Skip to main content

This is a preprint.

It has not yet been peer reviewed by a journal.

The National Library of Medicine is running a pilot to include preprints that result from research funded by NIH in PMC and PubMed.

ArXiv logoLink to ArXiv
[Preprint]. 2024 Mar 22:arXiv:2403.15282v1. [Version 1]

A story of viral co-infection, co-transmission and co-feeding in ticks: how to compute an invasion reproduction number

Giulia Belluccini a,b, Qianying Lin a, Bevelynn Williams b, Yijun Lou c, Zati Vatansever d, Martín López-García b, Grant Lythe b, Thomas Leitner a, Ethan Romero-Severson a, Carmen Molina-París a
PMCID: PMC10983997  PMID: 38562445

Abstract

With a single circulating vector-borne virus, the basic reproduction number incorporates contributions from tick-to-tick (co-feeding), tick-to-host and host-to-tick transmission routes. With two different circulating vector-borne viral strains, resident and invasive, and under the assumption that co-feeding is the only transmission route in a tick population, the invasion reproduction number depends on whether the model system of ordinary differential equations possesses the property of neutrality. We show that a simple model, with two populations of ticks infected with one strain, resident or invasive, and one population of co-infected ticks, does not have Alizon’s neutrality property. We present model alternatives that are capable of representing the invasion potential of a novel strain by including populations of ticks dually infected with the same strain. The invasion reproduction number is analysed with the next-generation method and via numerical simulations.

Keywords: co-infection, co-transmission, co-feeding, invasion reproduction number, neutrality, mathematical model, basic reproduction number PACS: 02.30.Hq, 87.10.Ed, 87.23.-n, 37N25, 62P10

1. Introduction

Co-infection of a single host by at least two distinct viruses provides an opportunity for viruses to exchange genetic information through genomic reassortment or recombination [1, 2]. In fact, entirely novel pathogenic viruses have emerged from reassortment events of less pathogenic parents in nature [35]. Co-infection can be thought of as the rate-limiting step in the sudden emergence of genetically distant variants of existing human pathogens such as influenza, SARS-CoV-2, and Crimean Congo Hemorrhagic Fever Virus (CCHFV). Therefore, understanding the dynamics of co-infection in common host species, e.g., arthropods (ticks or mosquitoes), is essential to study the emergence and re-emergence of both new and old human pathogens.

Genomic reassortment is possible in viruses with segmented genomes, such as the Bunyaviruses, which themselves include lethal pathogens of relevance to public health and of pandemic potential, e.g., Lassa fever, Rift Valley fever and CCHF viruses [6]. Fig. 1 illustrates the dynamics of reassortment at the cellular level for Bunyaviruses, or more generally for a tri-segmented virus. CCHFV is a tick-borne Bunyavirus, with the potential to reassort, and an increasing geographical range due to the changing climate [7, 8]. Understanding how adaptable to different hosts this potentially fatal human pathogen is, what role co-infection (as a first step to genomic reassortment) will play in the generation of potential new viral strains, and how those variants will spread among already infected ticks, is a challenge for theoretical biology.

Figure 1:

Figure 1:

A) If two viral strains, VA and VB, are co-circulating, the target cells, T, of an infected host will become singly infected (IA and IB), and potentially co-infected (IC). Co-infected cells have the potential to generate new viral progeny, different from that of the parental strains: VCVA and VCVB. B) A co-infected cell can lead to reassortment events, and produce up to 23 different reassortants.

Due to the ability of ticks to carry multiple viruses or viral strains, epidemiologists have considered co-infection in tick-borne diseases [917], superinfection [9], and co-transmission [1820]. Specifically, epidemiologists are interested in quantifying (or understanding) the invasion potential of a novel virus or strain [21, 22], given the endemic ability of a resident one [23]. In the same way as R0 provides conditions for successful establishment of a single virus in a susceptible population, the invasion reproduction number, RI, lends threshold conditions for successful invasion of a second virus when the population is endemic with the first one [24, 25]. For instance, Gao et al. developed a Susceptible-Infected-Susceptible (SIS) model for tick and host populations, and conducted a systematic analysis of invasion by the second virus [18]. More recently, Bushman and Antia have developed a general framework of the interaction between viral strains at the within-host level [26]. Pfab et al. have extended the time-since-infection framework of Kermack and McK-endrick [27] for two pathogens [28]. Rovenolt and Tate [29] have developed a model of co-infection to study how within-host interactions between parasites can alter host competition in an epidemic setting. Thao Le et al. [30] have studied a two-strain SIS model with co-infection (or co-colonisation) which incorporates variation in transmissibility, duration of carriage, pair-wise susceptibility to co-infection, co-infection duration, and transmission priority effects. Finally, Saad-Roy et al. [31] have considered super-infection and its role during the the first stage of an infection on the evolutionary dynamics of the degree to which the host is asymptomatic.

