Search results for: Olubajo Olumide Olu
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 16

Search results for: Olubajo Olumide Olu

16 Effect of Rice Husk Ash and Metakaolin on the Compressive Strengths of Ternary Cement Mortars

Authors: Olubajo Olumide Olu

Abstract:

This paper studies the effect of Metakaolin (MK) and Rice husk ash (RHA) on the compressive strength of ternary cement mortar at replacement level up to 30%. The compressive strength test of the blended cement mortars were conducted using Tonic Technic compression and machine. Nineteen ternary cement mortars were prepared comprising of ordinary Portland cement (OPC), Rice husk ash (RHA) and Metakaolin (MK) at different proportion. Ternary mortar prisms in which Portland cement was replaced by up to 30% were tested at various age; 2, 7, 28 and 60 days. Result showed that the compressive strength of the cement mortars increased as the curing days were lengthened for both OPC and the blended cement samples. The ternary cement’s compressive strengths showed significant improvement compared with the control especially beyond 28 days. This can be attributed to the slow pozzolanic reaction resulting from the formation of additional CSH from the interaction of the residual CH content and the silica available in the Metakaolin and Rice husk ash, thus providing significant strength gain at later age. Results indicated that the addition of metakaolin with rice husk ash kept constant was found to lead to an increment in the compressive strength. This can either be attributed to the high silica/alumina contribution to the matrix or the C/S ratio in the cement matrix. Whereas, increment in the rice husk ash content while metakaolin was held constant led to an increment in the compressive strength, which could be attributed to the reactivity of the rice husk ash followed by decrement owing to the presence of unburnt carbon in the RHA matrix. The best compressive strength results were obtained at 10% cement replacement (5% RHA, 5% MK); 15% cement replacement (10% MK and 5% RHA); 20% cement replacement (15% MK and 5% RHA); 25% cement replacement (20% MK and 5% RHA); 30% cement replacement (10%/20% MK and 20%/10% RHA). With the optimal combination of either 15% and 20% MK with 5% RHA giving the best compressive strength of 40.5MPa.

Keywords: metakaolin, rice husk ash, compressive strength, ternary mortar, curing days

Procedia PDF Downloads 303
15 Development of a Sequential Multimodal Biometric System for Web-Based Physical Access Control into a Security Safe

Authors: Babatunde Olumide Olawale, Oyebode Olumide Oyediran

Abstract:

The security safe is a place or building where classified document and precious items are kept. To prevent unauthorised persons from gaining access to this safe a lot of technologies had been used. But frequent reports of an unauthorised person gaining access into security safes with the aim of removing document and items from the safes are pointers to the fact that there is still security gap in the recent technologies used as access control for the security safe. In this paper we try to solve this problem by developing a multimodal biometric system for physical access control into a security safe using face and voice recognition. The safe is accessed by the combination of face and speech pattern recognition and also in that sequential order. User authentication is achieved through the use of camera/sensor unit and a microphone unit both attached to the door of the safe. The user face was captured by the camera/sensor while the speech was captured by the use of the microphone unit. The Scale Invariance Feature Transform (SIFT) algorithm was used to train images to form templates for the face recognition system while the Mel-Frequency Cepitral Coefficients (MFCC) algorithm was used to train the speech recognition system to recognise authorise user’s speech. Both algorithms were hosted in two separate web based servers and for automatic analysis of our work; our developed system was simulated in a MATLAB environment. The results obtained shows that the developed system was able to give access to authorise users while declining unauthorised person access to the security safe.

Keywords: access control, multimodal biometrics, pattern recognition, security safe

Procedia PDF Downloads 289
14 An ANN-Based Predictive Model for Diagnosis and Forecasting of Hypertension

Authors: Obe Olumide Olayinka, Victor Balanica, Eugen Neagoe

Abstract:

The effects of hypertension are often lethal thus its early detection and prevention is very important for everybody. In this paper, a neural network (NN) model was developed and trained based on a dataset of hypertension causative parameters in order to forecast the likelihood of occurrence of hypertension in patients. Our research goal was to analyze the potential of the presented NN to predict, for a period of time, the risk of hypertension or the risk of developing this disease for patients that are or not currently hypertensive. The results of the analysis for a given patient can support doctors in taking pro-active measures for averting the occurrence of hypertension such as recommendations regarding the patient behavior in order to lower his hypertension risk. Moreover, the paper envisages a set of three example scenarios in order to determine the age when the patient becomes hypertensive, i.e. determine the threshold for hypertensive age, to analyze what happens if the threshold hypertensive age is set to a certain age and the weight of the patient if being varied, and, to set the ideal weight for the patient and analyze what happens with the threshold of hypertensive age.

