Wheat Take-All: Quantification of Resistance and Pseudomonad Suppression and the Potential for Their Interaction
Ismail, Emad Abdel-Gawad
This item is only available for download by members of the University of Illinois community. Students, faculty, and staff at the U of I may log in with your NetID and password to view the item. If you are trying to access an Illinois-restricted dissertation or thesis, you can request a copy through your library's Inter-Library Loan office or purchase a copy directly from ProQuest.
Permalink
https://hdl.handle.net/2142/85046
Description
Title
Wheat Take-All: Quantification of Resistance and Pseudomonad Suppression and the Potential for Their Interaction
Author(s)
Ismail, Emad Abdel-Gawad
Issue Date
1997
Doctoral Committee Chair(s)
Wilkinson, Henry T.
Department of Study
Crop Sciences
Discipline
Crop Sciences
Degree Granting Institution
University of Illinois at Urbana-Champaign
Degree Name
Ph.D.
Degree Level
Dissertation
Keyword(s)
Agriculture, Plant Pathology
Language
eng
Abstract
A new 10-day in vitro assay was developed to study the dynamic colonization of Ggt-infected roots by both antagonistic and non-antagonistic bacteria. Pseudomonas fluorescens (strain 2-79), as antagonist of Ggt and Bacillus megaterium (strain B153-2-2), a non-antagonist, were used to determine if wheat roots, infected by Ggt, supported greater CFU of the antagonist strain than non-antagonist strain. Colony forming units of P. fluorescens, applied singly or in combination with B. megaterium, were significantly higher on Ggt-infected roots compared to non-inoculated roots after 7 and 10 days from treatment. The CFUs of B. megaterium, applied singly or in combination with P. fluorescens, were not significantly higher on Ggt-infected roots compared to non-inoculated roots.
Use this login method if you
don't
have an
@illinois.edu
email address.
(Oops, I do have one)
IDEALS migrated to a new platform on June 23, 2022. If you created
your account prior to this date, you will have to reset your password
using the forgot-password link below.