Next Article in Journal
An Implicit Finite Difference Scheme and Neural Network Approach for Non-Newtonian Nanofluid Flow Using Induced Magnetic Field
Next Article in Special Issue
Scaling Limits of a Tandem Queue with Two Infinite Orbits
Previous Article in Journal
Spectral Collocation Technique for Solving Two-Dimensional Multi-Term Time Fractional Viscoelastic Non-Newtonian Fluid Model
Previous Article in Special Issue
Analysis of Discrete-Time Queues with Branching Arrivals
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Moment Approach for a Conditional Central Limit Theorem of Infinite-Server Queue: A Case of M/MX/ Queue

by
Ayane Nakamura 
1,† and
Tuan Phung-Duc 
2,*,†
1
Graduate School of Science and Technology, University of Tsukuba, Tsukuba 305-8577, Japan
2
Institute of Systems and Information Engineering, University of Tsukuba, Tsukuba 305-8577, Japan
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Mathematics 2023, 11(9), 2088; https://doi.org/10.3390/math11092088
Submission received: 6 March 2023 / Revised: 21 April 2023 / Accepted: 23 April 2023 / Published: 27 April 2023
(This article belongs to the Special Issue Queue and Stochastic Models for Operations Research II)

Abstract

:
Several studies have been conducted on scaling limits for Markov-modulated infinite-server queues. To the best of our knowledge, most of these studies adopt an approach to prove the convergence of the moment-generating function (or characteristic function) of the random variable that represents a scaled version of the number of busy servers and show the weak law of large numbers and the central limit theorem (CLT). In these studies, an essential assumption is the finiteness of the phase process and, in most of them, the CLT for the number of busy servers conditional on the phase (or the joint states) has not been considered. This paper proposes a new method called the moment approach to address these two limitations in an infinite-server batch service queue, which is called the M/M X / queue. We derive the conditional weak law of large numbers and a recursive formula that suggests the conditional CLT. We derive series expansion of the conditional raw moments, which are used to confirm the conditional CLT by a symbolic algorithm.

1. Introduction

Infinite-server queues have a wide range of applications as an approximation for queues with a sufficient number of servers and have been studied for a long time. In particular, studies have been conducted on the scaling models, where the arrival and transition rates of the phase are scaled by a factor. For example, Blom et al. [1] considered an infinite-server queue with arrival and service rates depending on the state of the Markovian background process. They derived the weak law of large numbers and the central limit theorem (CLT) for the number of busy servers under heavy traffic. To the best of our knowledge, most of these studies have adopted an approach to prove the convergence of the moment-generating function (or characteristic function) of the random variable that represents the number of busy servers [1,2,3,4,5]. The limitations of this approach are: (i) the state space of the phase (e.g., Markovian background state in [1]) is finite, and (ii) the number of busy servers conditional on the phase has not been considered (it should be noted that only [5] derives the CLT in terms of a matrix representation for the two-dimensional joint states of the M/G/ queue in a random environment, by using the characteristic function in Kolmogorov differential equations of the joint state probabilities).
This paper proposes a new method called the moment approach for the analysis of scaling models of a special class of infinite-server queues. In a nutshell, the idea is to prove the convergence of an arbitrary order moment of the random variable for the scaled number of the number of busy servers conditional on the phase to the corresponding moments of the targeting distribution. The proposed approach may have the following advantages:
  • Models whose phases have infinite state space can be considered, as long as their joint moments (of the phase and number of busy servers) are explicitly obtained.
  • Scaling limits for the number of busy servers conditional on the phase can be considered.
As the first to investigate this approach, we consider an infinite-server batch service queue, which is called the M/M X / queue. The batch size distribution X is an infinite support discrete distribution. The M/M X / queue has several applications where customers, products, or data are served in a group (whose size is determined by an arbitrary distribution), for example, transportation systems such as shuttle buses and ride-sharing, logistic systems such as home delivery service, and batch-processing in data centers [6,7]. The detailed settings of the M/M X / queue are described in the next section. Note that most related studies (e.g., [6,8,9]) assume a finite support distribution, although many discrete distributions have infinite support, for example, geometric and Poisson distributions. Regarding the scaling model, our previous research [7] derived the weak law of large numbers and the CLT of the number of busy servers for the M/M X / queue. However, this research imposed the constraint that X follows a finite support distribution in order to adapt to [1]. In this study, we consider the scaling limits for the number of busy servers conditional on the number of waiting customers and the batch size of the M/M X / queue with an arbitrary support batch-size distribution. In particular, we prove the conditional weak law of large numbers and a recursive formula suggesting the conditional CLT. Furthermore, we derive series expansions of the conditional moments and propose a symbolic computation algorithm to confirm the CLT.
The reminder of this paper is organized as follows. First, we describe the M/M X / queue in detail in Section 2. In Section 3, we summarize the results of the previous research and prepare some lemmas. Based on Section 3, we present the main results in Section 4. Furthermore, some symbolic computation results for the proof of CLT are shown in Section 5. Finally, concluding remarks are presented in Section 6.