Keywords: neural network, hypertension, data set, training set, supervised learning

Procedia PDF Downloads 350
13 Communicative Language Teaching Technique: A Neglected Approach in Reading Comprehension Instruction

Authors: Olumide Yusuf Jimoh

Abstract:

Reading comprehension is an interactive and purposeful process of getting meaning from and bringing meaning to a text. Over the years, teachers of the English Language (in Nigeria) have been glued to the monotonous method of making students read comprehension passages silently and then answer the questions that follow such passages without making the reading session interactive. Hence, students often find such exercises monotonous and boring. Consequently, students'’ interest in language learning continues to dwindle, and this often affects their overall academic performance. Relying on Communicative Accommodation Theory therefore, the study employed the qualitative research design method to x-ray Communicative Language Teaching Approach (CLTA) in reading comprehension. Moreover, techniques such as the Genuinely Collaborative Reading Approach (GCRA), Jigsaw reading, Pre-reading, and Post-reading tasks were examined. The researcher submitted that effective reading comprehension could not be done passively. Students must respond to what they read; they must interact not only with the materials being read but also with one another and with the teacher; this can be achieved by developing communicative and interactive reading programs.

Keywords: collaborative reading approach, communicative teaching, interactive reading program, pre-reading task, reading comprehension

Procedia PDF Downloads 58
12 Corrosion and Microstructural Properties of Vanadium-Microalloyed High-Manganese Steels

Authors: Temitope Olumide Olugbade

Abstract:

Low resistance and delayed fracture to corrosion, especially in harsh environmental conditions, often limit the wide application of high-manganese (high-Mn) steels. To address this issue, the present work investigates the influence of microalloying on the corrosion properties of high-Mn steels. Microalloyed and base high-Mn steels were synthesized through an arc melting process under an argon atmosphere. To generate different microstructures, the temperature and duration were varied via thermal homogenization treatments. The electrochemical impedance spectroscopy (EIS) and potentiodynamic polarization techniques were used to determine the corrosion properties in 0.6 M NaCl aqueous solution at room temperature. The relationship between the microstructures and corrosion properties was investigated via Scanning Kelvin Probe Microscopy (SKPFM), energy dispersive X-ray spectroscopy (EDX), and Scanning electron microscopy (SEM) techniques. The local corrosion properties were investigated via in situ atomic force spectroscopy (AFM), considering the homogenization treatments. The results indicate that microalloying is a successful technique for enhancing the corrosion behavior of high-Mn steels. Compared to other alloying elements, Vanadium has shown improvement in corrosion properties for both general and local corrosion in chloride environments.

Keywords: corrosion, high-manganese steel, homogenization, microalloying, vanadium

Procedia PDF Downloads 31
11 Comparative Advantage of Mobile Agent Application in Procuring Software Products on the Internet

Authors: Michael K. Adu, Boniface K. Alese, Olumide S. Ogunnusi

Abstract:

This paper brings to fore the inherent advantages in application of mobile agents to procure software products rather than downloading software content on the Internet. It proposes a system whereby the products come on compact disk with mobile agent as deliverable. The client/user purchases a software product, but must connect to the remote server of the software developer before installation. The user provides an activation code that activates mobile agent which is part of the software product on compact disk. The validity of the activation code is checked on connection at the developer’s end to ascertain authenticity and prevent piracy. The system is implemented by downloading two different software products as compare with installing same products on compact disk with mobile agent’s application. Downloading software contents from developer’s database as in the traditional method requires a continuously open connection between the client and the developer’s end, a fixed network is not economically or technically feasible. Mobile agent after being dispatched into the network becomes independent of the creating process and can operate asynchronously and autonomously. It can reconnect later after completing its task and return for result delivery. Response Time and Network Load are very minimal with application of Mobile agent.

