A roadmap for enabling Industry 4.0 by artificial intelligence / (Record no. 91752)

000 -LEADER
fixed length control field 15957nam a2200409 i 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250812100220.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu|||unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250812s2023 njum ob u001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119904854
Qualifying information (print)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119905141
Qualifying information (electronic bk. : oBook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119905141
Qualifying information (electronic bk. : oBook)
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1002/9781119905141
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1356853837
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TA347.A78
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 670.285/63
245 02 - TITLE STATEMENT
Title A roadmap for enabling Industry 4.0 by artificial intelligence /
Statement of responsibility, etc edited by Jyotir Moy Chatterjee, Harish Garg and R.N. Thakur.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Hoboken, NJ :
Name of publisher, distributor, etc Wiley ;
Place of publication, distribution, etc Beverly, MA :
Name of publisher, distributor, etc Scrivener Publishing,
Date of publication, distribution, etc ©2023.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent.
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia.
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier.
340 ## - PHYSICAL MEDIUM
Source rdacc
Authority record control number or standard number http://rdaregistry.info/termList/RDAColourContent/1003.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - CONTENTS
Formatted contents note Table of Contents<br/>Preface xv<br/><br/>1 Artificial Intelligence—The Driving Force of Industry 4.0 1<br/>Hesham Magd, Henry Jonathan, Shad Ahmad Khan and Mohamed El Geddawy<br/><br/>1.1 Introduction 2<br/><br/>1.2 Methodology 2<br/><br/>1.3 Scope of AI in Global Economy and Industry 4.0 3<br/><br/>1.3.1 Artificial Intelligence—Evolution and Implications 4<br/><br/>1.3.2 Artificial Intelligence and Industry 4.0—Investments and Returns on Economy 5<br/><br/>1.3.3 The Driving Forces for Industry 4.0 7<br/><br/>1.4 Artificial Intelligence—Manufacturing Sector 8<br/><br/>1.4.1 AI Diversity—Applications to Manufacturing Sector 9<br/><br/>1.4.2 Future Roadmap of AI—Prospects to Manufacturing Sector in Industry 4.0 12<br/><br/>1.5 Conclusion 13<br/><br/>References 14<br/><br/>2 Industry 4.0, Intelligent Manufacturing, Internet of Things, Cloud Computing: An Overview 17<br/>Sachi Pandey, Vijay Laxmi and Rajendra Prasad Mahapatra<br/><br/>2.1 Introduction 17<br/><br/>2.2 Industrial Transformation/Value Chain Transformation 18<br/><br/>2.2.1 First Scenario: Reducing Waste and Increasing Productivity Using IIoT 19<br/><br/>2.2.2 Second Scenario: Selling Outcome (User Demand)– Based Services Using IIoT 20<br/><br/>2.3 IIoT Reference Architecture 20<br/><br/>2.4 IIoT Technical Concepts 22<br/><br/>2.5 IIoT and Cloud Computing 26<br/><br/>2.6 IIoT and Security 27<br/><br/>References 