2. M/M X / Queue and Preliminary Results 

This section summarizes the existing results of the M/M X / queue that were obtained in [7]. The arrival process of customers is a Poisson process with rate λ , and the service time follows an exponential distribution with rate μ . The batch size distribution and its probability generating function (PGF) are defined as q c = P ( X = c ) ( c 1 ) and Ψ ( z ) = c = 1 z c q c , respectively. We define the j-th factorial moment B j as
B j = E [ X ( X 1 ) ( X 1 + j ) ] ,
and we assume that B j < for any j. Once the number of waiting customers reaches X, all these customers are served by one server for an exponentially distributed time with mean 1 / μ , and a new batch size is newly determined by X. Let I ( t ) , S ( t ) , and U ( t ) denote the number of busy servers, number of waiting customers in the system, and size of the batch collecting customers, respectively, at time t. In addition, defining
V 1 = { ( 0 , 1 ) } ,
V a = { ( 1 , a ) , ( 2 , a ) , ( a 1 , a ) } ( a 2 ) ,
V = { V 1 , V 2 , V 3 , }
U = Z × V ,
it is clear that { ( I ( t ) , S ( t ) , U ( t ) ) t 0 } becomes an irreducible continuous-time Markov chain with the state space U . Moreover, let I , S , and U denote I ( t ) , S ( t ) , and U ( t ) in the steady state, respectively.
We can also denote the stationary distribution and PGF as
π i , k , c = lim t P ( I ( t ) = i , S ( t ) = k , U ( t ) = c ) ,
Π k , c ( z ) = i = 0 π i , k , c z i , 0 k c 1 , 1 c z 1 ,
respectively. The stationary distribution π i , k , c and PGF Π k , c ( z ) are given by Lemma 1.
Lemma 1
(Theorem 1 in [7]). π i , k , c and Π k , c ( z ) are given as follows:
π i , k , c = 1 i ! n = 0 f n + i ( k , c ) ( 1 ) n n ! , Π k , c ( z ) = F k , c ( z 1 ) ,
where
f n ( 0 , 1 ) = n ! λ μ n + λ 1 Ψ λ μ n + λ l = 1 n 1 Ψ λ μ l + λ 1 Ψ λ μ l + λ × 1 E [ X ] ,
f n ( k , c ) = n ! λ μ n + λ k + 1 1 Ψ λ μ n + λ l = 1 n 1 Ψ λ μ l + λ 1 Ψ λ μ l + λ × q c E [ X ] , 1 k c 1 , 2 c .
with the convention that l = 1 0 = 1 , and
F k , c ( z ) = n = 0 f n ( k , c ) z n n ! .
Proof. 
The proof is given by Appendix A.    □
Based on Lemma 1, Lemma 2 can be shown immediately.
Lemma 2.
Let I ( k , c ) denote the conditional random variable for the number of busy servers when S = k , U = c , that is,
P ( I ( k , c ) = i ) = P ( I = i , S = k , U = c ) P ( S = k , U = c ) ,
under the steady state. The n-th factorial moment is defined as
f ( k , c , n ) = E [ I ( k , c ) ( I ( k , c ) 1 ) ( I ( k , c ) 2 ) ( I ( k , c ) n + 1 ) ] ,
and this can be calculated as follows:
f ( k , c , n ) = n ! λ μ n + λ k + 1 1 Ψ λ μ n + λ l = 1 n 1 Ψ λ μ l + λ 1 Ψ λ μ l + λ .
Proof. 
The stationary probability that the number of waiting customers is k and the size of the batch collecting customers in progress is c at the moment a customer arrives at the system is given by
P ( S = k , U = c ) = q c E [ X ] .
By substituting this result for Lemma 1, we obtain Lemma 2.    □
Here, let F ^ k , c ( z ) denote the factorial moment-generating function (FMGF) of the conditional number of busy servers given by
F ^ k , c ( z ) = n = 0 f ( k , c , n ) z n n ! .
Then Lemma 3 can be naturally shown.
Lemma 3.
The steady state probabilities and PGF, i.e.,
Π ^ k , c ( z ) : = i = 0 P ( I ( k , c ) = i ) z i ,
for the conditional number of busy servers are given as follows:
P ( I ( k , c ) = i ) = 1 i ! n = 0 f ( k , c , n + i ) ( 1 ) n n ! a n d Π ^ k , c ( z ) = F ^ k , c ( z 1 ) .
Proof. 
Lemma 2 and the discussion of Lemma 1 yield the conclusion.    □
Remark 1.
In what follows, let the symbol with the superscript (N) denote the corresponding one where λ is replaced by N λ . For example, f ( k , c , n ) ( N ) represents f ( k , c , n ) where λ is replaced by N λ as follows:
f ( k , c , n ) ( N ) = n ! N λ μ n + λ k + 1 1 Ψ N λ μ n + N λ l = 1 n 1 Ψ N λ μ l + N λ 1 Ψ N λ μ l + N λ .
Some asymptotic results for the M/M X / queue are also proven in [7]. In [7], a weak law of large numbers and CLT for the number of busy servers under heavy traffic regime and the constraint that X follows a finite support distribution were proven (see Lemmas 4 and 5). The method of the proof complies with [1]. Due to the assumption for X, M/M X / can be considered a special case of the model in [1]. To prove Lemmas 4 and 5, it is enough to prove
lim N E [ I ( N ) ] N = λ E [ X ] μ ,
and
lim N E [ ( I ( N ) E [ I ( N ) ] ) 2 ] N = λ μ E [ X ] 2 + E [ X ] + V [ X ] 2 E [ X ] 3 .
Equations (3) and (4)  can be proven by using the closed-form expressions of the factorial moments in Lemma 1. We omit the detail of the proof in this paper (see [7]). Note that (3) and (4) are true for any distributions of X. Assuming that X has finite support, Lemmas 4 and 5 are established due to [1].
Lemma 4
(Theorem 5 in [7]). Under the constraint that X follows a finite support distribution,
N 1 I ( N ) converges in the distribution to λ E [ X ] μ ( : = g ) as N .
Lemma 5
(Theorem 6 in [7]). Under the constraint that X follows a finite support distribution,
N 1 / 2 I ( N ) N g
converges to a random variable with normal distribution with a zero mean and variance σ 2 , where
σ 2 : = λ μ E [ X ] 2 + E [ X ] + V [ X ] 2 E [ X ] 3 ,
as N .

3. Preliminaries for the Moment Approach

This section presents the preliminaries for the moment approach in Section 4.
Lemma 6
(Theorem 1 in [10]). Let { F n ( x ) } be a sequence of distribution functions for which the moments
M r ( n ) = x r d F n ( x )
exist for all r = 0 , 1 , 2 , . Moreover, let F ( x ) be a distribution function in which the moments
M r = x r d F ( x ) ,
exist for all r = 0 , 1 , 2 , . If
lim n M r ( n ) = M r ,
for all r = 0 , 1 , 2 , , and if F ( x ) is uniquely determined by the sequence of moments M 0 , M 1 , M 2 , , then
lim n F n ( x ) = F ( x )
for each continuity point of F ( x ) .
Lemma 7
(Theorem 1 in [11]). For a random variable X with m k = E [ X k ] and f k = E [ X ( X 1 ) ( X k + 1 ) ] ,
m n = k = 0 n S ( n , k ) f k ,
for n 1 , where S ( n , k ) is the Stirling number of the second kind,
S ( n + 1 , k ) = k S ( n , k ) + S ( n , k 1 ) ,
with the initial conditions S ( 0 , 0 ) = 1 and S ( n , 0 ) = S ( 0 , n ) = 0 .
Lemma 8.
The following fact is well known:
Letting X denote the random variable that follows the normal distribution with m k = E [ X k ] and variance σ 2 , we obtain
m n + 1 = m 1 m n + n σ 2 m n 1 .
Lemma 9.
For an arbitrary number a, the following relationship holds:
Ψ 1 1 + a x = 1 + i = 1 j = 1 i B j j ! ( a x ) i .
Proof. 
We define the function h ( x ) as
h ( x ) = Ψ 1 1 + a x = i = 0 h ( i ) ( 0 ) i ! x i .
We can easily calculate the derivative h ( i ) ( x ) and prove this lemma.    □
Lemma 10.
For an arbitrary natural number c, the following relationship holds:
1 1 + c x k + 1 = i = 0 k + i C i ( c x ) i ,
where k C i = k ! / { i ! ( k i ) ! } .
Proof. 
The following transformation is obtained:
( 1 + c x ) ( k + 1 ) = i = 0 j = 0 i 1 ( k + 1 + j ) i ! ( c x ) i = i = 0 ( k + i ) ! k ! i ! ( c x ) i = i = 0 k + i C i ( c x ) i .
The above immediately yields this lemma.    □

