<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Database Security of the Automated Control Subsystem of Water Conservation Processes ⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Vitalii Osipa</string-name>
          <email>v.osipa@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Lesya Ladieva</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Bogdan Korniyenko</string-name>
          <email>bogdanko@gmx.net</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Information Technology and Implementation, IT&amp;I-2025</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute"</institution>
          ,
          <addr-line>Beresteyskyi Avenue, 37, 03056, Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Pantheon-Sorbonne University</institution>
          ,
          <addr-line>Place du Panthéon 12, 75231, Paris</addr-line>
          ,
          <country country="FR">France</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2026</year>
      </pub-date>
      <fpage>144</fpage>
      <lpage>155</lpage>
      <abstract>
        <p>The article considers the issues of database security of the automated subsystem of water conservation process management of a modern enterprise. The reason for its complexity is that it must also have connections between different data elements and with ensuring information protection. That is why an important task in database development is the development of a conceptual data model (the general logical structure of the database). An approach is proposed to maintain the viability of this database. The final products of biochemical decomposition of organic matter in such water bodies are mineral salts and water. If the treatment facilities operate effectively, then wastewater after appropriate treatment can be used for technological production purposes. This will significantly reduce the consumption of fresh water, as well as reduce emissions of pollutants into the environment. Automated control systems significantly increase the efficiency of technological purification systems. The quality of management of such processes largely depends on the quality of the automated control database. The components of information support for automated control of water conservation processes of a modern enterprise are presented. The core of information support is the database. The theoretical results of the presented study are specified in the development of a database subschema that functions in the PostgreSQL database management system (DBMS).</p>
      </abstract>
      <kwd-group>
        <kwd>security</kwd>
        <kwd>database</kwd>
        <kwd>data structures</kwd>
        <kwd>automated control</kwd>
        <kwd>water conservation 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Water usage after its purification for technological purposes of modern production is advantageous
both in terms of environmental protection and economic considerations. If treated wastewater
(approximately 90%) is reused for technological purposes, it will be much cheaper for the company
than taking fresh water.</p>
      <p>
        Almost always wastewater treatment is a set of methods, among which the functioning of the
technological treatment system in terms of using an automated control system, occupies an
important place [
        <xref ref-type="bibr" rid="ref1 ref2">1,2</xref>
        ]. As for the subsystem of automated control of water conservation processes of
a modern production, due to the growing volume of data and the complexity of their organization,
the effectiveness of its operation depends largely on the reliability of information support.
Information support of the subsystem of automated control of water saving processes establishes:
the composition of information, determination of information routes, means of information
transformation, data structure and conceptual model of the database.
      </p>
      <p>
        The correctness of the concept on the basis of which the components of information support are
formed and the validity of the selection of important features and connections are important for the
representativeness of information. The development of information support for the subsystem of
automated control of water conservation processes was carried out on the basis of the methodology
of programming the life cycle of complex objects [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] (in this case, the technological system of
treatment); database development was performed on the basis of the methodology of organization
of databases in computer systems, the founder of which is Martin J. [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] and his followers Date K.,
Krenke D. [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ], etc., which has positively affect the practical implementation. According to this
methodology, the term schema is used to define a complete table of all types of data elements and
record types that will be stored in the database. The term subcircuit defines the description of the
data used for a set of individual tasks.
