Abstract

This paper considers a retrial queueing model where a group of guard channels is reserved for priority and retrial customers. Priority and normal customers arrive at the system according to two distinct Poisson processes. Priority customers are accepted if there is an idle channel upon arrival while normal customers are accepted if and only if the number of idle channels is larger than the number of guard channels. Blocked customers (priority or normal) join a virtual orbit and repeat their attempts in a later time. Customers from the orbit (retrial customers) are accepted if there is an idle channel available upon arrival. We formulate the queueing system using a level dependent quasi-birth-and-death (QBD) process. We obtain a Taylor series expansion for the nonzero elements of the rate matrices of the level dependent QBD process. Using the expansion results, we obtain an asymptotic upper bound for the joint stationary distribution of the number of busy channels and that of customers in the orbit. Furthermore, we develop an efficient numerical algorithm to calculate the joint stationary distribution.

1. Introduction

In this paper, we consider multiserver retrial queues with guard channels for priority and retrial customers. Retrial queues are characterized by the fact that a blocked customer repeats its request after a random time. During retrial intervals, the customer is said to be in the orbit. This type of queueing models is widely used in modelling and performance analysis of communication and service systems, especially in cellular networks [16]. For instance, Tran-Gia and Mandjes [6] report the influence of retrials on the performance of cellular networks using retrial queueing models. Marsan et al. [3] carry out a fixed point approximation analysis for retrial queueing models arising from cellular networks while some extension is presented in [4]. Artalejo and Lopez-Herrero analyze a multiserver queue for cellular networks operating under a random environment using a four-dimensional Markov chain.

The guard channel concept has been extensively used in communication systems [13, 6]. This is also referred to as trunk (or circuit or bandwidth) reservation in teletraffic literature [7, 8]. Tran-Gia and Mandjes [6] propose some multiserver retrial queues with fresh and handover calls and guard channels for a base station in cellular networks. In [6], the orbit size is assumed to be finite which simplifies the analysis.

The analysis of multiserver retrial queues with infinite orbit size is challenging due to the fact that the underlying Markov chain is state dependent because the retrial rate is proportional to the number of customers in the orbit. Thus, even for the fundamental model with one type of traffic and without guard channels, the stationary distribution is expressed in terms of simple functions for only some special cases, that is, one or two servers [9]. We refer to [911] for some efforts in finding analytical expressions for the joint stationary distribution for the cases of more than two servers. For models with both retrial and guard channels, although some numerical methods [1, 3, 6, 1214] have been presented for various models, there is no analytical result available.

This motivates us to consider a new model with both retrials and guard channels for which we explore new analytical and numerical results. From the modelling point of view, the novelty is the priority given to retrial customers. It should be noted that retrial customers are treated the same as normal customers in [13, 5, 6] which is suitable for the context of cellular networks since the base station might not be able to recognize redial calls so as to give them some priority. In [15], retrial customers are given a preemptive priority over waiting customers. To the best of our knowledge, the current paper is the first to consider the priority for retrial customers in the context of queueing models with guard channels. Our model may also be fit for systems with human servers where the service differentiation among two classes of customers is needed. In such a service system, the server can easily recognize retrial customers so as to give them some priority over fresh customers who arrive at the system for the first time. We formulate the queueing system using a level dependent QBD process where the level and the phase are referred to as the number of customers in the orbit and the number of busy channels, respectively.

The stationary distribution of a level dependent QBD process can be expressed in terms of a sequence of rate matrices [16]. Thus, we can characterize the stationary distribution through the sequence of rate matrices. The QBD process of our model possesses some special structure; that is, only the last two rows are nonzero allowing us to get some insights into the structure of the stationary distribution. Liu and Zhao [17] use this property to obtain upper and lower asymptotic bounds for the stationary distribution of the fundamental retrial model without guard channels. Liu et al. [18] further extend their analysis to the model with nonpersistent customers. B. Kim and J. Kim [19] and Kim et al. [20] refine the tail asymptotic results in Liu and Zhao [17] and Liu et al. [18], respectively. Phung-Duc [21] presents a perturbation analysis for a multiserver retrial queue with two types of nonpersistent customers. In [21], the author derives the Taylor series expansion formulae for the nonzero elements of the rate matrices. The difference of our model in comparison with the above work is that the last two rows of the rate matrices are nonzero in our model while for those in [17, 21] only the last row is nonzero. This makes the analysis of our model more complex and challenging.