In the case of plant pathogens, recent experimental studies have shown the complex nature of vector-virus-plant interactions and their role in the transmission and replication of viruses as single and co-infections [32]. Allen et al. modeled the transmission dynamics of viruses between vectors and plants, under the assumption that co-infection could only take place in plants [24]. Chapwanya et al. developed a general deterministic epidemic model of cropvector-borne disease for synergistic co-infection [33]. Miller et al. have shown that mathematical models on the kinetics of co-infection of plant cells with two strains could not adequately describe the data [34].

Current mathematical models of co-infection need to be put in perspective, as previously discussed by Lipsitch et al. and Alizon [35, 36]. Alizon compared different models of co-infection and raised an issue of non-neutrality [36]. He noticed that certain models of co-infection lead to an invasion reproduction number which does not tend to one, in the limit when the invasive and the resident pathogens are the same. To solve this problem, Alizon proposed an alternative model structure, which includes a population of dually infected individuals with the resident pathogen, to achieve the desired neutral invasion reproduction number [36, 37].

In this paper, we first present a mathematical model of a single vector-borne virus to understand the role that different transmission routes play in the dynamics of the infected populations. Then, we study the dynamics of two different viruses, or viral strains, in a tick population making use of a classic co-infection model. After performing an invasion analysis, we explain the issue of non-neutrality of the invasion reproduction number, and propose five neutral alternatives. We conclude the paper with a summary of our alternative proposals, their applicability and limitations.

2. Mathematical model of a single viral strain in a population of ticks and their vertebrate hosts

We consider a tick population feeding on a population of vertebrate hosts, where both populations are susceptible to infection with virus V1. The host and tick populations are divided into susceptible and infected subsets. In what follows the number of susceptible hosts (ticks) is denoted n0m0, and the number of infected hosts (ticks) is denoted n1m1, respectively.

The mathematical model considers immigration, death, viral transmission and recovery events in the populations; namely, susceptible hosts and ticks immigrate into the population with rate ΦH and ΦT, respectively. Susceptible and infected hosts can die with per capita rates μ0 and μ1, respectively, whereas susceptible and infected ticks are characterised by the per capita death rates ν0 and ν1, respectively. We assume an infected host can infect a susceptible tick with rate γ1, and an infected tick can infect a susceptible host with rate β1. Both of these transmission events involve a tick feeding on a vertebrate host, and are referred to as systemic transmission events [38]. The virus can additionally be transmitted from an infected tick to a susceptible one via co-feeding [39, 40]. This occurs when ticks feed on a host in clusters, and close to each other; that is, on the same host and at the same time. In this instance the virus is transmitted by infected tick saliva, with this route of transmission referred to as non-systemic [38]. We denote by α1 the rate at which an infected tick can infect a susceptible one via co-feeding. We assume that transmission events follow mass action kinetics. For example, in the case of co-feeding, and with m0 and m1 the number of susceptible and infected ticks, respectively, the rate of infection for the susceptible population is α1m0m1. Finally, once a tick contracts the virus, it remains infected for life [41]. On the other hand, vertebrate hosts are characterised by shortlasting viremia [41, 42]. We, thus, assume that hosts clear the virus with rate φ1 [43, 44]. The above set of events are brought together in the following system of ordinary differential equations (ODEs), which describe the dynamics of susceptible and infected hosts and ticks:

dn0dt=ΦHμ0n0β1n0m1+φ1n1,dn1dt=μ1n1+β1n0m1φ1n1,dm0dt=ΦTν0m0γ1m0n1α1m0m1,dm1dt=ν1m1+γ1m0n1+α1m0m1. (1)