      </p>
      <p>
        One of the first works where the problem of building a database of automated control of
wastewater treatment was considered. It should be noted that this article did not present a logical
model of the database. The works [
        <xref ref-type="bibr" rid="ref7 ref8 ref9">7-9</xref>
        ] is also devoted to the problem of developing a similar
database. However, in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], at the third lower level of data presentation, such an important node as
of
these publication did not consider the problem of determining the primary and secondary (foreign)
keys for the normalized form of data. This fact did not allow to build a complete database model.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Information support structure</title>
      <p>Structural information support of water-saving processes automated control subsystem for modern
production (airport) consists of information support of functional subsystems (ISF) and information
support of modernization (design) of technological cleaning system (ISM).</p>
      <p>The basis of ISF is a database, the control system of which allows you to develop an interface with
applications. Applied software based on economic and mathematical methods and models ensures
the functioning of water conservation processes in the optimal mode. ISF consists of system-wide
(SWIS) and functionally-autonomous information support, which reflects the specifics of each
subsystem of automated control.</p>
      <p>System-wide information support consists of:
- classifiers of problems that contain reference data for solving functional problems;
- electronic arrays of these classifiers;
- electronic documents common to all subsystems;
- means of unambiguous description of data used in all subsystems.</p>
      <p>Functionally autonomous information support (FAIS) includes:
- information classifiers and corresponding electronic arrays necessary for solving problems
in individual subsystems;
- means of unambiguous description of data used in individual subsystems.</p>
      <p>Information support for modernization and design of technological treatment system is a set of
means of identification of object documentation, stages and stages of work on modernization (design)
of technological treatment system, which includes:
- means of unification of names of tasks of modernization and design;
- system of coding of design decisions;
- system of designations and coding of stages and stages of modernization (design) of
technological cleaning system;
- coding system of project documentation.</p>
      <p>In the future we will consider the functional and autonomous information support of the
subsystem of automated control of water conservation processes of a modern enterprise.</p>
      <p>The information support of this subsystem includes:
1. normative and reference data (information on maximum permissible concentrations of
pollutants, water consumption limit j-m production process, economic assessment of water in the
region, unit price of water j-m production process, cost standards provided by scientific and financial
plan, etc.);</p>
      <p>2. current information for automated control algorithms (wastewater consumption,
physicochemical parameters of the contaminant ingredient, reagent characteristics, water
consumption for normal operation of the j-th production process, multiplicity of water dilution by
the k-th pollutant, set level of water reuse j-m production process etc.);</p>
      <p>3. accounting and archival information for modernization (design) of the technological scheme
of wastewater treatment (standard design solutions for typical treatment processes, equipment
characteristics, etc.).</p>
      <p>As mentioned, the database and management system are the core of information support. The
functional use of information support is carried out within the local network, which makes it
accessible to all participants in the process. The database administration is responsible for the
up-todateness of the information, and the functional responsibilities of its employees should be included
in the organizational support. Before entering data into the database, their authenticity is checked
by special algorithms.</p>
      <p>When developing a logical description of the database of the subsystem of automated control of
water conservation processes, the sets of data required for control were identified. The data
presented at the logical level of the user reflects his view of the database when solving specific tasks.
The introduction of this level of data representation significantly reduces the processing time of
queries, increases the security of the database and expands the scope of their use.</p>
      <p>The scheme of the database of automated control of cleaning systems includes two tree-like
structures (Fig. 1).</p>
      <p>The leaf of each tree is an entry that includes the code and name of the treatment (Wastewater
Treatment or Gas Emissions Treatment) - the top level of the hierarchy. The next level of the hierarchy,
subordinate to the first, is represented by records that reflect the methods of cleaning and their codes.
The lower level of the hierarchy consists of records for management tasks according to certain
cleaning methods.</p>
      <p>The minimum available unit of information in the hierarchical model is a node, ie one row at each
level. Searching on the basis of a hierarchical data model is carried out in the directions from top to
bottom and from left to right. Therefore, to find any node, it is necessary to identify the node that is
looking for and those nodes to which it is subordinate. This is a shortcoming of the hierarchical
database. In addition, such a database makes it difficult to adjust, enable and delete all subordinate
levels, which also complicates the operation of the database. Presentation of data in the form of trees
will hinder the development and significant growth of the database. At a certain stage of its growth,