29<br/><br/>3 Artificial Intelligence of Things (AIoT) and Industry 4.0– Based Supply Chain (FMCG Industry) 31<br/>Seyyed Esmaeil Najafi, Hamed Nozari and S. A. Edalatpanah<br/><br/>3.1 Introduction 32<br/><br/>3.2 Concepts 33<br/><br/>3.2.1 Internet of Things 33<br/><br/>3.2.2 The Industrial Internet of Things (IIoT) 34<br/><br/>3.2.3 Artificial Intelligence of Things (AIoT) 35<br/><br/>3.3 AIoT-Based Supply Chain 36<br/><br/>3.4 Conclusion 40<br/><br/>References 40<br/><br/>4 Application of Artificial Intelligence in Forecasting the Demand for Supply Chains Considering Industry 4.0 43<br/>Alireza Goli, Amir-Mohammad Golmohammadi and S. A. Edalatpanah<br/><br/>4.1 Introduction 44<br/><br/>4.2 Literature Review 45<br/><br/>4.2.1 Summary of the First Three Industrial Revolutions 45<br/><br/>4.2.2 Emergence of Industry 4.0 45<br/><br/>4.2.3 Some of the Challenges of Industry 4.0 47<br/><br/>4.3 Application of Artificial Intelligence in Supply Chain Demand Forecasting 48<br/><br/>4.4 Proposed Approach 50<br/><br/>4.4.1 Mathematical Model 50<br/><br/>4.4.2 Advantages of the Proposed Model 51<br/><br/>4.5 Discussion and Conclusion 52<br/><br/>References 53<br/><br/>5 Integrating IoT and Deep Learning—The Driving Force of Industry 4.0 57<br/>Muhammad Farrukh Shahid, Tariq Jamil Saifullah Khanzada and Muhammad Hassan Tanveer<br/><br/>5.1 Motivation and Background 58<br/><br/>5.2 Bringing Intelligence Into IoT Devices 60<br/><br/>5.3 The Foundation of CR-IoT Network 62<br/><br/>5.3.1 Various AI Technique in CR-IoT Network 63<br/><br/>5.3.2 Artificial Neural Network (ANN) 63<br/><br/>5.3.3 Metaheuristic Technique 64<br/><br/>5.3.4 Rule-Based System 64<br/><br/>5.3.5 Ontology-Based System 65<br/><br/>5.3.6 Probabilistic Models 65<br/><br/>5.4 The Principles of Deep Learning and Its Implementation in CR-IoT Network 65<br/><br/>5.5 Realization of CR-IoT Network in Daily Life Examples 69<br/><br/>5.6 AI-Enabled Agriculture and Smart Irrigation System—Case Study 70<br/><br/>5.7 Conclusion 75<br/><br/>References 75<br/><br/>6 A Systematic Review on Blockchain Security Technology and Big Data Employed in Cloud Environment 79<br/>Mahendra Prasad Nath, Sushree Bibhuprada B. Priyadarshini, Debahuti Mishra and Brojo Kishore Mishra<br/><br/>6.1 Introduction 80<br/><br/>6.2 Overview of Blockchain 83<br/><br/>6.3 Components of Blockchain 85<br/><br/>6.3.1 Data Block 85<br/><br/>6.3.2 Smart Contracts 87<br/><br/>6.3.3 Consensus Algorithms 87<br/><br/>6.4 Safety Issues in Blockchain Technology 88<br/><br/>6.5 Usage of Big Data Framework in Dynamic Supply Chain System 91<br/><br/>6.6 Machine Learning and Big Data 94<br/><br/>6.6.1 Overview of Shallow Models 95<br/><br/>6.6.1.1 Support Vector Machine (SVM) 95<br/><br/>6.6.1.2 Artificial Neural Network (ANN) 95<br/><br/>6.6.1.3 K-Nearest Neighbor (KNN) 95<br/><br/>6.6.1.4 Clustering 96<br/><br/>6.6.1.5 Decision Tree 96<br/><br/>6.7 Advantages of Using Big Data for Supply Chain and Blockchain Systems 96<br/><br/>6.7.1 Replenishment Planning 96<br/><br/>6.7.2 Optimizing Orders 97<br/><br/>6.7.3 Arranging and Organizing 97<br/><br/>6.7.4 Enhanced Demand Structuring 97<br/><br/>6.7.5 Real-Time Management of the