We note that this system of ODEs (1) has a virus-free equilibrium (VFE), n0,0,m0,0, given by

n0=ΦHμ0,m0=ΦTν0. (2)

2.1. Basic reproduction number

The basic reproduction number, R0, measures the mean number of new infections produced by an infected individual (during its lifetime) in a population at the virus-free equilibrium; that is, when the population is completely susceptible [45]. R0 (for the mathematical model (1)) can be calculated making use of the next-generation matrix method [46] as follows. The sub-system of differential equations for (n1,m1) is linearised at the VFE, and its Jacobian, J, is then written as JT+V, with T the 2×2 matrix of transmission events which accounts for new infections in the susceptible population, and VJT, the 2×2 matrix tracking the changes in the state of the infected populations [46]. The next-generation matrix is defined as KT(V)1, and the basic reproduction number, R0, is given by the largest eigenvalue of K [46]. For our system we have

Jμ1φ1β1n0γ1m0ν1+α1m0 (3)

with

T0β1n0γ1m0α1m0,andVμ1φ100ν1, (4)

so that

K0β1n0/ν1γ1m0/μ1+φ1α1m0/ν1, (5)

which in turn implies

R012α1m0ν1+α1m0ν12+4β1γ1m0n0ν1μ1+φ1. (6)

If R0<1, the VFE is stable, and if R0>1, it is unstable. The basic reproduction number can be rewritten as

R0=12RTT+RTT2+4RTHRHT, (7)

where we have introduced the following type reproduction numbers [47]

RTT=α1ΦTν0ν1,RTH=β1ΦHμ0ν1,RHT=γ1ΦTν0μ1+φ1,

which represent the contribution of each route of transmission, tick-to-tick, tick-to-host and host-to-tick, respectively, to the total number of new infections (of ticks and hosts) in the susceptible population. RTT, RTH, and RHT correspond to the entries of the next-generation matrix K (see Eq. (5)). RHH=0, since the virus cannot be directly transmitted from an infected host to a susceptible one. The expression of the basic reproduction number for a single virus (see Eq. (7)) clearly shows that co-feeding represents a singular route of transmission, compared to systemic routes. For example, β1 (or γ1) can be very large, but if γ1 (or β1) is negligible, the contribution to R0 of viral systemic transmission will be negligible. Therefore, co-feeding events (as characterised by the parameter α1), might maintain an epidemic if RTT>1. On the other hand, systemic transmission requires both tick-to-host and host-to-tick transmission routes to be non-vanishing, so that there is a chance for R0>1, since as soon as either β1 or γ1 are equal to zero, R0=0 in the absence of co-feeding.

We conclude this section mentioning a novel network approach (developed in Ref. [48]), to compute the parameters α1, β1, and γ1 from first principles. It is reassuring to note that this approach leads to a next-generation matrix with the same structure as K in Eq. (5).

2.2. Parameter values

We make use of recent literature to obtain parameter values for the ODE system (1). Table 1 contains a description of each model parameter, together with its plausible ranges and units. Since infection with CCHFV [42, 49] or Borrelia [48] is asymptomatic in ticks and vertebrate hosts (but unfortunately not in humans), we assume it does not affect their death rates; that is, μ0=μ1μ and ν0=ν1ν [18]. Given the narrow ranges in Table 1 for ΦH, ΦT, φ1 and μ, we fix these parameters as follows: ΦH=1 host per day, ΦT=2 ticks per day, φ1=1/6 per day, and μ=103 per day. We derive plausible ranges for the other model parameters making use of Ref. [48], as illustrated in detail in Appendix A.

Table 1:

Model parameters introduced in (1) (top half), and (8), (12), (13), and (15) (bottom half).