Keywords: software products, software developer, internet, activation code, mobile agent

Procedia PDF Downloads 256
10 Radical Islam and Transnational Security: West Africa and the Asia Pacific in View

Authors: Olumide A. Fafore, Khondlo Mtshali

Abstract:

The beginning of the 21st century saw the emergence of new and global threats to national and transnational security in West Africa and the Asia Pacific regions as a result of the spread of jihadist terrorism across borders, a manifestation of the rise of radical Islam. Extremist and armed Islamic movements influenced by Salafism, the Jihad in Afghanistan and the Muslim Brotherhood are prevalent in Northern Nigeria, Niger, Cameroon, Mali, Chad, Pakistan, Afghanistan, and India. Carrying out attacks across borders, including assassinations, murders, armed robberies, and kidnapping, assisted by open and porous borders and large flow of illegal immigrants across borders. This paper examines the effect of Radical Islam on Transnational security through a review of past literature and the social and security consequences on the people of the regions. Our findings indicate that the activities of armed Islamic movements such as Boko Haram, Ansaru and Al-Qaeda are having a negative impact on the economy, development, and security of the states and people of West Africa and the Asia Pacific. It stresses the importance of regional, transnational and international cooperation, as these threats to national and transnational security can no longer be solved in a national or regional framework.

Keywords: Islamic movements, jihadist terrorism, radical Islam, transnational security

Procedia PDF Downloads 121
9 An Approach to Secure Mobile Agent Communication in Multi-Agent Systems

Authors: Olumide Simeon Ogunnusi, Shukor Abd Razak, Michael Kolade Adu

Abstract:

Inter-agent communication manager facilitates communication among mobile agents via message passing mechanism. Until now, all Foundation for Intelligent Physical Agents (FIPA) compliant agent systems are capable of exchanging messages following the standard format of sending and receiving messages. Previous works tend to secure messages to be exchanged among a community of collaborative agents commissioned to perform specific tasks using cryptosystems. However, the approach is characterized by computational complexity due to the encryption and decryption processes required at the two ends. The proposed approach to secure agent communication allows only agents that are created by the host agent server to communicate via the agent communication channel provided by the host agent platform. These agents are assumed to be harmless. Therefore, to secure communication of legitimate agents from intrusion by external agents, a 2-phase policy enforcement system was developed. The first phase constrains the external agent to run only on the network server while the second phase confines the activities of the external agent to its execution environment. To implement the proposed policy, a controller agent was charged with the task of screening any external agent entering the local area network and preventing it from migrating to the agent execution host where the legitimate agents are running. On arrival of the external agent at the host network server, an introspector agent was charged to monitor and restrain its activities. This approach secures legitimate agent communication from Man-in-the Middle and Replay attacks.

Keywords: agent communication, introspective agent, isolation of agent, policy enforcement system

Procedia PDF Downloads 266
8 An Intelligent Scheme Switching for MIMO Systems Using Fuzzy Logic Technique

Authors: Robert O. Abolade, Olumide O. Ajayi, Zacheaus K. Adeyemo, Solomon A. Adeniran

Abstract:

Link adaptation is an important strategy for achieving robust wireless multimedia communications based on quality of service (QoS) demand. Scheme switching in multiple-input multiple-output (MIMO) systems is an aspect of link adaptation, and it involves selecting among different MIMO transmission schemes or modes so as to adapt to the varying radio channel conditions for the purpose of achieving QoS delivery. However, finding the most appropriate switching method in MIMO links is still a challenge as existing methods are either computationally complex or not always accurate. This paper presents an intelligent switching method for the MIMO system consisting of two schemes - transmit diversity (TD) and spatial multiplexing (SM) - using fuzzy logic technique. In this method, two channel quality indicators (CQI) namely average received signal-to-noise ratio (RSNR) and received signal strength indicator (RSSI) are measured and are passed as inputs to the fuzzy logic system which then gives a decision – an inference. The switching decision of the fuzzy logic system is fed back to the transmitter to switch between the TD and SM schemes. Simulation results show that the proposed fuzzy logic – based switching technique outperforms conventional static switching technique in terms of bit error rate and spectral efficiency.