The main contribution of our paper is threefold. First, using a censoring technique and a perturbation method, we obtain the Taylor series expansion for the rate matrices in terms of the number of customers in the orbit. Our formula is general in the sense that we can obtain the expansion with arbitrary number of terms. This was not reported in Liu and Zhao [17]. Second, using this result we obtain an asymptotic upper bound for the stationary distribution which is more challenging compared to [17, 21] due to the denseness of the rate matrices. It should be noted that this is the first asymptotic result for multiserver retrial queue with guard channels. Third, we present an efficient method to calculate the stationary distribution of the model whose computational complexity is linear to the number of servers. An earlier version of this paper was presented in [22].

The rest of our paper is organized as follows. Section 2 presents the model and some preliminary results on the level dependent QBD formulation. Section 3 is devoted to the presentation of the Taylor series expansion for the rate matrices. In Section 4, we show the asymptotic upper bound for the joint stationary distribution while a numerical algorithm is presented in Section 5. Section 6 provides some numerical examples and Section 7 concludes our paper and presents some future directions.

2. Model and Formulation

2.1. Model

In this paper, we consider a queueing model with two types of customers (types 1 and 2). There are servers; among them servers are assigned as guard channels. Customers of type 1 (high priority) and type 2 (low priority) arrive at the system according to two independent Poisson processes with rates and , respectively. Customers of type 1 can use all servers while those of type 2 cannot use the guard channels. If there are busy servers, the rest of servers automatically become guard channels for customers of type 1. Furthermore, we assume that a blocked customer (both types 1 and 2) retries after some exponentially distributed time with mean . Upon retrial, if there is an idle channel the retrial customer occupies it immediately; otherwise it enters the orbit again. Thus, a retrial customer has the same priority as that of a high priority one. As a result, we may expect that decreasing the number of retrials by a customer improves the quality of service (QoS). Service times for both types 1 and 2 customers are assumed to follow the same exponential distribution with mean .

Remark 1. In this paper, we restrict ourselves to the case of one guard channel; that is, . This is because the asymptotic analysis for case is complex enough and is essentially different from case . Asymptotic analysis for case may need a new technique which will be left for a future study. On the other hand, the stability condition presented in this paper can be extended to case in a straightforward manner while the numerical algorithm can be adapted to case .

Remark 2. From a theoretical point of view, the assumption that retrial customers (both normal and priority) have the same priority significantly simplifies the analysis. This is because if retrial customers keep their initial priority, we need to distinguish two types of retrial customers for which we should have two orbits for priority and normal customers.

2.2. Level Dependent QBD Process

Let and denote the number of busy servers and the number of retrial customers in the orbit at time . Letting , the bivariate process is a Markov chain in the state space , where . We assume that is positive recurrent. The necessary and sufficient condition for the positive recurrence of is given in Lemma 3.

Lemma 3. is positive recurrent if and only if where .

Proof. The proof is presented in Appendix A.

It is easy to see that is a level dependent QBD process whose infinitesimal generator is given as follows:where is the zero matrix with an appropriate dimension and and are square matrices of size . Furthermore, bearing in mind that = North, = South, = West, and = East, these matrices are given and partitioned as follows: where , and is the Kronecker symbol; that is, if and 0 otherwise. Let denote the stationary probability that there are busy servers and customers in the orbit; that is,Furthermore, let We havewhere and are vectors with appropriate dimensions with all 1 elements and all zero elements, respectively. It is established in [16] that the solution of (6) is given by where is the minimal nonnegative solution ofFurthermore, is determined by Thus the problem of finding the stationary distribution is equivalent to that of obtaining the rate matrices. However, the rate matrices do not have closed forms in general leading to algorithmic approaches for numerical calculation. To this end, we present Lemmas 4 and 5.