4. Main Results

This section presents the main results of this study. In this section, we consider the weak law of large numbers and CLT for the number of busy servers conditional on the number of waiting customers and the batch size of the M/M X / queue with an infinite support batch-size distribution.
It should be noted that we cannot use the framework of [1]. This is because elements 1 and 2 in Section 1 were not considered in [1]. Bolm et al. [1] derived differential equations for the moment-generating functions of the random variables which are scaled versions of the number of busy servers, i.e., N 1 I ( N ) and N 1 / 2 I ( N ) / N g in Lemmas 4 and 5, and then proved the pointwise convergence to the moment-generating functions of degenerate distribution and normal distribution. However, in our settings, it seems to be difficult to even derive the differential equations that the conditional number of busy servers, i.e., I ( k , c ) , satisfies from (A5)–(A7) in Lemma 1. Although the infinite series expression for the PGF is shown in Lemma 3, it is hard to discuss the limit of this representation directly.
Therefore, as we introduced in Section 1, we tackle this challenging analysis using the moment approach. Based on Lemma 6, we consider the limit for the explicit expression of the conditional factorial moments in Lemma 2 and discuss the weak law of large numbers and CLT.
First, Theorem 1 shows the weak law of large numbers N 1 I ( k , c ) ( N ) .
Theorem 1.
N 1 I ( k , c ) ( N ) converges in the distribution to g as N .
Proof. 
We can rewrite the n-th factorial moment f ( k , c , n ) ( N ) for n 1 as follows,
f ( k , c , n ) ( N ) = ξ ( k , c , n ) ( N ) f ( k , c , n 1 ) ( N ) ,
where
ξ ( k , c , n ) ( N ) = Ψ N λ μ ( n 1 ) + N λ N λ μ ( n 1 ) + N λ k + 1 n N λ n μ + N λ k + 1 1 Ψ N λ n μ + N λ ,
with the initial condition f ( k , c , 0 ) ( N ) = 1 . By using Lemma 9 as x = μ / ( N λ ) , we obtain
lim N ξ ( k , c , n ) ( N ) N = λ B 1 μ = λ E [ X ] μ = g lim N f ( k , c , n ) ( N ) N n = λ E [ X ] μ n = g n
for n 0 . From Lemma 7, the n-th raw moment of I ( k , c ) is given by
m ( k , c , n ) ( N ) = k = 0 n S ( n , k ) f ( k , c , n ) ( N ) .
Therefore, we obtain
lim N E I ( k , c ) ( N ) N n = lim N m ( k , c , n ) ( N ) N n = lim N k = 0 n S ( n , k ) f ( k , c , n ) ( N ) N n = λ E [ X ] μ n = g n
for n 0 . By applying Lemma 6, we can prove the lemma.    □
Next, we move on to the discussion of CLT. We define κ ( k , c , n ) ( N ) as
κ ( k , c , n ) ( N ) = m ( k , c , n ) ( N ) N n = k = 0 n S ( n , k ) f ( k , c , n ) ( N ) N n
and obtain the following lemma and theorem.
Lemma 11.
The following infinite series expressions hold:
ξ ( k , c , n ) ( N ) N = i = 0 ξ ( k , c , n , i ) N i = g + i = 1 ξ ( k , c , n , i ) N i , a n d f ( k , c , n ) ( N ) N r = i = 0 f ( k , c , n , i ) N i = g n + i = 1 f ( k , c , n , i ) N i ,
where
ξ ( k , c , n , i ) = 1 l 0 r i m = 0 i 1 ξ ( k , c , n , i ) l i m ,
l i = μ λ k + i C i ( n 1 ) μ λ i B 1 + μ λ m = 1 i k + i C i m ( n 1 ) μ λ i m j = 1 i + 1 B j j ! n μ λ m ,
r i = k + i C i n μ λ i + m = 1 i j = 1 i B j j ! ( n 1 ) μ λ m k + i C i m n μ λ i m ,
f ( k , c , n , i ) = h = 0 i ξ ( k , c , n , h ) f ( k , c , n 1 , i h ) ,
under initial conditions
ξ ( k , c , n , 0 ) = g , f ( k , c , 0 , 0 ) = 1 , f ( k , c , 0 , i ) = 0 ( i 1 ) .
Proof. 
Evidently, the following holds:
f ( k , c , n ) ( N ) N n = f ( k , c , n 1 ) ( N ) N n 1 ξ ( k , c , n ) ( N ) N .
Therefore, we obtain the following relationship for n 1 :
f ( k , c , n , i ) = h = 0 i ξ ( k , c , n , h ) f ( k , c , n 1 , i h )
under initial conditions
f ( k , c , 0 , 0 ) = 1 , f ( k , c , 0 , i ) = 0 ( i 1 ) .
Here, we obtain the following transformation for ξ ( k , c , n ) ( N ) / N by applying Lemmas 9 and 10 (we define x = μ / ( N λ ) as the second equality).
ξ ( k , c , n ) ( N ) N = 1 N × Ψ N λ μ ( n 1 ) + N λ N λ μ ( n 1 ) + N λ k + 1 n N λ n μ + N λ k + 1 1 Ψ N λ n μ + N λ = 1 N × 1 + i = 1 j = 1 i B j j ! ( ( n 1 ) x ) i i = 0 k + i C i ( ( n 1 ) x ) i × n i = 0 k + i C i ( n x ) i i = 1 j = 1 i B j j ! ( n x ) i .
Therefore, we obtain
i = 0 ξ ( k , c , n , i ) N i i = 0 k + i C i ( n 1 ) μ N λ i i = 1 j = 1 i N B j j ! n μ N λ i = 1 + i = 1 j = 1 i B j j ! ( n 1 ) μ N λ i r i = 0 k + i C i n μ N λ i i = 0 ξ ( k , c , n , i ) N i i = 0 k + i C i ( n 1 ) μ N λ i n μ λ i = 1 j = 1 i B j j ! n μ N λ i 1 = 1 + i = 1 j = 1 i B j j ! ( n 1 ) μ N λ i r i = 0 k + i C i n μ N λ i μ λ i = 0 ξ ( k , c , n , i ) N i i = 0 k + i C i ( n 1 ) μ N λ i B 1 + i = 1 j = 1 i + 1 B j j ! n μ N λ i = 1 + i = 1 j = 1 i B j j ! ( n 1 ) μ N λ i i = 0 k + i C i n μ N λ i .
Then, we can rewrite (11) as
i = 0 ξ ( k , c , n , i ) N i i = 0 l i N i = i = 0 r i N i ,
where l i and r i are given in (7) and (8), respectively. Therefore, considering (7), (8), and (12), we obtain
m = 0 i ξ ( k , c , n , i ) l i m = r i ξ ( k , c , n , i ) = 1 l 0 r i m = 0 i 1 ξ ( k , c , n , i ) l i m .
This yields the lemma.    □
Theorem 2.
The following recursive formula holds for n 1 . Hereafter, we define the notations o ( x ) and O ( x ) , which satisfy lim x 0 o ( x ) / x = 0 and lim x 0 O ( x ) / x = K , respectively, where K is a non-zero constant.