it is possible to disrupt the logical representation of data, which will lead to the need for changes in
applications. As a result, one of the main advantages of the database will disappear - data
independence. This shortcoming is eliminated in a relational database, in which data is presented in
the form of two-dimensional tables - one of the most natural ways to present data to the user.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Database relations normalization</title>
      <p>Since any network structure can be decomposed into a set of tree structures with some redundancy,
the hierarchical representation of data can also be reduced to two-dimensional flat files with some
redundancy. Relationships between the data shown in Fig. 2 will be presented in the form of
twodimensional tables. This was done step by step for each connection between the data, using the
normalization process. Tables are built in such a way that information about the relationships
between data elements is not lost. The relationship key must contain, in addition to the primary, a
secondary (foreign) key, with which the tuples of this relationship will be uniquely identified.</p>
      <p>For database management systems that do not support static relations of relational relations, the
links between them are established only to solve a specific problem and exist for the period of its
solution. Therefore, when mapping a hierarchical model to a relational one, all structural connections
are not described explicitly, but only a check is made for the possibility of establishing these
connections. A prerequisite for establishing a connection between two relational relations is the
presence of at least one common attribute, which is the foreign key on which the connection is
performed.</p>
      <p>The relationship between PURIFICATION METHODS AND TYPICAL PROCESSES in the first
normal form (1NF) is also obtained on the basis of the database subscheme (Table 2).</p>
      <p>The relationship will be written as follows: PURIFICATION METHODS AND TYPICAL
PROCESSES (code of purification method, name of purification method, code of typical process,
name of typical process, code of typical processes parameters, parameters of typical processes, code
of pollutant, code of mode parameter).</p>
      <p>Table 2</p>
      <p>Purification methods and typical processes</p>
      <p>Continuing the normalization process, we obtain the ratio of the PURIFICATION METHOD and
the ratio of TYPICAL PROCESSES in the third normal form (Table 3).</p>
      <p>Table 3
Purification method 3NF</p>
      <sec id="sec-3-1">
        <title>Code of pollutants Foreign Key</title>
      </sec>
      <sec id="sec-3-2">
        <title>Code of mode</title>
        <p>parameter
Code of purification method
Primary Key</p>
        <p>M1
M2
M3
M4</p>
      </sec>
      <sec id="sec-3-3">
        <title>Name of purification method</title>
      </sec>
      <sec id="sec-3-4">
        <title>Reagent cleaning Flotation Ion exchange Electrochemicalmethods</title>
        <p>Finally, the ratio TYPICAL PROCESSES in the third normal form will be written (Table 5).</p>
        <p>The TYPICAL PROCESS PARAMETERS relationship will be written in the third normal form as
follows (Table 6).</p>
        <p>The generated ratio POLLUTANTS AND THEIR PARAMETERS in the first normal form based on
the database subscheme (fig. 2) will be written as follows: POLLUTANTS AND THEIR PARAMETERS
(code of mode parameters, code of pollutant, name of pollutant, physico-chemical parameters of
pollutant, pollutant sensor value) (Table 7).</p>
        <p>Continuing the process of normalization, the ratio of POLLUTANTS and the ratio of
PARAMETERS OF POLLUTANTS in the third normal form were obtained (Table 8-9).</p>
        <p>The generated relation REAGENTS AND THEIR PARAMETERS in the first normal form on the
basis of the database subscheme (fig. 2) will be written as follows: REAGENTS AND THEIR
PARAMETERS (reagent type code, reagent name, reagent physicochemical parameters, reagent
concentration sensor value, contaminant code, purification method code) (Table 10).</p>
        <p>Continuing the process of normalization, we obtain the ratio of REAGENTS and the ratio of
PARAMETERS OF REAGENTS in the third normal form (Table 11-12).</p>
        <p>Table 11
Reagents 3NF</p>
        <p>Reagent
type code
Primary Key
200
201</p>
        <p>Reagent
name</p>
        <p>Sodium
hydroxide</p>
        <p>Lime
suspension</p>
        <p>The normalization resulted in a relational database model that combines relationship tables.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Database management system selection</title>
      <p>The implementation of a logical data model is primarily associated with the selection of a specific
database for management tasks (Fig. 3). This task is not easy and many factors need to be considered.
Here you need to predict the prospects for production development, which creates a choice in terms
of expanding functions and tasks, and studies the software market. There are two problems in the
assessment of DBMS. The first is related to the choice of the database from the user's point of view,
and the other is purely technical and related to system performance.</p>
      <p>At the present time there is no generally accepted analytical method of database management
system choice. Therefore, experts in data management field for the solution of this task use such
methods:
- methods of simulation;
- experimental studies with using full scale tests;
- heuristic method having such points in the comparative evaluation of characteristics as
"yesno", "present - absent," "good - satisfactory - bad."</p>
      <p>While using simulation modeling techniques there can appear some additional problems in
evaluation of database simulation model accuracy. Obtaining comparative characteristics of database
management system with the help of full-scale test is associated with significant labor costs.
Therefore, the choice of database management system for maintaining a database is based on expert
estimates (Table 13-14).