Lemma 4 (Proposition   in [23]). Let denote the set of square matrices of size . Furthermore, let denote the following function: It is easy to see that satisfies where .

Lemma 5 (Proposition   in [23]). is defined by the following recursive formulae: One has

Remark 6. Lemmas 4 and 5 allow us to derive a numerical algorithm for calculating the rate matrices. They also imply that the rate matrices are matrix continued fractions. Bright and Taylor [24, 25] propose a recursive algorithm for computing rate matrix . From Lemmas 4 and 5, we observe that the first rows of are zero. In Section 5, we propose a method for calculating with computational complexity of by exploiting this sparsity and Lemma 5. It should be noted that the recursive algorithm in [24, 25] has the computational complexity of due to the denseness of -matrices (see Bright and Taylor [24, 25]).

It is easy to see that the first rows of and are zeros. Similar to other block matrices, we also partition as It is easy to see that and . Furthermore, we denote the elements of and as follows:

Remark 7. It should be noted that, in comparison with a previous version [22], some notations have been changed. In particular, and () in [22] are replaced by and in the current paper.

In Section 3, we show the Taylor series expansion of in terms of . Comparing the last two rows on both sides of (8) yieldsRewriting (16) in the scalar form, we obtainwhere

Lemma 8 (Lemma   in [17, 18] and Proposition   in [21]). One hasComparing the last two elements on both sides of (25) yields

Proof. This lemma follows from the fact that the following matrix represents the infinitesimal generator of the ergodic Markov chain censored in levels , where . Let denote the infinitesimal generator of the censored Markov chain. We havewhere Therefore, By comparing the last two elements of both sides of this equation, we obtain the announced result.

Corollary 9. For case , explicit expressions for nonzero elements of are given as follows:due to (17) and (26) with . It follows from (27) and (21) with thatFurthermore, substituting these explicit expressions into (20) and (23) and arranging the results, we obtain

Remark 10. It should be noted that the explicit results in Corollary 9 cannot be obtained for case . Thus, in the next section, we present an asymptotic expansion for the rate matrices in the general case with an arbitrary value of .

3. Taylor Series Expansion

In this section, we derive the Taylor series expansion for all the nonzero elements of the rate matrices. In particular, we find the Taylor series expansion of and in terms of . We use and to denote the coefficients of the Taylor series expansion, where is the number of idle servers. We use the convention that if or then and . Furthermore, implies and implies , respectively.

In this section, Lemma 12 gives the one-term expansion while Lemma 13 improves Lemma 12 by replacing small order by big order . Furthermore, Theorem 14 provides the general expansion formulae for the higher order Taylor series expansions of and .

Remark 11. In this section, we find the Taylor expansion for nonzero components. The basic idea in a perturbation approach is that the coefficient of th term is derived based on the coefficients of the lower term expansions, that is, th term expansion (). In this paper, we find the coefficients of th term of and for in parallel. In principle, Lemmas 12 and 13 and Theorem 14 below could be merged into one theorem; we however present these separately in order for clarity.

Lemma 12. One has the one-term series expansion () for nonzero elements of as follows: where the sequences and are given as follows:

Proof. The technical details are provided in Appendix B.

Lemma 13. The series expansion formulae () in Lemma 12 can be improved as

Proof. The technical details are provided in Appendix C.

Theorem 14. The nonzero elements of () can be expanded as follows:where are recursively defined as follows: Furthermore, where denotes the Pochhammer symbol defined by

Proof. The technical details are provided in Appendix D.

4. Asymptotic Upper Bound

In this section, we present an asymptotic upper bound for the stationary distribution. To this end, we use Lemmas 15 and 16.