Parameter Event Range Units Reference

β1 H0+T1H1+T1 [10−7, 10−5] 1/day/tick [48]
γ1 T0+H1T1+H1 [10−5, 10−2] 1/day/host [48]
α1 T0+T1T1+T1 [10−6, 10−4] 1/day/tick [48]
ν0 Death rate of T0 10−2 1/day [48]
ν1 Death rate of T1 10−2 1/day [48]
μ0 Death rate of H0 [2.8 × 10−4, 2.8 × 10−3] 1/day [50]
μ1 Death rate of H1 [2.8 × 10−4, 2.8 × 10−3] 1/day [50]
ΦT Arrival of ticks [0.5, 3.5] tick/day [38]
ΦH Arrival of hosts [0.5, 1.5] host/day [38]
φ1 H1H0 [1/7,1/5] 1/day [44]

α2 T0+T2T2+T2 [10−6, 10−4] 1/day/tick [48]
δ1 Transmission of V1 by Tc [10−6, 10−4] 1/day/tick Assumed
δ2 Transmission of V2 by Tc [10−6, 10−4] 1/day/tick Assumed
κ1 Transmission of one copy of V1 from M1 [10−6, 10−4] 1/day/tick Assumed
κ2 Transmission of one copy of V2 from M2 [10−6, 10−4] 1/day/tick Assumed
ϵc Probability of co-transmission [0, 1] - -
ϵ1 Probability of dual transmission of V1 [0, 1] -
ϵ2 Probability of dual transmission of V2 [0,1] -
ν2 Death rate of T2 10−2 1/day [48]
νc Death rate of Tc 10−2 1/day [48]

2.3. Visualization of the basic reproduction number

We illustrate the dependence of R0 on the transmission parameters α1, β1 and γ1, Fig. 2, making use of (6), and the parameter values from Section 2.2. Lighter colours correspond to greater values of R0 (scale on right). Black lines represent a basic reproduction number equal to its critical value of 1. We set ΦH, ΦT, φ1, and μ to the values specified in Section 2.2, and set ν=102 per day (see Appendix A). We consider a different value of α1 in each panel: on the left, α1=106, in the middle α1=2×105, and on the right α1=104 (units as provided in Table 1). The corresponding values of RTT are RTT=1.2×102, RTT=0.4, and RTT=2. Along the x-axis and y-axis we vary γ1 and β1, respectively, from 0 to their maximum value listed in Table 1. We note that the area under the curve R0=1 becomes smaller as α1 increases (from left to right), until it becomes zero when co-feeding transmission contributes to make R0 greater than one on its own. As one would expect, smaller values of the transmission parameters α1, β1 and γ1 correspond to lower values of R0 (purple regions on the left and middle panels). Finally, we also note the symmetric role of β1 and γ1 in R0, as shown in (6).

Figure 2:

Figure 2:

Contribution of α1,β1 and γ1 to the basic reproduction number, R0, given by Eq. (6). Model parameters have been chosen as discussed in Section 2.2 and units for α1, β1 and γ1 as in Table 1. On the left, α1=106, in the middle α1=2×105, and on the right α1=104. The parameters γ1 and β1 are varied along the x-axis and y-axis, respectively, from 0 to their maximum value listed in Table 1. Black curves represent the critical value R0=1.

3. Two viral strains: tick population and co-feeding transmission

In the previous section, we have shown that co-feeding can sustain an infection among ticks without systemic transmission. The remainder of the paper will focus on the co-feeding route of transmission. We now move to the more complex case where multiple viral strains co-exist, introducing the notions of co-infection and co-transmission. The population of ticks can be infected by two different circulating viral strains, V1 and V2. V1 is considered to be the resident strain and V2 the invasive one (e.g., one that emerges once the tick population is endemic with V1). The population of ticks can be classified by its infection status in four different compartments, as susceptible and infected ticks with the resident strain, m0 and m1, respectively, and infected ticks with the invasive strain and co-infected (i.e., infected with both strains V1 and V2) ticks, m2 and mc, respectively. Figure 3a shows the mathematical model and the routes of viral transmission considered between different tick compartments. The model corresponds to the following system of ODEs:

dm0dt=Φν0m0m0λ1+λ2+λc,dm1dt=ν1m1+m0λ1m1λ2+λc,dm2dt=ν2m2+m0λ2m2λ1+λc,dmcdt=νcmc+m0λc+m1λ2+λc+m2λ1+λc, (8)

where we have introduced

λ1=α1m1+δ11ϵcmc,λ2=α2m2+δ21ϵcmc,λc=δ1+δ2ϵcmc, (9)

with ϵc[0,1] representing the probability of co-transmission (V1 and V2). We have assumed that the m1m2 population has transmission parameter α1α2 for V1V2, and the mc (co-infected) population has transmission parameter δ1 for V1 and δ2 for V2, respectively. We have also slightly abused notation by writing ΦT=Φ.

