<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2018-3-3-0-5</article-id><article-id pub-id-type="publisher-id">1462</article-id><article-categories><subj-group subj-group-type="heading"><subject>SYSTEM ANALYSIS AND PROCESSING OF KNOWLEDGE</subject></subj-group></article-categories><title-group><article-title>ABOUT FEATURES OF MONITORING OF EMPLOYMENT OF FREQUENCY RESOURCES OF COMMUNICATION CHANNELS AT THE COMMUNICATION OF INFORMATION BY COGNITIVE WIRELESS COMMUNICATION SYSTEMS</article-title><trans-title-group xml:lang="en"><trans-title>ABOUT FEATURES OF MONITORING OF EMPLOYMENT OF FREQUENCY RESOURCES OF COMMUNICATION CHANNELS AT THE COMMUNICATION OF INFORMATION BY COGNITIVE WIRELESS COMMUNICATION SYSTEMS</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Belov</surname><given-names>Sergey Pavlovich</given-names></name><name xml:lang="en"><surname>Belov</surname><given-names>Sergey Pavlovich</given-names></name></name-alternatives><email>belovssergei@gmail.com</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Belov</surname><given-names>Alexander Sergeevich</given-names></name><name xml:lang="en"><surname>Belov</surname><given-names>Alexander Sergeevich</given-names></name></name-alternatives><email>belov_as@bsu.edu.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Zhilyakov</surname><given-names>Evgeniy Georgievich</given-names></name><name xml:lang="en"><surname>Zhilyakov</surname><given-names>Evgeniy Georgievich</given-names></name></name-alternatives><email>Zhilyakov@bsu.edu.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Zolotar</surname><given-names>Nikolai Ivanovich</given-names></name><name xml:lang="en"><surname>Zolotar</surname><given-names>Nikolai Ivanovich</given-names></name></name-alternatives><email>zolotar_kola@mail.ru</email></contrib></contrib-group><pub-date pub-type="epub"><year>2018</year></pub-date><volume>3</volume><issue>3</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2018/3/it_5.pdf" /><abstract xml:lang="ru"><p>The rapid development of wireless communication systems leads to a constant complication of methods for regulating the use of the frequency spectrum. The number of wireless communication services is growing and more and more frequency bands need to be allocated to provide them. Interference from simultaneously used in one frequency range of radio transmitters leads to significant distortions in transmitted information and can significantly hinder the operation of telecommunication systems for various purposes. Achievements in the field of software-oriented radio systems and, in particular, cognitive radio allow solving these problems. The existing standard of IEEE 802.22 cognitive radio uses different approaches to detecting the signal of the primary user of the channel. High accuracy of signal detection is necessary for stable operation of sensing of cognitive radio and the whole system. Each method used in the IEEE 802.22 standard has its advantages and disadvantages. The application of this or that method depends on the radio conditions. The article analyzes methods for detecting the cognitive radio used in the standard by simulation in the MATLAB environment.</p></abstract><trans-abstract xml:lang="en"><p>The rapid development of wireless communication systems leads to a constant complication of methods for regulating the use of the frequency spectrum. The number of wireless communication services is growing and more and more frequency bands need to be allocated to provide them. Interference from simultaneously used in one frequency range of radio transmitters leads to significant distortions in transmitted information and can significantly hinder the operation of telecommunication systems for various purposes. Achievements in the field of software-oriented radio systems and, in particular, cognitive radio allow solving these problems. The existing standard of IEEE 802.22 cognitive radio uses different approaches to detecting the signal of the primary user of the channel. High accuracy of signal detection is necessary for stable operation of sensing of cognitive radio and the whole system. Each method used in the IEEE 802.22 standard has its advantages and disadvantages. The application of this or that method depends on the radio conditions. The article analyzes methods for detecting the cognitive radio used in the standard by simulation in the MATLAB environment.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>cognitive radio</kwd><kwd>primary signal detection</kwd><kwd>simulation in MATLAB environment</kwd></kwd-group><kwd-group xml:lang="en"><kwd>cognitive radio</kwd><kwd>primary signal detection</kwd><kwd>simulation in MATLAB environment</kwd></kwd-group></article-meta></front><back><ref-list><title>Список литературы</title><ref id="B1"><mixed-citation>1. Guryanov, I.O. Cognitive radio: new approaches to providing radio frequency resources of promising radio technologies / I.O. Guryanov // Electrosvyaz. 2012. No. 8. P. 5-8.</mixed-citation></ref><ref id="B2"><mixed-citation>2. C. R. Stevenson, C. Cordeiro, E. Sofer. &amp;quot;Functional requirements for the 802.22 WRAN standard,&amp;quot; IEEE 802.22-05 / 0007r46, Sept. 2005.</mixed-citation></ref><ref id="B3"><mixed-citation>3. J. Andrews.&amp;quot;Interference cancellation for cellular systems: a contemporary overview,&amp;quot; IEEE Wireless Commun. Mag., Vol. 12, no. 2, pp. 19-29, 2005.</mixed-citation></ref><ref id="B4"><mixed-citation>4. C. Cordeiro, K. Challapali, and D. Birru. &amp;quot;IEEE 802.22: An introduction to the first wireless standard based on cognitive radios&amp;quot; Journal of Communications, vol. 1, no. 1, Apr. 2006.</mixed-citation></ref><ref id="B5"><mixed-citation>5. Standard for Wireless Regional Area Networks (WRAN) - Specific requirements - Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Policies and procedures for the TV Bands, The Institute of Electrical and Electronics Engineering, Inc. Std. IEEE 802.22.</mixed-citation></ref><ref id="B6"><mixed-citation>6. Draft Supplement to STANDARD FOR Telecommunications and Information Exchange Between Systems - LAN / MAN Specific Requirements - Part 11: Wireless Medium Access Control (MAC) and physical layer (PHY) specifications: Specification for Radio Resource Measurement, The Institute of Electrical and Electronics Engineering, Inc. Std. IEEE 802.11k / D0.7, Oct. 2003.</mixed-citation></ref><ref id="B7"><mixed-citation>7. D. Dubois and H. Prade, &amp;quot;Possibility theory in information fusion. Third Intern. Conf. Information Fusion, 2000.</mixed-citation></ref><ref id="B8"><mixed-citation>8. Rolich, M.L. Methods for detecting primary users in cognitive radio networks / M.L. Rolich // Young Scientist. 2015. No. 20. P. 70-73.</mixed-citation></ref><ref id="B9"><mixed-citation>9. Theory and methods of statistical solutions in radio engineering and communications: Textbook / Zhilyakov EG, Firsova AA - Belgorod: Publishing house of the National Research University &amp;quot;BelGU&amp;quot;, 2014. 51-67 s.</mixed-citation></ref><ref id="B10"><mixed-citation>10. R. Kumar. &amp;quot;Analysis of Spectrum Sensing Techniques in Cognitive Radio&amp;quot; International Journal of Information and Computation Technology, vol. 4, no. 4, 2014 pp. 437-444.</mixed-citation></ref></ref-list></back></article>