κ ( k , c , n + 1 ) ( N ) = κ ( k , c , 1 ) ( N ) κ ( k , c , n ) ( N ) + n σ 2 N κ ( k , c , n 1 ) ( N ) + O ( N 2 )
Proof. 
By comparing the coefficients of 1 / N in (11) (note that ξ ( k , c , n , 0 ) = g ), we obtain
ξ ( k , c , n , 1 ) = 2 ( n 1 ) B 1 2 + 2 ( n k 1 ) B 1 + n B 2 2 B 1 2 .
Next, we define the following. The coefficient of 1 / N of the right-hand side in (14) is 0 ( = g n + 1 g × g n ) .
N κ ( k , c , n + 1 ) ( N ) N κ ( k , c , 1 ) ( N ) κ ( k , c , n ) ( N ) n σ 2 κ ( k , c , n 1 ) ( N ) = i = 0 a ( k , c , n , i ) N i ,
κ ( k , c , n ) ( N ) = i = 0 b ( k , c , n , i ) N i ,
where
a ( k , c , n , i ) = b ( k , c , n + 1 , i + 1 ) j = 0 i + 1 b ( k , c , 1 , j ) b ( k , c , n , i + 1 j ) n σ 2 b ( k , c , n 1 , i ) ,
b ( k , c , n , i ) = r = n i n S ( n , r ) f ( k , c , r , r n + i ) , i n , r = 0 n S ( n , r ) f ( k , c , r , r n + i ) , i n ,
by using (5). Then, we can find
a ( k , c , n , 0 ) = S ( n + 1 , n ) g n + f ( k , c , n + 1 , 1 ) g f ( k , c , n , 1 ) S ( n , n 1 ) g n b ( k , c , 1 , 1 ) g n n σ 2 g n 1 = f ( k , c , n + 1 , 1 ) g f ( k , c , n , 1 ) ξ ( k , c , 1 , 1 ) g n + n g n n g n B 2 + 2 B 1 2 ( B 1 ) 2 = ξ ( k , c , n + 1 , 1 ) g n ξ ( k , c , 1 , 1 ) g n + n g n n g n B 2 + 2 B 1 2 ( B 1 ) 2 = g n 2 n B 1 2 + 2 n B 1 + n B 2 2 B 1 2 + n g n n g n B 2 + 2 B 1 2 ( B 1 ) 2 = 0 .
Note that we used some previously derived results for the transformation in (18), namely, (13),
b ( k , c , 1 , 1 ) = ξ ( k , c , 1 , 1 ) , σ 2 = g B 2 + 2 B 1 2 ( B 1 ) 2 ,
S ( n + 1 , n ) S ( n , n 1 ) = n S ( n , n ) = n ( Lemma ) .
We can easily confirm S ( n , n ) = 1 for n 0 due to the definition of Lemma 7, and
f ( k , c , n + 1 , 1 ) g f ( k , c , n , 1 ) = ξ ( k , c , n + 1 , 1 ) g n ( ( 9 ) ) .
This concludes the proof.    □
Based on Theorem 2 and Lemma 8, we have the normal approximation as follows:
Remark 2.
We have the following normal approximation for N 1 :
I ( k , c ) ( N ) N N o r m a l g , σ 2 N .
Based on the above, we have the following conjecture.
Conjecture 1.
The following CLT holds:
N 1 / 2 I ( k , c ) ( N ) N g
converges to a random variable following a normal distribution with a zero mean and variance σ 2 as N .
Remark 3.
Assuming that the CLT in Conjecture 1 holds, we obtain the following insights for the M/M X /∞ queue under heavy traffic:
  • The larger the variance of the batch-size distribution, the larger the variance of the normal distribution, i.e., the variance of the CLT takes the minimum value for the constant batch size.
  • The CLT is equivalent to Lemma 4, i.e., the number of busy servers is independent of the number of waiting customers and batch size under heavy traffic, although the steady state probabilities in Lemma 3 show the dependency of these random variables.
In the following, we present a symbolic computation algorithm to confirm CLT in Conjecture 1. To this end, we prepare the following lemma:
Lemma 12.
Provided that
lim N N n / 2 E I ( k , c ) ( N ) N g n = θ n
exists, the necessary and sufficient condition for the CLT in Conjecture 1 is
θ n = 0 ( n is odd ) ( n 1 ) ! ! σ n ( n is even )
where n ! ! = k = 0 n / 2 1 ( n 2 k ) , or
θ n + 1 = n σ 2 θ n 1 ,
for n 1 .
Proof. 
Lemmas 6 and 8 yield the lemma immediately.    □
Regarding Lemma 12, the following theorem can be proved:
Theorem 3.
(19) and (20) in Lemma 12 holds true for 1 n 4 .
Proof. 
We prove that (19) and (20) in Lemma 12 hold for 1 n 4 in a straightforward manner by using Lemmas 9 and 10. We show the proof for n = 1 , 2 . We omit the case n = 3 , 4 (the simple outline of the proof for n = 3 is shown in Appendix B).
The proof for the case n = 1 is shown as follows:
lim N N 1 / 2 E I ( k , c ) ( N ) N g = lim N N 1 / 2 1 N N λ μ + N λ k + 1 1 Ψ N λ μ + N λ g = lim N N 1 / 2 1 N 1 μ / ( N λ ) + 1 k + 1 1 Ψ 1 1 + μ / ( N λ ) g = lim N N 1 / 2 1 N 1 B 1 μ / ( N λ ) + o ( N 2 ) g = 0 .
With regard to the case n = 2 , we have
E ( I ( k , c ) ( N ) N g ) 2 = m ( k , c , 1 ) ( N ) 2 + f ( k , c , 2 ) ( N ) + f ( k , c , 1 ) ( N ) = N λ μ + N λ 2 k + 2 1 Ψ N λ μ + N λ 2 + 2 N λ 2 μ + N λ k + 1 1 Ψ N λ 2 μ + N λ Ψ N λ μ + N λ 1 Ψ N λ μ + N λ + N λ μ + N λ k + 1 1 Ψ N λ μ + N λ = ( numerator ) ( denominator ) + N λ μ + N λ k + 1 1 Ψ N λ μ + N λ ,
where
( numerator ) = 2 N λ 2 μ + N λ k + 1 Ψ N λ μ + N λ 1 Ψ N λ μ + N λ N λ μ + N λ 2 k + 2 1 Ψ N λ 2 μ + N λ ,
and
( denominator ) = 1 Ψ N λ 2 μ + N λ 1 Ψ N λ μ + N λ 2 .
Considering Lemmas 9 and 10 and letting x denote μ / ( N λ ) , the numerator and the denominator can be transformed as follows:
( numerator ) = 2 1 2 x + ( 2 x ) 2 + o ( N 3 ) k + 1 1 B 1 x + B 1 + B 2 2 x 2 + o ( N 3 ) × B 1 x B 1 + B 2 2 x 2 + o ( N 3 ) 1 x + x 2 + o ( N 3 ) 2 k + 2 B 1 x B 1 + B 2 2 x 2 + o ( N 3 ) = 2 B 1 x + 2 ( k + 1 ) ( 2 x ) B 1 x 2 B 1 2 x 2 2 B 1 + B 2 2 x 2 2 B 1 x ( 2 k + 2 ) ( x ) B 1 ( 2 x ) + B 1 + B 2 2 ( 2 x ) 2 + o ( N 3 ) = 2 B 1 2 x 2 + 2 B 1 x 2 + B 2 x 2 + o ( N 3 ) = 2 B 1 2 + 2 B 1 + B 2 μ N λ 2 + o ( N 3 ) = 2 E [ X ] 2 + 2 E [ X ] + E [ X ( X 1 ) ] μ N λ 2 + o ( N 3 ) ,
( denominator ) = 2 B 1 3 x 3 + o ( N 4 ) = 2 E [ X ] 3 μ N λ 3 + o ( N 4 ) .
Therefore, considering (22), we obtain