Figure 3:

Figure 3:

Illustrative diagrams of the mathematical models discussed in the paper for a population of co-feeding ticks with two viral strains. (a) Mathematical model of co-feeding transmission defined by Eq. (8). Transmission rates are defined in Eq. (9). (b) Within-host mathematical model of co-feeding transmission defined by Eq. (12). Transmission rates are defined in Eq. (9). (c) Alizon’s (generalised) proposal for co-infection and co-transmission described in Eq. (13). Transmission rates are defined in Eq. (14). (d) Two-slot mathematical model of co-infection and co-transmission defined in Eq. (15). Transmission rates are defined in Eq. (14) and Eq. (16).

3.1. Basic reproduction number

The mathematical model defined by the system of ODEs (8) has a virus-free equilibrium (VFE), m0,0,0,0, with m0=Φν0. To compute its basic reproduction number, we make use of the next-generation matrix method, as illustrated in detail in Section 2.1. The T and V matrices are given by

T=α1m00δ11ϵcm00α2m0δ21ϵcm000δ1+δ2ϵcm0,andV=ν1000ν2000νc.

Thus, by computing the eigenvalues of the next-generation matrix, K=T(V)1, the basic reproduction number of system (8) can be shown to be R0=maxR1,R2,Rc, with

R1=α1ν1m0,R2=α2ν2m0,Rc=δ1+δ2ϵcνcm0.

Following the results from Ref. [18, Proposition 2.1], we can explore the boundary equilibria of system (8):

  1. The virus-free equilibrium, E0=m0,0,0,0, always exists.

  2. The endemic equilibrium with V1,E1=ν1α1,(11R1)Φν1,0,0, exists if and only if R1>1.

  3. The endemic equilibrium with V2,E2=ν2α2,0,(11R2)Φν2,0, exists if and only if R2>1.

  4. The endemic equilibrium with co-infected ticks, Ec=νc(δ1+δ2)ϵc,0,0,(11Rc)Φνc, exists if and only if ϵc=1, and Rc>1.

3.2. Invasion reproduction number

We now assume that R1>1, so that the endemic equilibrium E1 of (8) exists. We write

m0=ν1α1,m1=11R1Φν1,

with E1=m0,m1,0,0. We aim to calculate the invasion reproduction number of V2 by means of the next-generation matrix method. To this end, we identify the invasive sub-system of V2 of Eq. (8), linearise it around E1, compute its Jacobian matrix, and define the 2 × 2 matrices T and V. We can write

Tα2m0δ21ϵcm0α2m1δ1+δ2ϵcm0+m1+δ21ϵcm1,andVα1m1ν20α1m1νc.

The next-generation matrix, K=T(V)1, is given by

KR22Rc2R2cRcc,

with the type reproduction numbers R22,R2c,Rc2, and Rcc given by

R22=α2m0α1m1+ν2+α1m1α1m1+ν2δ21ϵcm0νc,Rc2=δ21ϵcm0νc,R2c=α2m1α1m1+ν2+α1m1α1m1+ν2δ1+δ2ϵcm0+m1+δ21ϵcm1νc,Rcc=δ1+δ2ϵcm0+m1+δ21ϵcm1νc.

The eigenvalues of K are solutions of the following quadratic equation

λ2R22+Rccλ+R22RccRc2R2c=0.

The invasion reproduction number, RI, is the largest eigenvalue of K, i.e.,

RI=R22+Rcc+R22+Rcc24R22RccRc2R2c2. (10)

When RI>1, that is, R22+RccR22Rcc+Rc2R2c>1, V2 is able to invade a tick population where the resident strain V1 is endemic.

