
Wi + o p (1).
n i=1
n
(3.8)
Following
literature, we call W (Zi , i ) the i-th influence function of g(s, ) dFn (s) for given .
We define the modified EL ratio of by a multinomial likelihood subject to constraints as
n
n
n
npi
pi = 1,
piWni = 0,
R( ) = sup
{pi }
i=1
i=1
pi 0, i = 1, 2, . . . , n .
i
(Zi )
+
H(Zi )
Wi = W (Zi , i , ) =
G(Zi )
I[Zi s] 0
(s)
dH (s).
2
H (s)
g(Zi , )i
Wni =
g(Zi , )i
(3.6)
E Wi = E
g(Zi , )i
n (x) =
x dF (x),
2
649
i=1
(3.9)
i=1
i=1
1
1
(1
n
+ Wni ) , i = 1, 2, . . . , n, where
Then = n and pi =
is the solution of the equation
1 Wni
= 0.
n i=1 1 + Wni
n
(3.4)
h()
(3.10)
Lemma 3.1 shows that with probability 1, for large n the set {Wni }
contains a positive and a negative value. It follows that for large
n, (3.10) has a unique solution n such that nWni > 1. Now,
the EL ratio of can be written as
R( ) =
n
i=1
(npi ) =
n
(1 + nWni )1 .
(3.11)
i=1
650
S. HE ET AL.
(3.12)
g(Zi , )i
1 Gn (Zi )
(3.13)
n i=1
n i=1
n
and, therefore, the asymptotic variance of 1n ni=1 Vni is 2 as
given in (3.4).
However, Lemma
3.1(1) does
not hold for {Vni }.
The limit of n1 ni=1 Vni2 or n1 ni=1 (Vni n1 nj=1 Vn j )2 is
12 =
g2 (s, )
G(s)
4. Simulation
Simulations are carried out to study and compare finite sample
performance of confidence intervals I1 in (3.12) derived from
Theorem 3.2 and I2 from the scaled 12 distribution given by
Wang and Jing (2001) and Qin and Zhao (2007).
Confidence intervals I2 are calculated as follows. Let Fn , and
defined by (2.3). Suppose is the
Gn be the KM estimators
unique solution of g(s, ) dFn (s) = 0. Set
i = g(Zi , ),
i = g(Zi , ), Vni =
V ni =
n
i i
1
, Vn =
V ni ,
1 Gn (Zi )
n i=1
12 =
1
(V ni V n )2 ,
n i=1
i i
,
1 Gn (Zi )
r =
12
,
n v
ar (jack)
(4.1)
where n v
ar (jack) is the modified jackknife estimator of the
asymptotic variance of given in Stute (1996). Then, the confidence interval for is
n
log(1 + Vni ) c1 ,
(4.2)
I2 = : 2 r
i=1
where is the solution of ni=1 Vni /(1 + Vni ) = 0.
Simulations were performed in two scenarios. In Scenario I,
the parameter of interest is 0 = E Y and in Scenario II, the mean
residual lifetime.
Scenario I: The parameter of interest is 0 = E Y and (x) =
g(x, ) = x is used for calculating I1 . Two cases (i) and (ii)
were simulated:
(i) The lifetime Y is uniformly distributed on (0, 1) and the
censoring time C is uniformly distributed on (0, c). We
selected c = 2.5 and c = 1.3 which corresponds, respectively, to 20% and 30% censoring proportions.
(ii) Y has a Weibull(1, 10) distribution and C has an Exp()
distribution. Then for = 4.3 and = 2.7, the corresponding censoring proportions are 20% and 30%. The
simulated sample are n iid copies of Z = min(Y, C), =
I[Y C]. Based on the simulated observations, confidence intervals I1 derived from Theorem 3.2 and I2 from
(4.2) were calculated. The simulation of a sample n was
repeated N times for N = 2 104 . The coverage proportions and the average width of the N confidence intervals
were calculated using the N datasets. The results are summarized in Tables 1 and 2. The following are noted.
1. As the sample size n increases from 20 to 80, all of the
coverage proportions converge to the nominal level
1 .