lim N E ( I ( k , c ) ( N ) N g ) 2 N = lim N 1 N 2 E [ X ] 2 + 2 E [ X ] + E [ X ( X 1 ) ] μ N λ 2 + o ( N 3 ) 2 E [ X ] 3 μ N λ 3 + o ( N 4 ) + g = λ μ 2 E [ X ] + E [ X ( X 1 ) ] 2 E [ X ] 3 = λ μ E [ X ] 2 + E [ X ] + V [ X ] 2 E [ X ] 3 = σ 2 .
This concludes the proof.    □
The case of n = 3 , 4 can be proved after tedious calculations. The main idea is to group the terms in the expansion of the central moments, i.e., ( I ( k , c ) ( N ) / N g ) n . At the first glance, this quantity seems to have the order of a constant. However, we must prove that it has at most the order of N n / 2 . When n is large, however, the number of terms in the binomial expansion is also large, and it is difficult to find the rule for grouping these terms to evaluate the order. As a result, the proof (21) in Lemma 12 for any n is extremely complex (we demonstrate the difficulty in the proof for the case n = 3 in Appendix B). Therefore, for the general case of n, we propose a symbolic computation procedure for the proof as in Lemma 13:
Lemma 13.
The recurrence formula (21) holds if
N ( n + 1 ) / 2 i = 1 l = 0 n 1 n C l a ( k , c , n l , i ) ( g ) l N i + 1 = o ( 1 )
holds.
Proof. 
First, we obtain the following transformation of the central moment using the binomial theorem and (14) (note that a ( k , c , n l , 0 ) = 0 was proved in (18)):
N n / 2 l = 0 n n C l κ ( k , c , n l ) ( N ) ( g ) l = N n / 2 E I ( k , c ) ( N ) N λ E [ X ] μ n = N n / 2 l = 1 n 1 n C l κ ( k , c , n l + 1 ) ( N ) ( n l ) σ 2 N κ ( k , c , n l 1 ) ( N ) i = 1 a ( k , c , n l , i ) N i + 1 ( g ) l κ ( k , c , 1 ) ( N ) + N n / 2 κ ( k , c , n ) ( N ) + N n / 2 ( g ) n = N n / 2 l = 1 n n C l κ ( k , c , n l + 1 ) ( N ) ( g ) l κ ( k , c , 1 ) ( N ) N n / 2 l = 1 n 1 n C l ( n l ) σ 2 N κ ( k , c , n l 1 ) ( N ) ( g ) l κ ( k , c , 1 ) ( N ) N n / 2 l = 1 n 1 n C l i = 1 a ( k , c , n l , i ) N i + 1 ( g ) l κ ( k , c , 1 ) ( N ) + N n / 2 κ ( k , c , n ) ( N ) = N n / 2 l = 1 n ( n + 1 C l n C l 1 ) κ ( k , c , n l + 1 ) ( N ) ( g ) l κ ( k , c , 1 ) ( N ) N n / 2 l = 1 n 1 n 1 C l n σ 2 N κ ( k , c , n l 1 ) ( N ) ( g ) l κ ( k , c , 1 ) ( N ) N n / 2 l = 1 n 1 n C l i = 1 a ( k , c , n l , i ) N i + 1 ( g ) l κ ( k , c , 1 ) ( N ) + N n / 2 κ ( k , c , n ) ( N ) = N n / 2 l = 1 n ( n + 1 C l n C l 1 ) κ ( k , c , n l + 1 ) ( N ) ( g ) l κ ( k , c , 1 ) ( N ) N n / 2 l = 0 n 1 n 1 C l n σ 2 N κ ( k , c , n l 1 ) ( N ) ( g ) l κ ( k , c , 1 ) ( N ) N n / 2 l = 1 n 1 n C l i = 1 a ( k , c , n l , i ) N i + 1 ( g ) l κ ( k , c , 1 ) ( N ) + N n / 2 κ ( k , c , n ) ( N ) + N n / 2 n σ 2 N κ ( k , c , n 1 ) ( N ) 1 κ ( k , c , 1 ) ( N ) = N n / 2 l = 1 n + 1 n + 1 C l κ ( k , c , n l + 1 ) ( N ) ( g ) l κ ( k , c , 1 ) ( N ) N n / 2 ( g ) n + 1 κ ( k , c , 1 ) ( N ) N n / 2 l = 1 n n C l 1 κ ( k , c , n l + 1 ) ( N ) ( g ) l κ ( k , c , 1 ) ( N ) N 1 / 2 n σ 2 κ ( k , c , 1 ) ( N ) N ( n 1 ) / 2 l = 0 n 1 n 1 C l κ ( k , c , n 1 l ) ( N ) ( g ) l + N n / 2 κ ( k , c , n + 1 ) ( N ) κ ( k , c , 1 ) ( N ) N n / 2 l = 1 n 1 n C l i = 1 a ( k , c , n l , i ) N i + 1 ( g ) l κ ( k , c , 1 ) 1 ( N ) N n / 2 1 κ ( k , c , 1 ) ( N ) i = 1 a ( k , c , n , i ) N i + 1 = N n / 2 l = 0 n + 1 n + 1 C l κ ( k , c , n l + 1 ) ( N ) ( g ) l κ ( k , c , 1 ) ( N ) N n / 2 l = 0 n n C l κ ( k , c , n l ) ( N ) ( g ) l + 1 κ ( k , c , 1 ) ( N ) N 1 / 2 n σ 2 κ ( k , c , 1 ) ( N ) N ( n 1 ) / 2 l = 0 n 1 n 1 C l κ ( k , c , n 1 l ) ( N ) ( g ) l N n / 2 l = 0 n 1 n C l i = 1 a ( k , c , n l , i ) N i + 1 ( g ) l κ ( k , c , 1 ) ( N ) = N 1 / 2 N ( n + 1 ) / 2 κ ( k , c , 1 ) ( N ) l = 0 n + 1 n + 1 C l κ ( k , c , n + 1 l ) ( N ) ( g ) l N 1 / 2 n σ 2 κ ( k , c , 1 ) ( N ) N ( n 1 ) / 2 l = 0 n 1 n 1 C l κ ( k , c , n + 1 l ) ( N ) ( g ) l N n / 2 l = 0 n n C l κ ( k , c , n l ) ( N ) ( g ) l + 1 κ ( k , c , 1 ) ( N ) N n / 2 l = 0 n 1 n C l i = 1 a ( k , c , n l , i ) N i + 1 ( g ) l κ ( k , c , 1 ) ( N ) .
Therefore, we obtain
N ( n + 1 ) / 2 l = 0 n + 1 n + 1 C l κ ( k , c , n + 1 l ) ( N ) ( g ) l n σ 2 N ( n 1 ) / 2 l = 0 n 1 n 1 C l κ ( k , c , n + 1 l ) ( N ) ( g ) l = N 1 / 2 N n / 2 l = 0 n n C l κ ( k , c , n l ) ( N ) ( g ) l κ ( k , c , 1 ) ( N ) g + N ( n + 1 ) / 2 i = 1 l = 0 n 1 n C l a ( k , c , n l , i ) N i + 1 ( g ) l ,
and from (15), we find that
N 1 / 2 N n / 2 l = 0 n n C l κ ( k , c , n l ) ( N ) ( g ) l κ ( k , c , 1 ) ( N ) g = N n / 2 l = 0 n n C l κ ( k , c , n l ) ( N ) ( g ) l × N 1 / 2 i = 1 b ( k , c , 1 , i ) N i = o ( 1 ) .
Consequently, to prove (21), we must prove (23).    □
Remark 4.
If (23) holds, it follows from Theorem 3, (24), and (25) that (19) exists for all n. Thus, we have to confirm only (23) and take the limits as N in (24) to obtain (21).
To confirm (23), we conduct the procedure in Algorithm 1. We start the procedure from n = 3 since (23) holds for n = 1 , 2 clearly.
Algorithm 1 Procedure to confirm (23).
Step 1 
Calculate ξ ( k , c , n , i ) for 0 l n + 1 , 0 i n / 2 , by (6)–(8).
Step 2 
Calculate f ( k , c , l , i ) for 0 l n + 1 , 0 i n / 2 , by (9).
Step 3 
Calculate b ( k , c , l , i ) for 1 l n + 1 , 0 i n / 2 , by (17).
Step 4 
Calculate a ( k , c , l , i ) for 1 l n , 1 i n / 2 1 , by (16).
Step 5 
Calculate l = 0 n 1 n C l a ( k , c , n l , i ) ( g ) l ( : = χ ( n , i ) ) for 1 i n / 2 1 , and if χ ( n , i ) = 0 for 1 i n / 2 1 , then we can guarantee (23).