Keywords: channel quality indicator, fuzzy logic, link adaptation, MIMO, spatial multiplexing, transmit diversity

Procedia PDF Downloads 115
7 Intelligent Parking Systems for Quasi-Close Communities

Authors: Ayodele Adekunle Faiyetole, Olumide Olawale Jegede

Abstract:

This paper presents the experimental design and needs justifications for a localized intelligent parking system (L-IPS), ideal for quasi-close communities with increasing vehicular volume that depends on limited or constant parking facilities. For a constant supply in parking facilities, the demand for an increasing vehicular volume could lead to poor time conservation or extended travel time, traffic congestion or impeded mobility, and safety issues. Increased negative environmental and economic externalities are other associated and consequent downsides of disparities in demand and supply. This L-IPS is designed using a microcontroller, ultrasonic sensors, LED indicators, such that the current status, in terms of parking spots availability, can be known from the main entrance to the community or a parking zone on a LCD screen. As an advanced traffic management system (ATMS), the L-IPS is designed to resolve aspects of infrastructure-to-driver (I2D) communication and parking detection issues. Thus, this L-IPS can act as a timesaver for users by helping them know the availability of parking spots. Providing on-time, informed routing, to a next preference or seamless moving to berth on the available spot on a proximate facility as the case may be. Its use could also increase safety and increase mobility, and fuel savings and costs, therefore, reducing negative environmental and economic externalities due to transportation systems.

Keywords: intelligent parking systems, localized intelligent parking system, intelligent transport systems, advanced traffic management systems, infrastructure-to-drivers communication

Procedia PDF Downloads 131
6 Aggressive Behaviour and Its Association with Substance Use Disorder among Senior Secondary School Students in Ilesha, Nigeria

Authors: Famurewa Olumide Joseph, Akinsulore Adesanmi

Abstract:

The current study investigated aggressive behaviour and its association with substance use disorder among senior secondary school students in Ilesha, Nigeria. Participants were three hundred and seventy-five (375) comprising (212) females and (163) males of senior secondary school students in Ilesa East and Ilesa West; who were randomly selected among the population of students from the schools. The mean age of the respondents was 14.61 years (S.D = 1.16), with 311 (82.9%) between 14 – 16 years. Female respondents were 212 (56.5%), while male respondents were 163 (43.5%). A cross sectional design was adopted. Three instruments were used for data collection. Buss Perry Aggression Questionnaire, Alcohol Use Disorder Identification Test (AUDIT) and Drug Abuse Screening Test (DAST). It was hypothesized that aggressive behaviour will be associated with substance use disorder among senior secondary school students in Ilesa East and Ilesa West. The result indicated that the overall prevalence of substance use disorder was 16.0%. Chi-Square test exploring the association between aggressive behaviour and substance use disorder shows that there is a significant association between aggressive behaviour and substance use disorder (χ2 =8.55, p =0.014). Results also showed that emotional problem (χ2 (2) =13.0; p = 0.001) was statistically significant while current medications intake (χ2 (2) =2.03; p =0.362) and overall wellbeing (χ2 (4) =2.49; p =0.646) were not statistically significant. There is an inverse association between prosocial behaviour and aggressive behaviour (r= -0.037, p>0.05). This indicates that as the level of prosocial behaviour increases, the level of aggressive behaviour among respondents decreases. However, alcohol use had no correlation with aggressive behaviour (r=0.070, p>0.05). Among the implications stated is that factors such as emotional symptoms, conduct problems, hyperactivity, peer problem and drug use contributed to the prevalence of aggressive behaviour among students. Suggestions for further studies were equally made.