2. For Uniform(0, 1) distribution, I1 has better coverage
proportions. In 8/16 of the cases, the average width
of I2 is slightly shorter than that of I1 . In 8/16 of the
cases, I2 and I1 have the same average width.
3. For Weibull(1, 10) distribution, I1 has better coverage
proportion and width.
Scenario II: Let g(x, ) = (x t0 )I[x t0 ]. Then the
parameter of interest is the mean residual life of Y, = E(Y
t0 |Y t0 ), as considered in Qin and Zhao (2007) and in Example 3 of Section 2.
We used the same Weibull (1, 10) distribution for Y and the
same exp() distribution for the censoring variable C as in Scenario I. As in Scenario I, a sample of Wni , i = 1, . . . , n was simulated repeatedly N times for N = 2 104 . The coverage proportions and the average width of the N confidence intervals were
calculated using the N datasets. The results are summarized in
Table 3 and Table 4. The following are noted.
1. All of the coverage proportions increase with the sample size n and are close to the nominal levels. In fact
when sample size is 80 (which is moderate), the coverage proportions are about the nominal level except when
P[Y t0 ] = 0.3.
2. The coverage proportions of I1 are much better than that
of I2 .
3. In 15/32 of the samples, the average width of I2 is slightly
shorter than that of I1 . In 17/32 of the cases, I2 and I1 have
the same average width.
651
Sample size
n
I2
I1
I2
I1
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
30%
Weibull(, )
Nominal value
1
Sample size
n
I2
I1
I2
I1
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Weibull(, )
Nominal value
1
Table . The coverage proportion and average width of condence intervals for 0 = E(Y t0 |Y t0 ) under the assumptions of Y Weibull(, ), % censoring
proportion, 1 = 0.90, and specied value for P[Y t0 ].
Coverage proportion
P(Y t0 )
Average width
P(Y t0 )
Sample size n
CI
0.90
0.70
0.50
0.30
0.90
0.70
0.50
0.30
I2
I1
I2
I1
I2
I1
I2
I1
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Table . The coverage ratio and average width of condence intervals for 0 = E(Y t0 |Y t0 ), under the assumptions Y Weibull (, ), % censoring proportion,
1 = 0.90 and specied value for P[Y t0 ].
Coverage proportion
P(Y t0 )
Average width
P(Y t0 )
Sample size n
CI
0.90
0.70
0.50
0.30
0.90
0.70
0.50
0.30
I2
I1
I2
I1
I2
I1
I2
I1
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
652
S. HE ET AL.
bH
hn (b) =
b
2 (s)
2
G (s)
bH
2 (s)
2
G (s)
i
1 (Zi )i
+
n (Zi )
n i=1 Gn (Zi ) H n (Zi )
I[Zi s] 0
dHn (s)
n (s) 2
H n (s)
n (s)
(s)
1
dHn0 (s)
dHn (s) +
=
H
Gn (s)
n (s)
H n (s) 0
n (s) 2
dHn (s)
H n (s)
(s)
dHn1 (s) = (s) dFn (s).
=
Gn (s)
n
Appendix
Throughout Section 6, is fixed and such that Eg(Y, ) = 0. Then
it is convenient to suppress in the exposition, by setting (y) =
g(y, ). It follows that
(Zi )i
(Zi )i
,
Gn (Zi )
G(Zi )
i
i
n (Zi )
(Zi ),
i =
H n (Zi )
H(Zi )
I[Zi s] 0
I[Zi s] 0
i = n (s) 2
dHn (s) (s)
dH (s),
2
H n (s)
H (s)
i =
E (Y ) =
(y)dF (y) = 0.
as
Wni Wi = i + i i .
Applying an elementary inequality (a + b + c)2 3(a2 + b2 + c2 ),
we obtain
(Wni Wi )2 = (i + i i )2 3(i2 + i2 + i2 ).
P(|Vn | M) + 2
3.
(A.2)
Un sup
sb
= o p (1),
Vn
sup
Gn (s)
smax{Zi }
= O p (1).