Experts
i=1,4
1
2
3
4
2
1
1
1</p>
      <p>3
9,53
2,81
1,63</p>
      <p>4
9,53
8,73
1,9</p>
      <p>Factors (promising DBMS), j=1,7</p>
      <sec id="sec-4-1">
        <title>PostgreSQL</title>
      </sec>
      <sec id="sec-4-2">
        <title>MySQL</title>
      </sec>
      <sec id="sec-4-3">
        <title>MongoDB</title>
      </sec>
      <sec id="sec-4-4">
        <title>SQLite DB2 MS SQL Server</title>
        <p>MariaDB
6
4
1,63
4,75
16,38
14
7
4,89
4,75
30,64
9
3
8,15
9,5
29,65
9
6
9,78
13,3
38,08
12
5
6,52
7,6
31,12
4
2
11,41
11,4
28,81</p>
        <p>Therefore, based on the results shown in (Table 16), we can conclude that the PostgreSQL
database has the smallest number of ranges. Thus, according to experts, this DBMS is the most
suitable time database management system for automated management of water-saving processes.
An important feature of the PostgreSQL database is the development of capabilities in its application
environment for automated control of languages such as PL/Java, C ++, C-compatible modules,
Python, PL/pgSQL and others. In addition, the PostgreSQL database has streamlined
highperformance transaction and replication mechanisms, as well as an SQL-based query language that
allows the client-server LAN to use a client-server architecture. Thus, the PostgreSQL database meets
the requirements of efficient operation of the automated control process of water-saving processes
for modern production.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Protection of information in the subsystem database</title>
      <p>Practical work with the presented database involves ensuring three fundamental aspects of security
- authentication (who has the right to connect), authorization (what exactly they can do), and
protection of the data that is stored and transmitted (Fig.4).</p>
      <p>One of the first levels of protection is to verify the client connecting to the database. The
PostgreSQL database implements a wide range of authentication methods: trust, password,
certificate, as well as integration with external systems - LDAP, GSSAPI/Kerberos, RADIUS, etc. For
example, the outdated MD5 method is no longer recommended due to its vulnerability to attacks
with "rainbow" tables. Instead, it is recommended to use SCRAM-SHA-256 as a more secure option.
The pg_hba.conf file allows you to flexibly determine: where to connect from (IP addresses or local
sockets), which user, to which database, and which authentication method is used.</p>
      <p>Thus, authentication settings and connection location restrictions reduce the risk of unauthorized
access. After confirming the user's authenticity, the next step is to restrict rights: which database
objects he can see or change. The PostgreSQL database implements a role and permission model
(GRANT/REVOKE) with the principle of "least privilege". In addition, a finer level of control - the
so-called Row-Level Security (RLS) - allows you to set policies that control access to individual table
rows, depending on the user's role.</p>
      <p>The settings of the PUBLIC schema and default privileges also require attention: excessive rights
or trust rules in pg_hba.conf can create weak points.</p>
      <p>So, authorization is not only about creating roles, but also about regularly auditing rights and
reducing rights to the minimum necessary. When it comes to storing and transferring data, the
PostgreSQL database has several options, although some of them require external mechanisms.</p>
      <p>To protect data during transmission (data in transit), it is recommended to use an SSL/TLS
connection, which provides encryption of traffic between the client and the server.</p>
      <p>To protect data on disk (data at rest), the PostgreSQL database does not have a full-fledged
Transparent Disk Encryption (TDE) feature in the base assembly, so encryption is used at the OS or
file system level (for example, LUKS, FileVault) or through an intermediate implementation of TDE
based on fork processes. In addition, column or application level encryption can be used (for example,
the pgcrypto function), which will allow you to selectively protect sensitive fields. In general, the
right strategy is to combine encryption, access restrictions and rights control, which will ensure the
integrity, confidentiality and availability of information.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusion</title>
      <p>Thus, the structure of information support for automated water conservation process management
of modern production is proposed, and the composition and structure of data are determined, as well
as the choice of a database management system. An approach to ensuring information protection in
the database is considered.</p>
      <p>The authors have developed a conceptual model of the database as the main component of
information support. For each connection between data, normalization was performed, which
allowed obtaining a relational data structure in the third normal form, which has significant
advantages over hierarchical and network structures.</p>
      <p>The client-server architecture of the database for the subsystem of automated water conservation
process management will allow not only to store data on the central computer, but also to perform
basic data processing operations. The specificity of this architecture is the use of the SQL query
language. The user will not receive files, but only the data selected by him. Protecting information
in a database includes measures to ensure its integrity (protection against unauthorized
modification), confidentiality (protection against unauthorized disclosure), and availability (ensuring
access and recovery from failures). Key techniques include encryption, authentication (including
multi-factor authentication), password and privilege management, the use of firewalls and VPNs to
create secure connections, and regular backups to recover data in the event of loss.</p>
      <p>The presented approaches and the criteria formed on their basis allowed making a choice of a
database management system, which allows proceeding to its physical implementation. The choice
of a DBMS to support the viability of the database based on the generated indicators is another result
of this work. The database will be maintained in the environment of the PostgreSQL relational
DBMS, which includes a system of embedded programming languages, the SQL query language,
which will allow developing an interface with the application software of the automated control
system (ACS) for wastewater treatment processes on a single information basis.</p>
      <p>Further development of the database will be associated with the accumulation of information on
the statistical and dynamic characteristics of typical treatment processes. Information of the third
lower level of the database subscheme will be recorded in the form of sections of the actual database.
