The virus was maintained on systemically infected tomato plants (harboring the Tm-22 resistance gene) cv’s: Ikram, Odelia, Bruno, Olympiacos, Magi, Tory which served as propagation hosts. In addition to the registered resistance to ToMV by the seed-companies, the authenticity of the presence of Tm-22 was further confirmed by DNA sequencing of the resistance gene in Odelia and Ikram cultivars. All virus-infected plants were kept in an insect-proof growth chamber inside a glasshouse and sprayed regularly with insecticides to prevent any infestation.
Mechanical Inoculation and Host Range Determination of Tomato Virus
The virus was maintained on systemically infected tomato plants (harboring the Tm-22 resistance gene) cv’s: Ikram, Odelia, Bruno, Olympiacos, Magi, Tory which served as propagation hosts. In addition to the registered resistance to ToMV by the seed-companies, the authenticity of the presence of Tm-22 was further confirmed by DNA sequencing of the resistance gene in Odelia and Ikram cultivars. All virus-infected plants were kept in an insect-proof growth chamber inside a glasshouse and sprayed regularly with insecticides to prevent any infestation.
Corresponding Organization : Tel Aviv University
Protocol cited in 6 other protocols
Variable analysis
- Purified viral particles
- Tomato plants harboring the Tm-2^2 resistance gene
- Symptom development in test plants
- Host range of the virus
- Tomato plants harboring the Tm-2^2 resistance gene used as propagation hosts
- Insect-proof growth chamber and regular insecticide spraying to prevent infestation
- Positive control: Tomato plants harboring the Tm-2^2 resistance gene used as propagation hosts
- Negative control: Not explicitly mentioned
Annotations
Based on most similar protocols
As authors may omit details in methods from publication, our AI will look for missing critical information across the 5 most similar protocols.
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!