Lemma 15. For a square matrix and a vector , one has where and .

Lemma 16 (Fact   in [17]). For integers ) and satisfying , one has

Remark 17. In [17], only the last row of the rate matrices is nonzero. This fact allows us to evaluate the tail probability using the product of a sequence of scalars. However, since the last two rows of the rate matrices are nonzero in our model, we need to deal with the product of a sequence of matrices. Thus, in order to apply the technique given in [17], that is, Lemma 16, we need to use Lemma 15.

Theorem 18. One defines . One then has where .

Proof. The proof uses Lemmas 15 and 16. We have whereIt follows from that . Thus, applying Lemma 15 repeatedly, we obtain For a sufficiently large , is given by whereThus, for the parameters that satisfy Lemma 16, we have implying the desired result.

Corollary 19. One has

Proof. From , we have It follows from Theorem 14 that Theorem 18 yields Thus,

5. Numerical Algorithm

In this section, we propose a computational algorithm for the stationary distribution of our model extending that proposed by Phung-Duc et al. [26] for the fundamental M/M// retrial queues without guard channels. In Section 5.1, we show some results which are the basis for the algorithm. Section 5.2 presents the algorithms for the rate matrices and the stationary distribution. Section 5.3 proposes a simple method for determining the truncation point used in Algorithm 2 in Section 5.2 for the stationary distribution. Section 5.4 derives some performance measures such as the blocking probability for type 2 customers (low priority) and that for type 1 and retrial calls.

5.1. Efficient Computation

Due to Lemma 4, we need to compute inverse matrices in order to obtain . It may take a long time when the number of servers is large. Thus, instead of computing the inverse matrices, we propose a new method exploiting the fact that only the last two rows are nonzero. The computational complexity of our new method is only . In particular, the computational complexity in all the theorems and lemmas below is .

It should be noted that the computation of and is equivalent to that of their last two rows and ; that is,where and () are the row vectors of elements.

Definition 20. We define the function as follows. Let where and are the second last and the last rows of . Furthermore, where and are vectors with an appropriate dimension.

It is easy to see that and satisfy the following equations: for . Lemmas 21 and 22 compute and using , respectively. Furthermore, Lemma 23 computes the stationary distribution of the censored Markov chain on level 0 using .

Lemma 21. For arbitrary , , one has where and are given as follows:

Proof. The technical details are provided in Appendix E.

Lemma 22. For arbitrary and , one has where and are given as follows: Furthermore,

Proof. This lemma can be proved using the same technique as in Lemma 21.

Lemma 23. Solution to is given by , where is recursively defined as and then

Remark 24. is proportional to .

Remark 25. Computation of and using Lemmas 21 and 22 might be numerically unstable due to overflow. Thus, we use recursive formulae in Theorem 26 to obtain a numerically stable scheme.

Theorem 26. Sequence represents either or . is calculated in terms of and as follows: where are given as follows: In addition,

Proof. We prove Theorem 26 using mathematical induction. Let denote defined in (57). We have Thus, and . For , we prove by mathematical induction. For , assuming that are true, we show that it is also true for . Indeed, using the assumption of mathematical induction, we have where . Arranging this formula yields implying that case is also true. Thus, for any , the desired result is established. We can show similar result for .

Remark 27. Using Theorem 26, we can calculate () in terms of and and () in terms of and . Furthermore, , , , and are obtained from Lemmas 21 and 22.

Remark 28. Tran-Gia and Mandjes [6] propose some models where blocked handover calls do not retry but are lost. The results in Section 5.1 are easily adapted to these models.

5.2. Computational Algorithm

In this section, we present an algorithm for computing the rate matrices and then a procedure for the computation of the stationary distribution. Algorithm 1 shows a method for while Algorithm 2 computes approximation to the stationary distribution, where is an arbitrary increasing sequence and is the truncation point given in advance. We will discuss how to choose the truncation point in Section 5.3.