4. Alternative neutral models of co-feeding, co-infection, and co-transmission

The invasion reproduction number of the mathematical model from Section 3.2 is not neutral [23, 37]. By neutrality, we mean the following: in the limit when the invasive strain tends to the resident one, there should be no advantage for either strain, and thus, RI1. One can show for RI given by Eq. (10) that RI1. In fact, we have RI1 iff δ2=α11+R1, and RI1 iff δ2+δ1=α1R1, for ϵc=0 and ϵc=1, respectively, under the assumption that infection does not affect the death rate, i.e., ν0=ν1=ν2=νc. The issue of neutrality in co-infection models was brought up by Samuel Alizon in Ref. [37] and Lipsitch et al. in Ref. [35]. We now present five alternative neutral formulations of the previous model. The first (and less optimal) option for obtaining a neutral model is to force RI1 and in turn, consider the constraints this condition imposes on some of the model parameters. The second one, as proposed by us to Samuel Alizon in private communication, is to consider a normalised invasion reproduction number; that is, define RIN=RIlim21RI, where by lim21RI, we mean the value of the invasion reproduction number in the limit when the invasive strain tends to the resident one (see Section 4.1). The third one generalises the mathematical model (8) by introducing the idea of within-host probability of invasion (see Section 4.2). The fourth one, as proposed by Alizon [37], is to consider a more general class of models, with doubly infected individuals (see Section 4.3). A final one that we propose in Section 4.4, is a generalisation of the approach of Alizon [23, 37], which clearly articulates the issue of co-transmission.

4.1. A normalised invasion reproduction number

The invasion reproduction number given by Eq. (10) is not neutral. Let us then define a normalised invasion reproduction number, RIN, as follows

RIN=RIlim21RI, (11)

where lim21 means ν2ν1, α2α1, and δ2δ1 for our co-infection model (see Eq. (8)). So defined, it is clear that lim21RIN=1, which is the desired neutrality condition. We note that the condition for the invasive strain to have the potential to become established is RI>1. Now that we have introduced a normalised invasion reproduction number, this condition becomes RIN>lim21RI1.

4.2. A model with within-host invasion

The fitness advantage of the invasive strain in model (8) stems from the assumption that V2 can infect susceptible ticks and infected ticks by the resident strain with the same rate. However, this may not be realistic. For instance, a small amount of transmitted (invasive) virus may be less likely to establish infection in a tick that already has a high resident viral load, compared to a fully susceptible tick. The probability of within-host invasion will, thus, depend on the relative within-host fitnesses of the invasive and resident strains. Therefore, we can adapt the previous model (Eq. (8)) by introducing the parameter ϕij, which is the probability that strain i can establish co-infection in a tick already infected by strain j, given that there is transmission of strain i via co-feeding. This is similar to the super-infection framework described by Alizon in Ref. [36]. The model can then be described by the following system of ODEs:

dm0dt=Φν0m0m0λ1+λ2+λc,dm1dt=ν1m1+m0λ1m1ϕ21λ2+λc,dm2dt=ν2m2+m0λ2m2ϕ12λ1+λc,dmcdt=νcmc+m0λc+m1ϕ21λ2+λc+m2ϕ12λ1+λc, (12)

where λ1, λ2 and λc are defined by Eq. (9). The transmission events of this model are summarised in Fig. 3b. In Appendix B we show that the invasion reproduction number for this model satisfies the desired neutrality condition.