Supply Chain 97<br/><br/>6.7.6 Enhanced Reaction 98<br/><br/>6.7.7 Planning and Growth of Inventories 98<br/><br/>6.8 IoT-Enabled Blockchains 98<br/><br/>6.8.1 Securing IoT Applications by Utilizing Blockchain 99<br/><br/>6.8.2 Blockchain Based on Permission 101<br/><br/>6.8.3 Blockchain Improvements in IoT 101<br/><br/>6.8.3.1 Blockchain Can Store Information Coming from IoT Devices 101<br/><br/>6.8.3.2 Secure Data Storage with Blockchain Distribution 101<br/><br/>6.8.3.3 Data Encryption via Hash Key and Tested by the Miners 102<br/><br/>6.8.3.4 Spoofing Attacks and Data Loss Prevention 102<br/><br/>6.8.3.5 Unauthorized Access Prevention Using Blockchain 103<br/><br/>6.8.3.6 Exclusion of Centralized Cloud Servers 103<br/><br/>6.9 Conclusions 103<br/><br/>References 104<br/><br/>7 Deep Learning Approach to Industrial Energy Sector and Energy Forecasting with Prophet 111<br/>Yash Gupta, Shilpi Sharma, Naveen Rajan P. and Nadia Mohamed Kunhi<br/><br/>7.1 Introduction 112<br/><br/>7.2 Related Work 113<br/><br/>7.3 Methodology 114<br/><br/>7.3.1 Splitting of Data (Test/Train) 116<br/><br/>7.3.2 Prophet Model 116<br/><br/>7.3.3 Data Cleaning 119<br/><br/>7.3.4 Model Implementation 119<br/><br/>7.4 Results 120<br/><br/>7.4.1 Comparing Forecast to Actuals 121<br/><br/>7.4.2 Adding Holidays 122<br/><br/>7.4.3 Comparing Forecast to Actuals with the Cleaned Data 122<br/><br/>7.5 Conclusion and Future Scope 122<br/><br/>References 125<br/><br/>8 Application of Novel AI Mechanism for Minimizing Private Data Release in Cyber-Physical Systems 127<br/>Manas Kumar Yogi and A.S.N. Chakravarthy<br/><br/>8.1 Introduction 128<br/><br/>8.2 Related Work 131<br/><br/>8.3 Proposed Mechanism 133<br/><br/>8.4 Experimental Results 135<br/><br/>8.5 Future Directions 137<br/><br/>8.6 Conclusion 138<br/><br/>References 138<br/><br/>9 Environmental and Industrial Applications Using Internet of Things (IoT) 141<br/>Manal Fawzy, Alaa El Din Mahmoud and Ahmed M. Abdelfatah<br/><br/>9.1 Introduction 142<br/><br/>9.2 IoT-Based Environmental Applications 146<br/><br/>9.3 Smart Environmental Monitoring 147<br/><br/>9.3.1 Air Quality Assessment 147<br/><br/>9.3.2 Water Quality Assessment 148<br/><br/>9.3.3 Soil Quality Assessment 150<br/><br/>9.3.4 Environmental Health-Related to COVID- 19<br/><br/>Monitoring 150<br/><br/>9.4 Applications of Sensors Network in Agro-Industrial System 151<br/><br/>9.5 Applications of IoT in Industry 153<br/><br/>9.5.1 Application of IoT in the Autonomous Field 153<br/><br/>9.5.2 Applications of IoT in Software Industries 155<br/><br/>9.5.3 Sensors in Industry 156<br/><br/>9.6 Challenges of IoT Applications in Environmental and Industrial Applications 157<br/><br/>9.7 Conclusions and Recommendations 159<br/><br/>Acknowledgments 159<br/><br/>References 159<br/><br/>10 An Introduction to Security in Internet of Things (IoT) and Big Data 169<br/>Sushree Bibhuprada B. Priyadarshini, Suraj Kumar Dash, Amrit Sahani, Brojo Kishore Mishra and Mahendra Prasad Nath<br/><br/>10.1 Introduction 170<br/><br/>10.2 Allusion Design of IoT 172<br/><br/>10.2.1 Stage 1—Edge Tool 172<br/><br/>10.2.2 Stage 2—Connectivity 172<br/><br/>10.2.3 Stage 3—Fog