Input:
Output:
;
Compute and using Lemmas 21 and 22 and Theorem 26.
while do
;
Compute and using Lemmas 21 and 22 and Theorem 26.
;
end while
Input:
Output:
Compute using Algorithm 1.
for to do
;
end for
Compute using Lemma 23.
for to do
;
end for
for to do
;
end for
5.3. Determination of Truncation Point

In Algorithm 2, the truncation point is given in advance and it should be large enough such that the tail probability is sufficiently small; that is, where is given in advance.

However, since is not explicitly obtained for general M/M// retrial queues, a direct determination of such is difficult. In this paper, we use the explicit results for M/M// retrial queue to determine this truncation point. In particular, we consider M/M/1/1 retrial queue with arrival rate , retrial rate , and service rate . This queue is stable since due to the stability condition of our original model.

Let denote the probability that the number of busy servers is and the number of customers in the orbit is in M/M/1/1 retrial queue. It is shown in [26] that where and denotes the Pochhammer symbol.

Using this result, we set the truncation point as follows:We verify the accuracy of this choice using numerical results.

5.4. Blocking Probability

We derive blocking probabilities as performance measures. In our model, priority (type 1) and retrial customers are blocked when all the servers are occupied while normal (type 2) customers are blocked when at least servers are occupied. Thus, the blocking probability of normal customers is given by and the blocking probability of priority and retrial customers is given by

6. Numerical Results

In this section, we show some numerical examples. In particular, in Section 6.1 we confirm the effectiveness of the Taylor series expansion for the rate matrices. Section 6.2 is devoted to the numerical investigation of the asymptotic behavior for the joint stationary distribution. Section 6.3 presents the blocking probabilities for priority and normal customers against the number of channels.

6.1. Accuracy of the Taylor Series Expansion

The rate matrix is calculated using Algorithm 1 with and . We call the rate matrix obtained by Algorithm 1 under this setting exact result.

First, we present some numerical examples to show the effectiveness of the Taylor series expansion. Tables 1 and 2 show numerical results of () for and 10, respectively. Tables 3 and 4 show numerical results of () for and 10, respectively. Other parameters are given by , , and and is calculated from traffic intensity . We obtain exact value for the rate matrices using the matrix continued fraction approach [23] with enough accuracy (relative error of the order of ). The one-, two-, and three-term expansions () are expressed by , , and , respectively. In these tables, we show the relative errors, that is, , , and .

We observe that the Taylor series expansion gives a good approximation in the sense that the relative error is quite small. The relative errors for case are smaller than those for case . This fact agrees with the Taylor series expansion formulae. We also observe that the relative error increases with the traffic intensity. This suggests that we need more computational effort for the cases of relatively heavy load in comparison with those of relatively light load.

Furthermore, we observe that relative error in Tables 2 and 4 () is smaller than the corresponding one in Tables 1 and 2 (), respectively. This implies that the Taylor series expansion gives good approximation for the case of a relatively large retrial rate. This is the case of interest in practice where customers are impatient.

Figure 1 represent against the number of expansion terms. The parameters are given by , , , , , and . We observe that the Taylor series expansion converges to the exact value after about terms. Interestingly, we observe that the Taylor series expansions for oscillate and converge to the exact values.

6.2. Asymptotic Behavior of

Figure 2 shows against for some fixed . Parameters are given by , , , , , and . Joint probability is computed using the algorithm presented in [23] (see [22] for details). We observe that the five curves for , and 0 have a negative slope. This implies that there should exist positive , , and such that Thus, the asymptotic results obtained in this paper can be further refined to be tighter.