Keywords: aggressive behaviour, alcohol, prevalence, students, substance use disorder (SUD)

Procedia PDF Downloads 37
5 Geothermal Energy Potential Estimates of Niger Delta Basin from Recent Studies

Authors: Olumide J. Adedapo

Abstract:

In this work, geothermal energy resource maps of the Niger Delta Basin were constructed using borehole thermal log data from over 300 deep wells. Three major geothermal anomalies were delineated and quantitatively interpreted in both onshore and offshore parts of the Niger Delta. The geothermal maps present the distribution of geothermal energy stored in the sedimentary rock mass in two ways: the accessible resources in depth interval 0-4000 m and static geothermal energy resources stored in the complete sedimentary infill of the basin (from the ground surface to the basement). The first map shows two major onshore anomalies, one in the north (with maximum energy values, 800 GJ/m2), another in the east to northeastern part (maximum energy values of 1250–1500 GJ/m2). Another two major anomalies occur offshore, one in the south with values of 750-1000 GJ/m2, occurring at about 100 km seawards and the other, in the southwest offshore with values 750-1250 GJ/m2, still at about 100 km from the shore. A second map of the Niger Delta shows a small anomaly in the northern part with the maximum value of 1500 GJ/m2 and a major anomaly occurring in the eastern part of the basin, onshore, with values of 2000-3500 GJ/m2. Offshore in the south and southwest anomalies in the total sedimentary rock mass occur with highest values up to 4000GJ/m2, with the southwestern anomaly extending west to the shore. It is much of interest to note the seaward–westward extension of these anomalies both in size, configuration, and magnitude for the geothermal energy in the total sedimentary thickness to the underlying basement. These anomalous fields show the most favourable locations and areas for further work on geothermal energy resources.

Keywords: geothermal energy, offshore, Niger delta, basin

Procedia PDF Downloads 174
4 Investigation of Geothermal Gradient of the Niger Delta from Recent Studies

Authors: Adedapo Jepson Olumide, Kurowska Ewa, K. Schoeneich, Ikpokonte A. Enoch

Abstract:

In this paper, subsurface temperature measured from continuous temperature logs were used to determine the geothermal gradient of NigerDelta sedimentary basin. The measured temperatures were corrected to the true subsurface temperatures by applying the American Association of Petroleum Resources (AAPG) correction factor, borehole temperature correction factor with La Max’s correction factor and Zeta Utilities borehole correction factor. Geothermal gradient in this basin ranges from 1.20C to 7.560C/100m. Six geothermal anomalies centres were observed at depth in the southern parts of the Abakaliki anticlinorium around Onitsha, Ihiala, Umuaha area and named A1 to A6 while two more centre appeared at depth of 3500m and 4000m named A7 and A8 respectively. Anomaly A1 describes the southern end of the Abakaliki anticlinorium and extends southwards, anomaly A2 to A5 were found associated with a NW-SE structural alignment of the Calabar hinge line with structures describing the edge of the Niger Delta basin with the basement block of the Oban massif. Anomaly A6 locates in the south-eastern part of the basin offshore while A7 and A8 are located in the south western part of the basin offshore. At the average exploratory depth of 3500m, the geothermal gradient values for these anomalies A1, A2, A3, A4, A5, A6, A7, and A8 are 6.50C/100m, 1.750C/100m, 7.50C/100m, 1.250C/100m, 6.50C/100m, 5.50C/100m, 60C/100m, and 2.250C/100m respectively. Anomaly A8 area may yield higher thermal value at greater depth than 3500m. These results show that anomalies areas of A1, A3, A5, A6 and A7 are potentially prospective and explorable for geothermal energy using abandoned oil wells in the study area. Anomalies A1, A3.A5, A6 occur at areas where drilled boreholes were not exploitable for oil and gas but for the remaining areas where wells are so exploitable there appears no geothermal anomaly. Geothermal energy is environmentally friendly, clean and reversible.