Computing 173<br/><br/>10.2.4 Stage 4—Data Collection 173<br/><br/>10.2.5 Stage 5—Data Abstraction 173<br/><br/>10.2.6 Stage 6—Applications 173<br/><br/>10.2.7 Stage 7—Cooperation and Processes 174<br/><br/>10.3 Vulnerabilities of IoT 174<br/><br/>10.3.1 The Properties and Relationships of Various IoT Networks 174<br/><br/>10.3.2 Device Attacks 175<br/><br/>10.3.3 Attacks on Network 175<br/><br/>10.3.4 Some Other Issues 175<br/><br/>10.3.4.1 Customer Delivery Value 175<br/><br/>10.3.4.2 Compatibility Problems With Equipment 176<br/><br/>10.3.4.3 Compatibility and Maintenance 176<br/><br/>10.3.4.4 Connectivity Issues in the Field of Data 176<br/><br/>10.3.4.5 Incorrect Data Collection and Difficulties 177<br/><br/>10.3.4.6 Security Concern 177<br/><br/>10.3.4.7 Problems in Computer Confidentiality 177<br/><br/>10.4 Challenges in Technology 178<br/><br/>10.4.1 Skepticism of Consumers 178<br/><br/>10.5 Analysis of IoT Security 179<br/><br/>10.5.1 Sensing Layer Security Threats 180<br/><br/>10.5.1.1 Node Capturing 180<br/><br/>10.5.1.2 Malicious Attack by Code Injection 180<br/><br/>10.5.1.3 Attack by Fake Data Injection 180<br/><br/>10.5.1.4 Sidelines Assaults 181<br/><br/>10.5.1.5 Attacks During Booting Process 181<br/><br/>10.5.2 Network Layer Safety Issues 181<br/><br/>10.5.2.1 Attack on Phishing Page 181<br/><br/>10.5.2.2 Attacks on Access 182<br/><br/>10.5.2.3 Attacks on Data Transmission 182<br/><br/>10.5.2.4 Attacks on Routing 182<br/><br/>10.5.3 Middleware Layer Safety Issues 182<br/><br/>10.5.3.1 Attack by SQL Injection 183<br/><br/>10.5.3.2 Attack by Signature Wrapping 183<br/><br/>10.5.3.3 Cloud Attack Injection with Malware 183<br/><br/>10.5.3.4 Cloud Flooding Attack 183<br/><br/>10.5.4 Gateways Safety Issues 184<br/><br/>10.5.4.1 On-Boarding Safely 184<br/><br/>10.5.4.2 Additional Interfaces 184<br/><br/>10.5.4.3 Encrypting End-to-End 184<br/><br/>10.5.5 Application Layer Safety Issues 185<br/><br/>10.5.5.1 Theft of Data 185<br/><br/>10.5.5.2 Attacks at Interruption in Service 185<br/><br/>10.5.5.3 Malicious Code Injection Attack 185<br/><br/>10.6 Improvements and Enhancements Needed for IoT Applications in the Future 186<br/><br/>10.7 Upcoming Future Research Challenges with Intrusion Detection Systems (IDS) 189<br/><br/>10.8 Conclusion 192<br/><br/>References 193<br/><br/>11 Potential, Scope, and Challenges of Industry 4.0 201<br/>Roshan Raman and Aayush Kumar<br/><br/>11.1 Introduction 202<br/><br/>11.2 Key Aspects for a Successful Production 202<br/><br/>11.3 Opportunities with Industry 4.0 204<br/><br/>11.4 Issues in Implementation of Industry 4.0 206<br/><br/>11.5 Potential Tools Utilized in Industry 4.0 207<br/><br/>11.6 Conclusion 210<br/><br/>References 210<br/><br/>12 Industry 4.0 and Manufacturing Techniques: Opportunities and Challenges 215<br/>Roshan Raman and Aditya Ranjan<br/><br/>12.1 Introduction 216<br/><br/>12.2 Changing Market Demands 217<br/><br/>12.2.1 Individualization 218<br/><br/>12.2.2 Volatility 218<br/><br/>12.2.3 Efficiency in Terms of Energy Resources 218<br/><br/>12.3 Recent Technological Advancements 219<br/><br/>12.4 Industrial Revolution 4.0 221<br/><br/>12.5 Challenges to Industry 4.0 224<br/><br/>12.6 Conclusion 225<br/><br/>References 226<br/><br/>13 The Role of Multiagent System in Industry 4.0 227<br/>Jagjit Singh Dhatterwal, Kuldeep Singh Kaswan and Rudra Pratap Ojha<br/><br/>13.1 Introduction 228<br/><br/>13.2 Characteristics and Goals of Industry 4.0 Conception 228<br/><br/>13.3 Artificial Intelligence 231<br/><br/>13.3.1 Knowledge-Based Systems 232<br/><br/>13.4 Multiagent Systems 234<br/><br/>13.4.1 Agent Architectures 234<br/><br/>13.4.2 Jade 238<br/><br/>13.4.3 System Requirements Definition 239<br/><br/>13.4.4 HMI Development 240<br/><br/>13.5 Developing Software of Controllers Multiagent Environment Behavior Patterns 240<br/><br/>13.5.1 Agent Supervision 240<br/><br/>13.5.2 Documents Dispatching Agents 241<br/><br/>13.5.3 Agent Rescheduling 242<br/><br/>13.5.4 Agent of Executive 242<br/><br/>13.5.5 Primary Roles of High-Availability Agent 243<br/><br/>13.6 Conclusion 244<br/><br/>References 244<br/><br/>14 An Overview of Enhancing Encryption Standards for Multimedia in Explainable Artificial Intelligence Using Residue Number Systems for Security 247<br/>Akeem Femi Kadri, Micheal Olaolu Arowolo, Ayisat Wuraola Yusuf-Asaju, Kafayat Odunayo Tajudeen and Kazeem Alagbe Gbolagade<br/><br/>14.1 Introduction 248<br/><br/>14.2 Reviews of Related Works 250<br/><br/>14.3 Materials and Methods 258<br/><br/>14.3.1 Multimedia 258<br/><br/>14.3.2 Artificial Intelligence and Explainable Artificial Intelligence 261<br/><br/>14.3.3 Cryptography 262<br/><br/>14.3.4 Encryption and Decryption 265<br/><br/>14.3.5 Residue Number System 266<br/><br/>14.4 Discussion and Conclusion 268<br/><br/>References 268<br/><br/>15 Market Trends with Cryptocurrency Trading in Industry 4.0 275<br/>Varun Khemka, Sagar Bafna, Ayush Gupta, Somya Goyal and Vivek Kumar Verma<br/><br/>15.1 Introduction 276<br/><br/>15.2 Industry Overview 276<br/><br/>15.2.1 History (From Barter to Cryptocurrency) 276<br/><br/>15.2.2 In the Beginning Was Bitcoin 278<br/><br/>15.3 Cryptocurrency Market 279<br/><br/>15.3.1 Blockchain 279<br/><br/>15.3.1.1 Introduction to Blockchain Technology 279<br/><br/>15.3.1.2 Mining 280<br/><br/>15.3.1.3 From Blockchain to Cryptocurrency 281<br/><br/>15.3.2 Introduction to Cryptocurrency Market 281<br/><br/>15.3.2.1 What is a Cryptocurrency? 281<br/><br/>15.3.2.2 Cryptocurrency Exchanges 283<br/><br/>15.4 Cryptocurrency Trading 283<br/><br/>15.4.1 Definition 283<br/><br/>15.4.2 Advantages 283<br/><br/>15.4.3 Disadvantages 284<br/><br/>15.5 In-Depth Analysis of Fee Structures and Carbon Footprint in Blockchain 285<br/><br/>15.5.1 Need for a Fee-Driven System 285<br/><br/>15.5.2 Ethereum Structure 286<br/><br/>15.5.3 How is the Gas Fee Calculated? 287<br/><br/>15.5.3.1 Why are Ethereum Gas Prices so High? 287<br/><br/>15.5.3.2 Carbon Neutrality 287<br/><br/>15.6 Conclusion 291<br/><br/>References 292<br/><br/>16 Blockchain and Its Applications in Industry 4.0 295<br/>Ajay Sudhir Bale, Tarun Praveen Purohit, Muhammed Furqaan Hashim and Suyog Navale<br/><br/>16.1 Introduction 296<br/><br/>16.2 About Cryptocurrency 296<br/><br/>16.3 History of Blockchain and Cryptocurrency 298<br/><br/>16.4 Background of Industrial Revolution 300<br/><br/>16.4.1 The First Industrial Revolution 301<br/><br/>16.4.2 The Second Industrial Revolution 301<br/><br/>16.4.3 The Third Industrial Revolution 302<br/><br/>16.4.4 The Fourth Industrial Revolution 302<br/><br/>16.5 Trends of Blockchain 303<br/><br/>16.6 Applications of Blockchain in Industry 4.0 304<br/><br/>16.6.1 Blockchain and the Government 304<br/><br/>16.6.2 Blockchain in the Healthcare Sector 304<br/><br/>16.6.3 Blockchain in Logistics and Supply Chain 306<br/><br/>16.6.4 Blockchain in the Automotive Sector 307<br/><br/>16.6.5 Blockchain in the Education Sector 308<br/><br/>16.7 Conclusion 309<br/><br/>References 310<br/><br/>Index 315
545 0# - BIOGRAPHICAL OR HISTORICAL DATA
Biographical or historical note About the Authors<br/>Jyotir Moy Chatterjee is an assistant professor in the Information Technology department at Lord Buddha Education Foundation (LBEF), Kathmandu, Nepal. He has published more than 60 research papers in international publications, three conference papers, three authored books, 10 edited books, 16 book chapters, two Master’s theses converted into books, and one patent.<br/><br/>Harish Garg, PhD, is an associate professor at Thapar Institute of Engineering & Technology, Deemed University, Patiala, Punjab, India. His research interests include soft computing, decision-making, aggregation operators, evolutionary algorithm, expert systems, and decision support systems. He has published more than 300 papers published in refereed international journals. Dr. Garg is the Editor-in-Chief of Annals of Optimization Theory and Practice.<br/><br/>R N Thakur, PhD, is a senior lecturer in the Information Technology Department, Lord Buddha Education Foundation (LBEF), Kathmandu, Nepal. He has published about 20 research articles in various journals.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Artificial intelligence
Authority record control number https://id.loc.gov/authorities/subjects/sh85008180
General subdivision Industrial applications.
Authority record control number https://id.loc.gov/authorities/subjects/sh00006117.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Industry 4.0.
Authority record control number https://id.loc.gov/authorities/subjects/sh2020008861.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Chatterjee, Jyotir Moy,
Authority record control number https://id.loc.gov/authorities/names/no2018023627
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Garg, Harish,
Authority record control number https://id.loc.gov/authorities/names/no2021057137
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Thakur, R. N.,
Relator term editor.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://onlinelibrary.wiley.com/doi/book/10.1002/9781119905141
Link text Full text is available at Wiley Online Library Click here to view
942 ## - ADDED ENTRY ELEMENTS
Source of classification or shelving scheme
Item type EBOOK
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Date acquired Source of acquisition Full call number Date last seen Price effective from Item type
          COLLEGE LIBRARY COLLEGE LIBRARY 2025-08-12 ALBASA Consortium 670.285/63 2025-08-12 2025-08-12 EBOOK