6.3. Blocking Probability versus Number of Servers

We use the following fixed parameters , and while varying the number of servers from 1 to 100. Truncation point is determined using the method in Section 5.3 with . Blocking probabilities are and for high and low priority customers, respectively. Figure 3 represents the blocking probabilities of two types of customers for three values of (0.1, 1, and 10). Obviously, for the same , the blocking probability for low priority customers is higher than that of high priority customers. From Figure 3, we can observe a large difference between the curve for type 1 customers and the corresponding one for type 2 customers. This implies that one guard channel is enough to guarantee the QoS of type 1 customers. Furthermore, the blocking probabilities increase with because customers who retry in a short interval may suffer from the same congested situation.

An important observation is that all the curves are asymptotically linear when the number of servers is large. Asymptotic analysis for the case of large number of servers may be the topic of any future research. In this direction, Avram et al. [27] consider the blocking probability under slow retrials and Halfin-Whitt regime.

7. Concluding Remarks

In this paper, we have introduced a new queueing model with a guard channel for retrial and priority customers. The new queueing model is formulated using QBD process which possesses a sparse structure allowing an efficient numerical algorithm and the Taylor series expansion for all the nonzero elements of the rate matrices. We have also derived an asymptotic upper bound for the joint stationary distribution. Numerical results have revealed that the upper bound can be further improved. Future work includes finding the exact asymptotic formulae for the joint stationary distribution.

Appendices

A. Proof of Lemma 3

We prove the sufficient condition in Lemma 3 using Proposition A.1.

Proposition A.1 (Tweedie [28] or Statement , p. 97, in [29]). Let denote a Markov chain with the infinitesimal generator on the state space . Furthermore, if the following conditions (i) and (ii) are satisfied, is positive recurrent: (i) () is a test function bounded from below.(ii). For any , , and for any except for a finite number of states, there exists a positive such that .

Proof of Lemma 3.
(i) Is Positive Recurrent . Let denote the number of busy servers in the steady state. It follows from Little law that Thus, in order for to be positive recurrent we must have or equivalently .
(ii) Is Positive Recurrent . The transition rate of is given by where . First, for ,For ,For ,For , we consider the test function . We have (). Furthermore, is defined as follows:It follows from (A.3), (A.4), and (A.5) thatSince , for any we have . Furthermore, since for we have . Thus, for any positive , there exists such that, for and , we have .
Next, we prove that, except for a finite number of states, there exists such that . In order that except for a finite number of states, we choose such thatThus, from the above formula and Proposition A.1, if then is positive recurrent.

B. Proof of Lemma 12

Proof. We prove that, for , by mathematical induction, where if .
(i) Case . According to Lemma 8, for Furthermore, it follows from (17) and (21) thatFrom (B.2) and (B.4), we obtain In addition, it follows from (20) and (23) that From (B.3), we obtain Deleting and from both sides yields From (B.2), we obtainFrom (18) and (B.3), we have It follows from (B.2) and (B.9) thatFrom Lemma 8 and (B.5) and (B.11), we obtainThus, we obtain , , and .
Arranging (22) yields It follows from (B.2), (B.5), and (B.9) thatSubstituting the above formulae into (B.13) with yields . We assume that Lemma 12 is true for ; that is, . From the preceding assumption, (B.2), (B.5), and (B.9), we have Substituting these formulae into (B.13) with , we obtain . Using mathematical induction we have for , which together with Lemma 8 and (B.5) yieldThus, we obtain , , and .
(ii) Case . It should be noted that the derivations for and are the same. Thus, we prove (B.1) for only. For , we assume thatWe prove that the same expression is obtainable for case . Indeed, it follows from (B.4), (B.19), and (B.20) thatFor , assuming that and , we prove that and . Indeed, arranging (18) and (22) yieldsApplying the preceding assumption, (B.9), (B.12), (B.19), and (B.20) to (B.22) yieldsSimilarly, substituting the preceding assumption, (B.9), (B.16), (B.19), and (B.20) to (B.23), we obtainIt follows from (B.17), (B.18), (B.22), (B.23), (B.24), and (B.25) that Thus, we have proven case . As a result, we have proven (B.1) for .
(iii) Case . Substituting (B.17), (B.18), (B.19), and (B.20) with into (B.4), we obtain(iv) Case . Arranging (20) and (23), we obtainFrom (B.17) and (B.18) with , we obtain Substituting the above two formulae into (B.28) yieldsDeleting and from both sides yields From these two formulae and the result for , we obtain where