In the future, an Automated Information System for Managing Water-Saving Processes in Modern
Production should function.</p>
    </sec>
    <sec id="sec-7">
      <title>Declaration on Generative AI</title>
      <p>The authors have not employed any Generative AI tools.
2020.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Bieliatynskyi</surname>
          </string-name>
          ,
          <string-name>
            <surname>Osipa</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Klochan</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <article-title>- saving processes</article-title>
          .
          <source>Proceedings of the 21th Conference for Junior Researchers "Science Future of Lithuania": Transport engineering and management (Vilnius</source>
          , 4-5 May, Lithuania).
          <fpage>137</fpage>
          -
          <lpage>141</lpage>
          ,
          <year>2018</year>
          . URL: http://jmk.transportas.vgtu.lt/index.php/tran2017/ tran2018/paper/viewFile/149/163
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Osipa</surname>
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Statics</surname>
          </string-name>
          <article-title>Simulation of the Buffer Wastewater Neutralization Process</article-title>
          .
          <source>International Journal of Engineering and Manufacturing</source>
          , Vol.
          <volume>9</volume>
          , No.
          <issue>4</issue>
          ,
          <fpage>1</fpage>
          -
          <lpage>14</lpage>
          ,
          <year>2019</year>
          . doi:
          <volume>10</volume>
          .5815/ijem.
          <year>2019</year>
          .
          <volume>04</volume>
          .01
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Timchenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <article-title>Fundamentals of system design and system analysis of complex objects</article-title>
          .
          <source>Lubid. Kyiv</source>
          .
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Martin</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <article-title>Computer data-base organization</article-title>
          . Prentice-Hall, Inc.,
          <string-name>
            <given-names>Englewood</given-names>
            <surname>Cliffs</surname>
          </string-name>
          . New Jersey,
          <year>1977</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Date</surname>
            <given-names>C.J.</given-names>
          </string-name>
          (
          <year>2003</year>
          ).
          <article-title>Introduction to Database systems</article-title>
          .
          <source>8th edition , CCNA</source>
          <volume>20</volume>
          -301
          <string-name>
            <given-names>Official</given-names>
            <surname>Cert</surname>
          </string-name>
          .,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Kroenke</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Auer</surname>
            <given-names>D.</given-names>
          </string-name>
          , Scott V.
          <article-title>Databases processing</article-title>
          .
          <source>Pearson Prentice Hall, 15th edition</source>
          .
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Zhuchenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Osipa</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cheropkin</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <article-title>Design Database for an Automated Control System of Typical Wastewater Treatment Processes</article-title>
          .
          <source>International Journal of Engineering and Manufacturing</source>
          , Vol.
          <volume>7</volume>
          , No.
          <volume>4</volume>
          ,
          <fpage>36</fpage>
          -
          <lpage>50</lpage>
          ,
          <year>2017</year>
          . DOI:
          <volume>10</volume>
          .5815/ijem.
          <year>2017</year>
          .
          <volume>04</volume>
          .04.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Korniyenko</surname>
            ,
            <given-names>B.Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ladieva</surname>
            ,
            <given-names>L.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Galata</surname>
            ,
            <given-names>L.P.</given-names>
          </string-name>
          <article-title>Mathematical model of heat transfer process of production of granulated fertilizers in fluidized bed</article-title>
          .
          <source>ARPN Journal of Engineering and Applied Sciences</source>
          ,
          <volume>16</volume>
          (
          <issue>20</issue>
          ),
          <fpage>2126</fpage>
          -
          <lpage>2131</lpage>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Ladieva</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kozanevych</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Klusta</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Korniyenko</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <article-title>System of control of the process of alkylation of benzene with peripene in the liquid phase</article-title>
          .
          <source>ATIT 2020 - Proceedings: 2020 2nd IEEE -314,</source>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>