Keywords: temperature logs, geothermal gradient anomalies, alternative energy, Niger delta basin

Procedia PDF Downloads 235
3 Personalization of Context Information Retrieval Model via User Search Behaviours for Ranking Document Relevance

Authors: Kehinde Agbele, Longe Olumide, Daniel Ekong, Dele Seluwa, Akintoye Onamade

Abstract:

One major problem of most existing information retrieval systems (IRS) is that they provide even access and retrieval results to individual users specially based on the query terms user issued to the system. When using IRS, users often present search queries made of ad-hoc keywords. It is then up to IRS to obtain a precise representation of user’s information need, and the context of the information. In effect, the volume and range of the Internet documents is growing exponentially and consequently causes difficulties for a user to obtain information that precisely matches the user interest. Diverse combination techniques are used to achieve the specific goal. This is due, firstly, to the fact that users often do not present queries to IRS that optimally represent the information they want, and secondly, the measure of a document's relevance is highly subjective between diverse users. In this paper, we address the problem by investigating the optimization of IRS to individual information needs in order of relevance. The paper addressed the development of algorithms that optimize the ranking of documents retrieved from IRS. This paper addresses this problem with a two-fold approach in order to retrieve domain-specific documents. Firstly, the design of context of information. The context of a query determines retrieved information relevance using personalization and context-awareness. Thus, executing the same query in diverse contexts often leads to diverse result rankings based on the user preferences. Secondly, the relevant context aspects should be incorporated in a way that supports the knowledge domain representing users’ interests. In this paper, the use of evolutionary algorithms is incorporated to improve the effectiveness of IRS. A context-based information retrieval system that learns individual needs from user-provided relevance feedback is developed whose retrieval effectiveness is evaluated using precision and recall metrics. The results demonstrate how to use attributes from user interaction behavior to improve the IR effectiveness.

Keywords: context, document relevance, information retrieval, personalization, user search behaviors

Procedia PDF Downloads 426
2 Growth Performance and Intestinal Morphology of Isa Brown Pullet Chicks Fed Diets Containing Turmeric and Clove

Authors: Ayoola Doris Ayodele, Grace Oluwatoyin Tayo, Martha Dupe Olumide, Opeyemi Arinola Ajayi, Ayodeji Taofeek Ayo-Bello

Abstract:

Antibiotics have been widely used in animal nutrition to improve growth performance and health worldwide for many decades. However, there are rising concerns on the negative impact of dependence on antibiotic growth promoters (AGP) to improve animal performance despite its tremendous use. The need to improve performance in poultry production creates demand for natural alternative sources. Phytogenic feed additives (PFA) are plant-derived natural bioactive compounds that could be incorporated into animal feed to enhance livestock productivity. The effect of Turmeric, clove and turmeric + clove as feed additive was evaluated on performance and intestinal morphology of egg type chickens. 504- fifteen day old Isa brown chicks were weighed and randomly distributed to nine dietary treatments by a 3 x 3 factorial arrangement (test ingredient x inclusion level) in a completely randomized design, with four replicates of 14 birds each. The birds were fed Chick starter diet containing (2800 kcal/kg ME; 20.8% CP). Dietary treatments were Group 1 (T1- basal diet with 0% Turmeric inclusion), (T2- basal diet with 1% Turmeric inclusion), (T3- basal diet with 2% Turmeric inclusion). Group 2 (T4- basal diet with 0% clove inclusion), (T5- basal diet with 1% clove inclusion), (T6- basal diet with 2% clove inclusion). Group 3, turmeric + clove combination on 1:1 ratio weight for weight (T7- basal diet with 0% turmeric + 0% clove inclusion), (T8- basal diet with 0.5% turmeric + 0.5 clove% inclusion), (T9- basal diet with 1% turmeric + 1% clove inclusion). Performance parameters were evaluated throughout the experiment. The experiment spanned from day 15 to 56. Data were analyzed using Analysis of Variance (ANOVA) followed by Duncan’s Multiple Range Test with significance of P≤ 0.05. Significant differences (P>0.05) were not observed in final body weight, weight gain, feed intake and FCR among birds fed with diets containing across the treatments. However, birds fed with test ingredients showed higher numerical values in final body weight and weight gain when compared to the birds without additive. Birds on T8 had the highest final body weight value of 617.33 g and low values in all the control treatments (T1 -588 g, T4- 572 g and T7 -584 g). At day 56, intestinal samples were taken from the jejunum and ileum to evaluate the villus height, crypt depth and villus: crypt depth ratio. Addition of turmeric, clove and turmeric + clove in the diet produced significant (P< 0.05) effect on Jejunum and ileum of birds. Therefore, Turmeric and clove can be used as feed additives for pullet birds because they have a positive effect on growth performance and intestinal morphology of pullet chicks.