C. Proof of Lemma 13

Proof. We prove Lemma 13 using mathematical induction.
(i) Case . From Lemma 8, we have Furthermore, from Lemma 12, we have Thus, we obtain(ii) Case . We assume (36) and (37) are true for with , and we prove that they are also true for . Arranging (18) and (22) with yieldsApplying the assumption of mathematical induction, Lemma 12, and (36) with , we obtain Thus, substituting the above formulae into (C.4) yieldsSimilarly, it follows from the assumption of mathematical induction, Lemma 12, and (37) with that Thus, substituting these formulae into (C.5) yieldsTherefore, it follows from mathematical induction that (36) and (37) are true for .
(iii) Case . Lemma 12 and (36) with and (37) yield Substituting the above formulae into (B.4), we obtain (iv) Case . From (36) with and (37), we obtain Substituting the above two formulae into (B.28) yieldsDeleting and from both sides of the above formulae, we obtain From the result for , we obtain

D. Proof of Theorem 14

Proof. We prove Theorem 14 using mathematical induction. First, we show that Theorem 14 is true for .
(i) Case . From Lemma 8, we haveLemma 13 yields Thus, where and .
(ii) Case . Assuming that (38) and (39) in Theorem 14 are true for and with , we prove that they are also true for . Using the assumption of mathematical induction and Lemma 13, we obtainSubstituting these formulae into (C.4), we obtain whereSimilarly, using the same methodology, we obtain where(iii) Case . Equations (38) and (39) with and Lemma 13 yield Thus, (B.4) are written as follows:where(iv) Case . We use the same methodology as in Lemma 13. Equations (38) and (39) with and Lemma 13 yield Thus, (20) and (23) are written as follows: Therefore, Theorem 14 is established for and .
Next, assuming that Theorem 14 is true for ( terms expansion), we prove that it is also true for ( terms expansion).
(v) Case . Lemma 8 and mathematical induction yieldwhereSimilarly, we havewhere(vi) Case . Assuming that (38) and (39) in Theorem 14 are true for and with , we prove that they are also true for . Applying the assumption of mathematical induction and (38) for yieldsSubstituting these formulae into (C.4) and attracting the coefficient of of (C.4) and arranging the result, we obtain Similarly, using the assumption of mathematical induction and (39) with , we obtain Substituting these formulae into (C.5) and extracting the coefficient of in (C.5) and arranging the result yield Thus, we obtain the result for case .
(vii) Case . Using Lemma 13, (38), and (39) with , we obtainAttracting the coefficient of in (B.4) and arranging the result yield Thus, we obtain the desired result for case .
(viii) Case . We can prove Lemma 13 using the same methodology. Equations (38) and (39) with and Lemma 13 yieldUsing these formulae and attracting the coefficient of in (B.28), we obtain

E. Proof of Lemma 21

Proof. LetFrom Lemma 4, we have , . Because the first rows in both sides are zeros, we obtainSince rank, and are uniquely determined. For simplicity, let and . Comparing both sides of (E.2) yields where . Furthermore,where .
For arbitrary and , we express as follows: It is obvious that for we have and . For case , substituting into (E.6) yields The above formula is rewritten as follows: Therefore,For case , substituting and into (E.5) yieldsRewriting this equation we obtainThus,Case is also obtained by transforming (E.4) using the same manner:Furthermore, substituting and into (E.3) and arranging the result, we obtain

Conflict of Interests

The authors declare that there is no conflict of interests regarding the publication of this paper.

Acknowledgments

The authors would like to thank Professor Peter G. Taylor for some useful comments which help to improve the presentation of the paper. Tuan Phung-Duc was supported in part by JSPS KAKENHI Grant no. 26730011.