(A.3)
See Zhou (1992). To apply this result, we shall split the first integral in the following equation into two intervals [0, b] and (b, bH ],
accordingly. For Hn1 defined in (2.2), we have
(s)
1 2
=
n i=1 i
n
Gn (s)
b 2
(s)
2
Un
(s) 2
G(s)
dHn1 (s)
dHn1 (s)
+ Vn2
2 (s)
bH
sx
(A.7)
0xbH
dHn1 (s)
b
G (s)
G (s)
= o p (1)O p (1) + O p (1)hn (b) = o p (1), as n ,
0
653
(A.4)
sup
sb
(s)
(s) 2
n
0, a.s.
H n (s) H(s)
where
Applying (a + b)2 2a2 + 2b2 and Lemma A.1, we have
bH
hn (b) =
(s)
2
G (s)
dHn1 (s).
(A.5)
n2 (s)
Tn (b, t] =
Sn (b, t] =
b
n2 (s) =
D(a, t] =
us
dGn (s)
2
2 (u) dFn (u) F n (s) 2
b
us
H n (s)
bH
1
2 (u) dFn (u) d
Gn (s)
b
us
bH
bH 2
1
(s)
dFn (s)
lim
2 (u) dFn (u) +
sbH Gn (s) s
Gn (s)
b
bH
1
1
1 2 2
+
(s) dHn1 (s)
2
Gn (s) G(s)
G(s)
b
(A.6)
o p (1) + O p (1)hn (b).
The first inequality follows from (2.6), the second and the third
from integration by parts, and the last equality from (a + b)2
2(a2 + b2 ), (A.3), and (A.1).
By the same token, we conclude that Sn (b, bH ] = o p (1) +
O p (1)hn (b).
Write
= + , n (x) =
(s) 2
n (s)
dHn0 (s)
H n (s) H(s)
b
H n (s)
(s) dH 0 (s)
2
H (s)
Tn (b, bH ]
(s)
(s) 2
n
dHn0 (s)
H n (s) H(s)
2
(u) dFn (u) F n (s)
bH
bH
+
H n (s)
2 (s)
dHn0 (s), b < bH .
2
H (s)
us
Observe that
1 2
=
n i=1 i
sx
, Bn (a, t] =
H n (s)
bH
B2n (b, t] dHn (t )
H n (b)B2n (b, b] + 2
0+2
b
bH
bH
bH
H n (t)Bn (b, t]
1/2
2
Bn (b, t] dHn (t )
= n 2[Tn (b, bH )]
bH
1/2
|n (t )|
2
H n (t)
n2 (t )
2
H n (t)
dHn0 (t )
1/2
dHn0 (t )
(A.9)
bH
bH
b
654
S. HE ET AL.
n
i2 = o p (1) +
i=1
bH
2 log R(0 ) = 2
Bn (0, b] D(0, b] + Bn (b, t]
D(b, t] dHn (t )
bH
B2n (b, t] dHn (t ) + 4
o p (1) + 4
b
=
bH
D2 (b, t ) dHn (t )
1in
max |Wni Wi |2
1in
1/2
(A.10)
Note that Wni2 is bounded by Wi2 + (Wi Wni )2 2|Wi (Wi
Wni )|. By assertion (1) of the lemma, we get
1 2
W = 2 + o p (1).
n i=1 ni
n
and
1 2
1 Xi2
1 + max |X j |
Xi
1 jn
n i=1
n i=1 1 + Xi
n
2n S2n =
= nW n + 2n o p (1).
(A.11)
It follows that
n =
Wn
= O p (n1/2 )
+ o p (1)
and
W n = n 2 + o p (n1/2 ).
Applying Lemma 3.1, we have
n
i=1
|Xi |3 3n
n
i=1
n
ln(1 + nWni )
i=1
2
max |Wni |
(A.12)
n
1
2 nWni 2nWni2 + i
2
i=1
( here |i | |Xi |3 )
Wn
1
2
4 nW n ( 2 + o p (1)) + o p (1)
2
2
nW n
=
+ o p (1) 12 ,
in distribution.
2
= 2n
Acknowledgments
The authors are grateful to the associate editor and referees for their valuable
comments and providing missing references which led to an improvement
of the presentation of our work and a simplification of the proof of Theorem
3.1.
Funding
This work was done when Yang was visiting the School of Mathematical Sciences, Xiamen University. Research of He, Liang, and Shen were supported
by National Natural Science Foundation of China(11171230,11231010).