Keywords: clove, intestinal morphology, isa brown chicks, performance, turmeric

Procedia PDF Downloads 125
1 Microencapsulation of Probiotic and Evaluation for Viability, Antimicrobial Property and Cytotoxic Activities of its Postbiotic Metabolites on MCF-7 Breast Cancer Cell Line

Authors: Nkechi V. Enwuru, Bullum Nkeki, Elizabeth A. Adekoya, Olumide A. Adebesin, Rebecca F. Peters, Victoria A. Aikhomu, Mendie E. U.

Abstract:

Background: Probiotics are live microbial feed supplement beneficial for host. Probiotics and their postbiotic products have been used to prevent or treat various health conditions. However, the products cell viability is often low due to harsh conditions subjected during processing, handling, storage, and gastrointestinal transit. These strongly influence probiotics’ benefits; thus, viability is essential for probiotics to produce health benefits for the host. Microencapsulation is a promising technique with considerable effects on probiotic survival. The study is aimed to formulate a microencapsulated probiotic and evaluate its viability, antimicrobial efficacy, and cytotoxic activity of its postbiotic on the MCF-7 breast cancer cell line. Method: Human and animal raw milk were sampled for lactic acid bacteria. The isolated bacteria were identified using conventional and VITEK 2 systems. The identified lactic acid bacterium was encapsulated using spray-dried and extrusion methods. The free, encapsulated, and chitosan-coated encapsulated probiotics were tested for viability in simulated-gastric intestinal (SGI) fluid and different storage conditions at refrigerated (4oC) and room (25oC) temperatures. The disintegration time and weight uniformity of the spray-dried hard gelatin capsules were tested. The antimicrobial property of free and encapsulated probiotics was tested against enteric pathogenic isolates from antiretroviral therapy (ART) treated HIV-positive patients. The postbiotic of the free cells was extracted, and its cytotoxic effect on the MCF-7 breast cancer cell line was tested through an MTT assay. Result: The Lactobacillus plantarum was isolated from animal raw milk. Zero-size hard gelatin L. plantarum capsules with granules within a size range of 0.71–1.00 mm diameter was formulated. The disintegration time ranges from 2.14±0.045 to 2.91±0.293 minutes, while the average weight is 502.1mg. Simulated gastric solution significantly affected viability of both free and microcapsules. However, the encapsulated cells were more protected and viable due to impermeability in the microcapsules. Furthermore, the viability of free cells stored at 4oC and 25oC were less than 4 log CFU/g and 6 log CFU/g respectively after 12 weeks. However, the microcapsules stored at 4oC achieved the highest viability among the free and microcapsules stored at 25oC and the free cells stored at 4oC. Encapsulated cells were released in the simulated gastric fluid, viable and effective against the enteric pathogens tested. However, chitosan-coated calcium alginate encapsulated probiotics significantly inhibited Shigella flexneri, Candida albicans, and Escherichia coli. The Postbiotic Metabolites (PM) of L. plantarum produced a cytotoxic effect on the MCF-7 breast cancer cell line. The postbiotic showed significant cytotoxic activity similar to 5FU, a standard antineoplastic agent. The inhibition concentration of 50% growth (IC50) of postbiotic metabolite K3 is low and consistent with the IC50 of the positive control (Cisplatin). Conclusions: Lactobacillus plantarum postbiotic exhibited a cytotoxic effect on the MCF-7 breast cancer cell line and could be used as combined adjuvant therapy in breast cancer management. The microencapsulation technique protects the probiotics, improving their viability and delivery to the gastrointestinal tract. Chitosan enhances antibacterial efficacy; thus, chitosan-coated microencapsulated L. plantarum probiotics could be more effective and used as a combined therapy in HIV management of opportunistic enteric infection.

Keywords: probiotics, encapsulation, gastrointestinal conditions, antimicrobial effect, postbiotic, cytotoxicity effect

Procedia PDF Downloads 45