5. Examples of Symbolic Computation

In this section, we show some results of the symbolic computation proposed in Lemma 5. The experiments were conducted by SymPy, which is a Python library for symbolic mathematics. Table 1 shows the results of χ ( n , i ) for 3 n 10 . Here, ‘#’ denotes a non-zero constant. We can confirm χ ( n , i ) = 0 for 1 i n / 2 1 within 3 n 10 . That is, it is guaranteed that (21) holds for 3 n 10 at least. These results support the establishment of Conjecture 1.
As examples, we show the detailed results of χ ( 3 , 1 ) , χ ( 4 , 1 ) , χ ( 5 , 1 ) , and χ ( 5 , 2 ) in Appendix C.

6. Conclusions

In this paper, we proposed the moment approach to analyze scaling models for infinite-server queues. This method considers the scaling limits for the number of busy servers conditional on a phase with infinite state space. We applied this method to the M/M X / queue and presented the following results: the weak law of large numbers (Theorem 1), a recursive formula for the necessary condition of CLT (Theorem 2) that can be utilized for a normal approximation of the system (Remark 2), and a symbolic computation algorithm (Lemma 13) to confirm the CLT (Conjecture 1). Some results of the symbolic computation that support Conjecture 1 were shown in Table 1.
As a future issue, it would be challenging but significant to rigorously prove Conjecture 1, i.e., to prove (23) explicitly. Another interesting direction to explore is to apply the method in this study to any other infinite-server queueing system, especially one whose phase has an infinite state space.

Author Contributions

Conceptualization, A.N. and T.P.-D.; methodology, A.N. and T.P.-D.; software, A.N.; validation, A.N. and T.P.-D.; formal analysis, A.N.; investigation, A.N. and T.P.-D.; writing—original draft preparation, A.N.; writing—review and editing, T.P.-D.; supervision, T.P.-D.; project administration, T.P.-D.; funding acquisition, A.N. and T.P.-D. All authors have read and agreed to the published version of the manuscript.

Funding

This work was funded by JSPS KAKENHI Nos. 21K11765, 18K18006, and JST SPRING No. JPMJSP2124. In addition, this study was also funded by F-MIRAI: R&D Center for Frontiers of MIRAI in Policy and Technology, the University of Tsukuba, and Toyota Motor Corporation collaborative R&D center.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

The poof of Lemma 1 is given by Appendix A. The balance equations of the Markov chain ( I ( t ) , S ( t ) , U ( t ) ) are given by (A1)–(A4).
λ π 0 , 0 , 1 = μ π 1 , 0 , 1 , i = 0 , k = 0 , c = 1 ,
( λ + i μ ) π i , 0 , 1 = c = 2 λ π i 1 , c 1 , c + q 1 λ π i 1 , 0 , 1 + ( i + 1 ) μ π i + 1 , 0 , 1 , i 1 , k = 0 , c = 1 ,
( λ + i μ ) π i , 1 , c = q c λ π i , 0 , 1 + ( i + 1 ) μ π i + 1 , 1 , c , i 0 , k = 1 , c 2 ,
( λ + i μ ) π i , k , c = λ π i , k 1 , c + ( i + 1 ) μ π i + 1 , k , c , i 0 , 2 k c 1 , 3 c .
Multiplying (A1)–(A4) by z i , taking the sum over i Z , and rearranging the result, we obtain the following system of differential equations:
( μ z μ ) Π 0 , 1 ( z ) = λ Π 0 , 1 ( z ) + c = 2 λ z Π c 1 , c ( z ) + q 1 λ z Π 0 , 1 ( z ) , k = 0 , c = 1 ,
( μ z μ ) Π 1 , c ( z ) = λ Π 1 , c ( z ) + q c λ Π 0 , 1 ( z ) , k = 1 , 2 c ,
( μ z μ ) Π k , c ( z ) = λ Π k , c ( z ) + λ Π k 1 , c ( z ) , 2 k c 1 , 3 c .
However, it is not easy to obtain the solution for the system of differential equations because the coefficients are not constant. Hence, we use the factorial moment-generating function method [12]. Letting I, S, and U denote I ( t ) , S ( t ) , and U ( t ) in the steady state, respectively, we define the factorial moments as follows:
f 0 ( k , c ) = i = 0 π i , k , c ,
f n ( k , c ) = E I ( I 1 ) ( I 2 ) ( I n + 1 ) 𝟙 { S = k , U = c } , n 1 .
Moreover, we define the FMGF as:
F k , c ( z ) = n = 0 f n ( k , c ) z n n ! = Π k , c ( z + 1 ) .
Using FMGF, we can rearrange (A5)–(A7) as the following system of differential equations:
μ z F 0 , 1 ( z ) = λ F 0 , 1 ( z ) + c = 2 λ ( z + 1 ) F c 1 , c ( z ) + q 1 λ ( z + 1 ) F 0 , 1 , k = 0 , c = 1 ,
μ z F 1 , c ( z ) = λ F 1 , c ( z ) + q c λ F 0 , 1 ( z ) , k = 1 , 2 c ,
μ z F k , c ( z ) = λ F k , c ( z ) + λ F k 1 , c ( z ) , 2 k c 1 , 3 c .
Equating the coefficients of z n on both sides of (A9)–(A11) yields
( μ n + λ ) f n ( 0 , 1 ) = c = 2 λ f n ( c 1 , c ) + q 1 λ f n ( 0 , 1 ) + c = 2 λ n f n 1 ( c 1 , c ) + q 1 λ n f n 1 ( 0 , 1 ) , k = 0 , c = 1 ,
( μ n + λ ) f n ( 1 , c ) = q c λ f n ( 0 , 1 ) , k = 1 , 2 c ,
( μ n + λ ) f n ( k , c ) = λ f n ( k 1 , c ) , 2 k c 1 , 3 c .
Furthermore, it is clear by the definition that
f 0 ( 0 , 1 ) = i = 0 π i , 0 , 1 = Π 0 , 1 ( 1 ) , k = 0 , c = 1 ,
f 0 ( k , c ) = i = 0 π i , k , c = Π k , c ( 1 ) , 1 k c 1 , 2 c ,
and thus, by substituting z = 1 into (A5)–(A7), we obtain
0 = λ Π 0 , 1 ( 1 ) + c = 2 λ Π c 1 , c ( 1 ) + q 1 λ Π 0 , 1 ( 1 ) , k = 0 , c = 1 ,
0 = λ Π 1 , c ( 1 ) + q c λ Π 0 , 1 ( 1 ) , k = 1 , 2 c ,
0 = λ Π k , c ( 1 ) + λ Π k 1 , c ( 1 ) , 2 k c 1 , 3 c .
From (A15), (A16), and
1 = Π 0 , 1 ( 1 ) + c = 2 k = 1 c 1 Π k , c ( 1 ) = c = 1 c q c Π 0 , 1 ( 1 ) ,
the following holds:
Π 0 , 1 ( 1 ) = f 0 ( 0 , 1 ) = 1 E [ X ] , k = 0 , c = 1 ,
Π k , c ( 1 ) = f 0 ( k , c ) = q c E [ X ] , 1 k c 1 , 2 c .
Solving (A12)–(A14) using these initial conditions, we obtain
f n ( 0 , 1 ) = l = 1 n c = 1 λ l μ l + λ λ μ ( l 1 ) + λ c 1 q c 1 c = 1 λ μ l + λ c q c × 1 E [ X ] ,
and
f n ( 0 , 1 ) = n ! λ μ n + λ 1 Ψ λ μ n + λ l = 1 n 1 Ψ λ μ l + λ 1 Ψ λ μ l + λ × 1 E [ X ] ,
f n ( k , c ) = n ! λ μ n + λ k + 1 1 Ψ λ μ n + λ l = 1 n 1 Ψ λ μ l + λ 1 Ψ λ μ l + λ × q c E [ X ] , 1 k c 1 , 2 c ,
which yields Lemma 1.