4.3. A generalisation of Alizon’s proposal

The mathematical model proposed by Alizon in Ref. [37] to obtain a neutral invasion reproduction number requires two additional populations (see Fig. 3c), namely the populations of doubly infected ticks with either V1 or V2, denoted by M1 and M2, respectively. Thus, there are six different tick compartments: m0, susceptible ticks, m1, m2, ticks (singly) infected with either V1 or V2, M1, M2, doubly infected ticks with either V1 or V2, and mc, co-infected ticks with both V1 and V2. We note that the co-infection models in Ref. [23] do not consider co-transmission, but it is discussed in Ref. [37]. Thus, in what follows, and to develop a mathematical model of co-infection and co-transmission in co-feeding ticks, we explain in detail what happens when a co-infected tick transmits virus to a singly infected tick. If co-transmission of both, resident and invasive, strains occurs, the singly infected tick can only acquire one new viral strain, since the mathematical model does not accommodate triply infected ticks. Therefore, if co-transmission takes place, a singly infected tick will acquire V1 with probability δ1δ1+δ2, or V2 with probability δ2δ1+δ2. Hence, the overall rate at which a co-infected tick transmits V1 to a singly infected tick is 1ϵcδ1+δ1+δ2ϵcδ1δ1+δ2=δ1, where the first term represents transmission of V1 if no co-transmission, and the second term represents transmission of V1 in the event of co-transmission. Similarly, the overall rate a co-infected tick transmits V2 to a singly infected tick is δ2. We now write down the system of ODEs for Alizon’s generalised mathematical model of a co-feeding tick population, with two circulating viral strains, which allows for co-infection and co-tranmission, and at most doubly infected ticks (with the same strain M1 and M2, or with different ones mc). We have

dm0dt=Φν0m0m0λ1+λ2+λ1,c+λ2,c+Λ1+Λ2,dm1dt=ν1m1+m0λ1m1λ1+λ2+λ1,c+λ2,c+Λ1+Λ2,dm2dt=ν2m2+m0λ2m2λ1+λ2+λ1,c+λ2,c+Λ1+Λ2,dmcdt=νcmc+m0λ1,c+λ2,c+m1λ2+λ2,c+Λ2+m2λ1+λ1,c+Λ1,dM1dt=v1M1+m0Λ1+m1λ1+λ1,c+Λ1,dM2dt=v2M2+m0Λ2+m2λ2+λ2,c+Λ2, (13)

where we define

λ1=α1m1+δ11ϵcmc+2κ11ϵ1M1,λ2=α2m2+δ21ϵcmc+2κ21ϵ2M2,λ1,c=δ1ϵcmc,λ2,c=δ2ϵcmc,Λ1=2κ1ϵ1M1,Λ2=2κ2ϵ2M2, (14)

with ϵc, the probability of co-transmission of the two viral strains by a co-infected mc tick, and with ϵ1ϵ2 the probability of co-transmission by a doubly infected tick M1M2, respectively. The original model of co-infection with co-transmission defined in Ref. 37] assumed ϵ1=ϵ2=ϵc=ϵ. We warn the reader that we have defined λ1 and λ2 to mean two different things in Eq. (14) and Eq. (9). We shall always clarify in what follows, which of the two definitions is implied. Fig. 3c shows the transmission events described by Eq. (13). We note that co-transmission by the M1 tick population to a susceptible tick implies double transmission of the resident viral strain V1, and that co-transmission by the M2 tick population (to a susceptible tick) implies double transmission of the resident strain V2. Finally, the parameter κ1κ2 is the rate of transmission of a single copy of V1V2 from an M1M2 tick to a susceptible one; thus, the factor of 2 in the previous expression for Λ1Λ2. We remind the reader that the model defined above includes death, immigration and transmission events. We have assumed each tick compartment has a different death rate, and immigration replenishes the susceptible tick compartment. In Appendix C we carefully derive the invasion reproduction number of this model and show its neutrality.

4.4. Two-slot model of co-feeding, co-infection and co-transmission

In the model defined by Eq. (13), a co-transmission event from a co-infected tick, in the mc compartment, to a susceptible tick implies the transmission of both viral strains at once. Here we extend the previous model to allow for the possibility that such a co-transmission event could instead result in the transmission of two copies of V1 or two copies of V2. The idea of this generalised two-slot model is as follows: since ticks can be at most doubly infected, we assume each tick has two infection slots that can be occupied (or not). In the previous model, “co-transmission” to a susceptible tick meant transmission of both viral strains. In this model “co-transmission” means occupying both slots, in such a way, that the slots can be occupied by two copies of the same virus (leading to M1 or M2 ticks), or two different strains (leading to mc ticks). The dynamics of the two-slot model can be written as

dm0dt=Φν0m0m0λ1+λ2+λ1,c+λ2,c+Λ1+Λ2,dm1dt=ν1m1+m0λ1m1λ1+λ2+λ1,c+λ2,c+Λ1+Λ2,dm2dt=ν2m2+m0λ2m2λ1+λ2+λ1,c+λ2,c+Λ1+Λ2,dmcdt=νcmc+m0Λc+m1λ2+λ2,c+Λ2+m2λ1+λ1,c+Λ1,dM1dt=v1M1+m0Λ1+δ1δ1+δ2λ1,c+m1λ1+λ1,c+Λ1,dM2dt=v2M2+m0Λ2+δ2δ1+δ2λ2,c+m2λ2+λ2,c+Λ2, (15)

where λ1, λ2, λ1,c, λ1,c, Λ1, and Λ2 have been defined in Eq. (13), and with Λc given by