Research of Yang was supported in part by NSF grant DMS-1209111.
References
Akritas, M. G. (2000), The Central Limit Theorem Under Censoring,
Bernoulli, 6, 11091120. [649,652]
Andrews, D. F., and Herzberg, A. M. (1985), DATA: A Collection of Problems
from Many Fields for the Student and Research Work, Berlin: Springer,
pp. 4549. [648,652]
Chen, S. X. (1994), Empirical Likelihood Confidence Intervals for Linear Regression Coefficients, Journal of Multivariate Analysis, 49,
2440. [646]
DiCiccio, T. J., Hall, P., and Romano, J. P. (1991), Empirical Likelihood is
Bartlett-Correctable, Annals of Statistics, 19, 10531061. [646]
He, S. Y., and Huang, X. (2003), Central Limit Theorem of Linear Regression Model Under Right Censorship, Science in China, 46, 600610.
[649]
Hjort, N. L., McKeague, I. W., and van Keilegom, I. (2009), Extending
the Scope of Empirical Likelihood, Annals of Statistics, 37, 10791111.
[647]
Li, G., and Wang, Q. H. (2003), Empirical Likelihood Methods for Linear
Regression Analysis of Right Censored Data, Statistica Sinica, 13, 51
68. [647]
Miller, R. G., and Halpern, J. W. (1982), Regression With Censored Data,
Biometrika, 69, 521531. [652]
Owen, A. B. (1988), Empirical Likelihood Ratio Confidence Intervals for
Single Functional, Biometrika, 75, 237249. [646]
Owen, A. B. (2001), Empirical Likelihood, London: Chapman and Hall.
[646,647,654]
Pan, X. R., and Zhou, M. (2002), Empirical Likelihood Ratio in Terms of
Cumulative Hazard Function for Right Censored Data, Journal of Multivariate Analysis, 80, 166188. [647]
Qin, G. S., and Zhao, Y. C. (2007), Empirical Likelihood Inference for the
Mean Residual Life Under Random Censorship, Statistics and Probability Letters, 77, 549557. [647,648,650]
Stute, W. (1996), The Jackknife Estimate of Variance of a Kaplan-Meier
Integral, Annals of Statistics, 24, 26792704. [646,650]
Stute, W., and Wang, J. L. (1993), The Strong Law Under Random Censorship, Annals of Statistics, 21, 15911607. [653]
Thomas, D. R., and Grunkemeier, G. L. (1975), Confidence Interval Estimation of Survival Probabilities for Censored Data, Journal of the
American Statistical Association, 70, 865871. [646]
Vardi, Y. (1982), Nonparametric Estimation in the Presence of Length
Bias, Annals of Statistics, 10, 616620. [648]
Wang, Q. H., and Jing, B. Y. (2001), Empirical Likelihood for a Class of
Functions of Survival Distribution With Censored Data, Annals of the
Institute of Statistical Mathematics, 53, 517527. [647,648,650,652]
Yang, S. (1994), A Central Limit Theorem for Functionals of the
Kaplan-Meier Estimator, Statistics and Probability Letters, 21, 337345.
[646]
Yang, Y., and He, X. M. (2012), Bayesian Empirical Likelihood
for Quantile Regression, Annals of Statistics, 40, 11021131.
[647]
655
Zheng, M., Zhao, A. Q., and Yu, W. (2012), Empirical Likelihood Methods
Based on Influence Functions, Statistics and Its Interface, 5, 355266.
[646,648]
Zhou, M. (1992), Asymptotic Normality of the Synthetic Data Regression
Estimator for Censored Survival Data, Annals of Statistics, 20, 1002
1021. [653]
(2005), Empirical Likelihood Ratio With Arbitrarily Censored/Truncated Data by EM Algorithm, Journal of Computational
and Graphical Statistics, 14, 643656. [652]
Zhou, M., and Jeong, J. H. (2011), Empirical Likelihood Ratio for Median
and Mean Residual Lifetime, Statistics in Medicine, 30, 152159. [647]
Zhou, M., Kim, M. O., and Bathke, A. C. (2012), Empirical Likelihood
Analysis for The Heteroscedastic Accelerated Failure Time Model, Statistica Sinica, 22, 295316. [647]