Appendix B

We show the outline of the poof of Theorem 3 for n = 3 . First, we obtain the following transformation.
E ( I ( k , c ) ( N ) N g ) 3 = m ( k , c , 1 ) ( N ) 3 + ( 3 m ( k , c , 1 ) ( N ) 2 3 m ( k , c , 1 ) ( N ) + 1 ) f ( k , c , 1 ) ( N ) + 3 ( 1 m ( k , c , 1 ) ( N ) ) f ( k , c , 2 ) ( N ) + f ( k , c , 3 ) ( N ) = ( m ( k , c , 1 ) ( N ) 3 + 3 m ( k , c , 1 ) ( N ) 2 f ( k , c , 1 ) ( N ) 3 m ( k , c , 1 ) ( N ) f ( k , c , 2 ) ( N ) + f ( k , c , 3 ) ( N ) ) + 3 ( m ( k , c , 1 ) ( N ) f ( k , c , 1 ) ( N ) + f ( k , c , 2 ( N ) ) + f ( k , c , 1 ) ( N ) .
After some algebraic manipulations, we obtain
lim N m ( k , c , 1 ) ( N ) 3 + 3 m ( k , c , 1 ) ( N ) 2 f ( k , c , 1 ) ( N ) 3 m ( k , c , 1 ) ( N ) f ( k , c , 2 ) ( N ) + f ( k , c , 3 ) ( N ) N 3 / 2 = 0 ,
lim N 3 ( m ( k , c , 1 ) ( N ) f ( k , c , 1 ) ( N ) + f ( k , c , 2 ) ( N ) ) N 3 / 2 = 0 ,
and
lim N f ( k , c , 1 ) ( N ) N 3 / 2 = 0 .
Therefore, it is clear that the following holds:
lim N E ( I ( k , c ) ( N ) N g ) 3 N 3 / 2 = 0 .

Appendix C

The detailed expressions for χ ( 3 , 1 ) , χ ( 4 , 1 ) , χ ( 5 , 1 ) , and χ ( 5 , 2 ) are given as follows:
χ ( 3 , 1 ) = 3 λ 2 B 1 3 k B 1 2 B 2 / 2 B 1 2 k B 1 B 2 k + 3 B 1 B 2 / 2 B 1 B 3 / 2 + B 2 2 B 1 6 μ 2 + λ 2 6 B 1 3 k 6 B 1 3 6 B 1 2 B 2 6 B 1 2 k + 12 B 1 2 6 B 1 B 2 k + 27 B 1 B 2 5 B 1 B 3 + 12 B 2 2 2 B 1 6 μ 2 λ 2 12 B 1 3 k 6 B 1 3 9 B 1 2 B 2 12 B 1 2 k + 12 B 1 2 12 B 1 B 2 k + 36 B 1 B 2 8 B 1 B 3 + 18 B 2 2 2 B 1 6 μ 2 = 0 ,
χ ( 4 , 1 ) = 4 λ 3 B 1 3 k B 1 2 B 2 / 2 B 1 2 k B 1 B 2 k + 3 B 1 B 2 / 2 B 1 B 3 / 2 + B 2 2 B 1 7 μ 3 + λ 3 4 B 1 3 k 6 B 1 3 5 B 1 2 B 2 4 B 1 2 k + 12 B 1 2 4 B 1 B 2 k + 24 B 1 B 2 4 B 1 B 3 + 10 B 2 2 B 1 7 μ 3 2 λ 3 6 B 1 3 k 6 B 1 3 6 B 1 2 B 2 6 B 1 2 k + 12 B 1 2 6 B 1 B 2 k + 27 B 1 B 2 5 B 1 B 3 + 12 B 2 2 B 1 7 μ 3 + λ 3 12 B 1 3 k 6 B 1 3 9 B 1 2 B 2 12 B 1 2 k + 12 B 1 2 12 B 1 B 2 k + 36 B 1 B 2 8 B 1 B 3 + 18 B 2 2 B 1 7 μ 3 = 0 ,
χ ( 5 , 1 ) = 5 λ 4 B 1 3 k B 1 2 B 2 / 2 B 1 2 k B 1 B 2 k + 3 B 1 B 2 / 2 B 1 B 3 / 2 + B 2 2 B 1 8 μ 4 5 λ 4 4 B 1 3 k 6 B 1 3 5 B 1 2 B 2 4 B 1 2 k + 12 B 1 2 4 B 1 B 2 k + 24 B 1 B 2 4 B 1 B 3 + 10 B 2 2 B 1 8 μ 4 + 5 λ 4 6 B 1 3 k 12 B 1 3 9 B 1 2 B 2 6 B 1 2 k + 24 B 1 2 6 B 1 B 2 k + 45 B 1 B 2 7 B 1 B 3 + 18 B 2 2 6 B 1 8 μ 4 + 5 λ 4 6 B 1 3 k 6 B 1 3 6 B 1 2 B 2 6 B 1 2 k + 12 B 1 2 6 B 1 B 2 k + 27 B 1 B 2 5 B 1 B 3 + 12 B 2 2 B 1 8 μ 4 5 λ 4 12 B 1 3 k 6 B 1 3 9 B 1 2 B 2 12 B 1 2 k + 12 B 1 2 12 B 1 B 2 k + 36 B 1 B 2 8 B 1 B 3 + 18 B 2 2 3 B 1 8 μ 4 = 0 ,
χ ( 5 , 2 ) = 5 λ 3 24 B 1 9 μ 3 ( 36 B 1 4 k 2 + 36 B 1 4 k 36 B 1 3 B 2 k 12 B 1 3 B 3 + 18 B 1 2 B 2 2 24 B 1 2 B 2 k 2 + 24 B 1 2 B 2 k 24 B 1 2 B 3 k + 20 B 1 2 B 3 7 B 1 2 B 4 + 48 B 1 B 2 2 k 42 B 1 B 2 2 + 36 B 1 B 2 B 3 33 B 2 3 ) 5 λ 3 6 B 1 9 μ 3 ( 12 B 1 5 k + 6 B 1 4 B 2 60 B 1 4 k 2 + 96 B 1 3 B 2 k 54 B 1 3 B 2 + 30 B 1 3 B 3 + 24 B 1 3 k 2 24 B 1 3 k 60 B 1 2 B 2 2 + 48 B 1 2 B 2 k 2 144 B 1 2 B 2 k + 72 B 1 2 B 2 + 48 B 1 2 B 3 k 68 B 1 2 B 3 + 13 B 1 2 B 4 120 B 1 B 2 2 k + 186 B 1 B 2 2 84 B 1 B 2 B 3 + 93 B 2 3 ) + 5 λ 3 24 B 1 9 μ 3 ( 48 B 1 5 k + 48 B 1 5 + 48 B 1 4 B 2 132 B 1 4 k 2 + 396 B 1 4 k 432 B 1 4 + 420 B 1 3 B 2 k 936 B 1 3 B 2 + 132 B 1 3 B 3 + 96 B 1 3 k 2 528 B 1 3 k + 576 B 1 3 438 B 1 2 B 2 2 + 120 B 1 2 B 2 k 2 1152 B 1 2 B 2 k + 2088 B 1 2 B 2 + 168 B 1 2 B 3 k 524 B 1 2 B 3 + 43 B 1 2 B 4 522 B 1 B 2 2 k + 2166 B 1 B 2 2 432 B 1 B 2 B 3 + 669 B 2 3 ) 5 λ 3 6 B 1 9 μ 3 ( 36 B 1 5 k + 24 B 1 5 + 30 B 1 4 B 2 108 B 1 4 k 2 + 216 B 1 4 k 180 B 1 4 + 288 B 1 3 B 2 k 486 B 1 3 B 2 + 90 B 1 3 B 3 + 72 B 1 3 k 2 288 B 1 3 k + 216 B 1 3 261 B 1 2 B 2 2 + 96 B 1 2 B 2 k 2 708 B 1 2 B 2 k + 972 B 1 2 B 2 + 120 B 1 2 B 3 k 308 B 1 2 B 3 + 31 B 1 2 B 4 372 B 1 B 2 2 k + 1158 B 1 B 2 2 276 B 1 B 2 B 3 + 393 B 2 3 ) + 5 λ 3 4 B 1 9 μ 3 ( 24 B 1 5 k + 8 B 1 5 + 16 B 1 4 B 2 84 B 1 4 k 2 + 84 B 1 4 k 48 B 1 4 + 180 B 1 3 B 2 k 204 B 1 3 B 2 + 56 B 1 3 B 3 + 48 B 1 3 k 2 120 B 1 3 k + 48 B 1 3 138 B 1 2 B 2 2 + 72 B 1 2 B 2 k 2 372 B 1 2 B 2 k + 348 B 1 2 B 2 + 80 B 1 2 B 3 k 160 B 1 2 B 3 + 21 B 1 2 B 4 228 B 1 B 2 2 k + 528 B 1 B 2 2 162 B 1 B 2 B 3 + 207 B 2 3 ) = 0 .

