Field Evaluation of Promising Breeding Lines and Varities of Common Bean for Tolernace to Soilborne Pathogens

CRSP:   |  Region:   |  Topic:   |  Database:
Details

Author(s):
G.S. Abawi; T.C. Porch; J.D. Kelly

Type of Document:
Media

 

Publisher/Journal:
Not Available

Date of Publication:
February 2012

Place of Publication:
Not Available

Description

A poster presented at the 2012 Global Pulse Researchers Meeting, Kigali, Rwanda- “Transforming Grain-Legume Systems to Enhance Nutrition and Livelihoods”. Abstract: The objective of this study was the identification and incorporation of sources resistance to major root pathogens into adapted bean varieties being developed in the collaborative Dry Grains PULSE CRSP project. The use of varieties resistant to the prevailing root pathogens is the most effective and practical strategy in the control of root disease of common bean. Field trials of promising lines from the breeding programs of Drs. Kelly and Porch were evaluated in the bean root rot nursery at the Vegetable Research Farm, NYSAES near Geneva, NY over a three year period. This site is heavily infested with Fusarium solani f. sp. phaseoli, Pythium ultimum, Rhizoctonia solani, and Thielaviopsis basicola. In 2011, 33 lines and varieties were arranged in a randomized block design with 4 replications. Each plot consisted of two rows, 7 m long and 0.75 m apart. Seeds were treated with recommended fungicides (Apron + Maxim) and an insecticide (Cruiser). All maintenance practices were according to recommended commercial guidelines. Root rot severity, among the lines tested varied greatly, ranging from 3.4 (10IS-6567, P07863, B04554) to 6.0 (CLRK) on the 1 (healthy) to 9 (late stages of decay) scale. Also, many of the tested lines exhibited excellent vigor, productivity and high tolerance to a severe incidence of common bacterial blight, including P07863, RR008, RR016, RR005, 10IS-6480.

Additional Bibliographic Information

Coming soon

Send us your questions or comments

Your Name (required)

Your Email (required)

Comment

Please enter this text:
captcha

[current-page]