AI-Augmented DevOps Strategies for Scalable WSN Data Processing and Compression

  IJCTT-book-cover
 
         
 
© 2025 by IJCTT Journal
Volume-73 Issue-4
Year of Publication : 2025
Authors : Chhaya Gunawat, Rohit Kumar Gupta
DOI :  10.14445/22312803/IJCTT-V73I4P103

How to Cite?

Chhaya Gunawat, Rohit Kumar Gupta, "AI-Augmented DevOps Strategies for Scalable WSN Data Processing and Compression," International Journal of Computer Trends and Technology, vol. 73, no. 4, pp. 19-27, 2025. Crossref, https://doi.org/10.14445/22312803/IJCTT-V73I4P103

Abstract
The rapid proliferation of Wireless Sensor Networks (WSNs) has led to an exponential increase in sensor-generated data, necessitating efficient data processing and compression techniques for scalability and real-time decision-making. Traditional DevOps methodologies for managing WSNs often face challenges in handling large-scale data streams, optimizing resource utilization, and ensuring low-latency processing. This paper proposes an AI-augmented DevOps strategy that integrates machine learning and automation to enhance data processing and compression in WSNs. Our approach leverages intelligent pipeline automation, adaptive compression algorithms, and predictive analytics to optimize data flow, minimize energy consumption, and improve system reliability. We evaluate the framework’s performance regarding compression ratio, latency, processing overhead, and reconstruction accuracy, demonstrating its efficiency in handling large-scale WSN deployments.

Keywords
AI-augmented DevOps, Wireless Sensor Networks, Data Processing, Data Compression, Scalable Computing, Automation.

Reference

[1] Shreyas Pangavhane et al., “AI-Augmented Software Development: Boosting Efficiency and Quality,” 2024 International Conference on Decision Aid Sciences and Applications, Manama, Bahrain, pp. 1-5, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Jaya Chandra Srikanth Gummadi, “IoT Security in the Banking Sector: Mitigating the Vulnerabilities of Connected Devices and Smart ATMs,” Asian Business Review, vol. 13, no. 3, pp. 95-102, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Ahmad Bin Yamin, Rajasekhar Reddy Talla, and Srinikhita Kothapalli, “The Intersection of IoT, Marketing, and Cybersecurity: Advantages and Threats for Business Strategy,” Asian Business Consortium, vol. 15, no. 1, pp. 7-16, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Manish Kumar, and Sudesh Kumar, “Stray Portions of Computer Network Simulation,” International Journal of Research and Analytical Reviews, vol. 6, no. 3, pp. 807-813, 2019.
[Google Scholar] [Publisher Link]
[5] Dhaya Sindhu Battina, “AI-Augmented Automation for DevOps, a Model-Based Framework for Continuous Development in Cyber Physical Systems,” International Journal of Creative Research Thoughts, vol. 4, no. 3, pp. 779-783, 2016.
[Google Scholar] [Publisher Link]
[6] Himanshu Richhariya, Amit Sinhal, and Sanjay K. Mishra, “Analysis on Clustering Approach in MANET,” International Journal of Emerging Technologies and Innovative Research, vol. 4, no. 7, pp. 103-107, 2017.
[Google Scholar] [Publisher Link]
[7] Meena Chaudhary, and Rajeev Kumar, “Challenges on Security Attacks in Wireless Sensor Network: An Assessment,” International Research Journal of Mathematics, Engineering and IT, vol. 4, no. 2, pp. 22-25, 2017.
[Google Scholar] [Publisher Link]