References

  1. Blom, J.; De Turck, K.; Mandjes, M. A central limit theorem for Markov-modulated infinite-server queues. In Analytical and Stochastic Modeling Techniques and Applications, Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2013; Volume 7984, pp. 81–95. [Google Scholar]
  2. Anderson, D.; Blom, J.; Mandjes, M.; Thorsdottir, H.; De Turck, K. A functional central limit theorem for a Markov-modulated infinite-server queue. Methodol. Comput. Appl. Probab. 2016, 18, 153–168. [Google Scholar] [CrossRef]
  3. Blom, J.; De Turck, K.; Mandjes, M. Functional central limit theorems for Markov-modulated infinite-server systems. Math. Methods Oper. Res. 2016, 83, 351–372. [Google Scholar] [CrossRef]
  4. Blom, J.; De Turck, K.; Mandjes, M. Analysis of Markov-modulated infinite-server queues in the central-limit regime. Probab. Eng. Informational Sci. 2015, 29, 433–459. [Google Scholar] [CrossRef]
  5. Nazarov, A.; Baymeeva, G. The M/G/ Queue in random environment. In Information Technologies and Mathematical Modelling, Communications in Computer and Information Science; Springer: Cham, Switzerland, 2014; Volume 487, pp. 312–324. [Google Scholar]
  6. Nakamura, A.; Phung-Duc, T. Stationary analysis of infinite server queue with batch service. In Performance Engineering and Stochastic Modeling, Lecture Notes in Computer Science; Springer: Cham, Switzerland, 2021; Volume 13104, pp. 411–424. [Google Scholar]
  7. Nakamura, A.; Phung-Duc, T. Exact and Asymptotic Analysis of Infinite Server Batch Service Queues with Random Batch Sizes. 2023; Submitted. [Google Scholar]
  8. Ushakumari, P.V.; Krishnamoorthy, A. The queueing system M/MX(R)/. Asia-Pac. J. Oper. Res. 1998, 15, 17–28. [Google Scholar]
  9. Li, L.; Kashyap, B.R.K.; Templeton, J.G.C. The service system M/MR/ with impatient customers. Queueing Syst. 1987, 2, 363–372. [Google Scholar] [CrossRef]
  10. Takács, L. A moment convergence theorem. Am. Math. 1991, 98, 742–746. [Google Scholar] [CrossRef]
  11. Nadarajah, S.; Okorie, I. Factorial, raw and central moments. Math. Sci. 2016, 41, 65–71. [Google Scholar]
  12. Kapodistria, S.; Phung-Duc, T.; Resing, J. Linear birth/immigration-death process with binomial catastrophes. Probab. Eng. Inf. Sci. 2016, 30, 79–111. [Google Scholar] [CrossRef]
Table 1. Results for symbolic computation of χ ( n , i ) ( 3 n 10 ).
Table 1. Results for symbolic computation of χ ( n , i ) ( 3 n 10 ).
χ ( n , i ) i = 1i = 2i = 3i = 4i = 5
n  =   30####
n  =   40####
n  =   500###
n  =  600###
n =  7000##
n =  8000##
n =  90000#
n  = 100000#
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Nakamura , A.; Phung-Duc , T. A Moment Approach for a Conditional Central Limit Theorem of Infinite-Server Queue: A Case of M/MX/ Queue. Mathematics 2023, 11, 2088. https://doi.org/10.3390/math11092088

AMA Style

Nakamura  A, Phung-Duc  T. A Moment Approach for a Conditional Central Limit Theorem of Infinite-Server Queue: A Case of M/MX/ Queue. Mathematics. 2023; 11(9):2088. https://doi.org/10.3390/math11092088

Chicago/Turabian Style

Nakamura , Ayane, and Tuan Phung-Duc . 2023. "A Moment Approach for a Conditional Central Limit Theorem of Infinite-Server Queue: A Case of M/MX/ Queue" Mathematics 11, no. 9: 2088. https://doi.org/10.3390/math11092088

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop