About AIU-AADC
Association of Indian Universities, apex level representative body of universities and other higher education institutions in India. Invites proposals with expression of Interest (EOI) from the member universities for its newly introduced scheme- Academic and Administrative Development Centres to be established in select member universities. AADC is pioneering initiative of AIU which aims at organizing short-term training and capacity building programmes for the faculty members and administrative functionaries of Indian Universities and other HEIs. Introduced in 2022, AADC are envisioned to function in a similar manner to the UGC Human Resource Development Centres operating in different universities. The focus of these centres is to provide training to faculty for online/blended mode of teaching learning, developing e-content and using technology for continuous assessment and evaluation and research collaboration along with programmes on effective management using technology in governance and administration of universities
About IEEE Industry Applications Society
One of the largest special interest societies within the Institute of Electrical and Electronics Engineers (IEEE), the IAS focuses specifically on the unique needs of industry and commerce. IAS is a source of professional power to its 11,000+ worldwide members.
FDP Overview
As power transmission and distribution become more unpredictable, power grid operators are compelled to increase their reliance on communication infrastructure for grid monitoring and control. Along with this, Power Grids are confronting significant cyber-security challenges. This FDP will help the attendees to understand how power systems are affected by assaults that inject false datawhich can disrupt distributed control and lead to an imbalance in power supply and demand. Cybersecurity is a critical concern in the context of automation, as the increasing reliance on automated systems introduces new challenges and risks. Automation systems often rely on software and hardware components that may have vulnerabilities. If these vulnerabilities are exploited, attackers can gain unauthorized access, disrupt operations, or manipulate data. Weak or poorly implemented authentication mechanisms can allow unauthorized individuals to access automation systems. Additionally, inadequate authorization controls may permit users to perform actions beyond their intended scope.