Λc=2δ1δ2δ1+δ2ϵcmc. (16)

In Appendix D we describe in great detail the transmission events considered in the two-slot mathematical model, show the existence of an endemic equilibrium for V1, and prove that the model leads to a neutral invasion reproduction number.

4.5. Numerical study of the invasion reproduction number

In Section 3 we have defined and computed the invasion reproduction number for a mathematical model of co-infection and co-transmission in co-feeding ticks. We have argued that such a model is not neutral, and have in turn proposed different mathematical models which do not suffer from such problem. We now propose a numerical study of the invasion reproduction number for the “not-neutral” model introduced in Section 3, as well as the invasion reproduction number for the model solutions proposed above to guarantee neutrality.

In what follows we assume that κ1=α12, and κ2=α22, which are appropriate choices when considering viral infections or micro-parasites [37]. As discussed by Alizon in Ref. [37], if an infected host (by a certain viral strain) is re-infected by the exact same strain, we do not expect to see a change in its viral load (and hence in transmission rate). For co-infected ticks in the mc compartment (and infected by both V1 and V2), it is reasonable to hypothesise that potential within-tick interactions between the two strains do not lead to a change in transmission rates, when compared to doubly infected ticks in the M1 or M2 compartments. Thus, we assume δ1=κ1 and δ2=κ2. Finally, and as justified earlier, we set ν0=ν1=ν2=νc=v1=v2=102 per day. We also fix the immigration rate to be Φ=2 ticks per day, and α1=104 per tick per day. These choices lead to a basic reproduction number of R1=2 for the resident strain, V1.

In Fig. 4 we compare how different values of the transmission parameter, α2, and the co-transmission probability, ϵc, affect the invasion reproduction number, RI, computed in the “not-neutral” scenario (10) (panel (a)), in the normalized proposal of Eq. (11) (panel (a)), in the within-host model (12) (panel (b)), in Alizon’s model with co-transmission (13) (panel (c)), and in the two-slot mathematical model (15) (panel (d)). In particular, ϵc is varied along the x-axis, whereas the ratio α2α1 is varied from 0.5 to 1.5 along the y-axis. Black lines mark the contours where the invasion reproduction number, RI, is equal to 1. For Alizon’s model and the two-slot extension, we have set ϵ1=ϵ2=12. For the within-host model, we define the probability that strain i can establish co-infection in a tick already infected by strain j as follows

ϕij=1,ifαi>αj,0,ifαiαj.

Figure 4:

Figure 4:

Heatmaps of the invasion reproduction number for (a) the “not-neutral” model (10), (a) the normalised proposal (11), (b) the within-host model with ϕij, Eq. (12), (c) Alizon’s model with co-transmission (13), and (d) the two-slot mathematical model (15). The x-axis represents ϵc, the probability of co-transmission from co-infected ticks. The y-axis shows the ratio α2/α1 in the range [0.5, 1.5]. We set α1=104 per tick per day. Black lines mark the contours where the invasion reproduction number, RI, is equal to 1. For Alizon’s model and the two-slot extension, we have set ϵ1=ϵ2=1/2.

We note that the highest values of the invasion reproduction number occur in panel (a) and (b) of Fig. 4. In panel (a), the invasion reproduction number is clearly not neutral, since RI>1 when α2=α1, and also for some regions of parameter space with α2<α1. For this model, if infected ticks with the invasive strain, V2, are rare compared to ticks infected with the resident strain, V1, then V2 has an initial advantage over V1. Each tick infected with the invasive strain has the opportunity to infect a much larger number of ticks (m0+m1), than those which can be infected by a tick from the m1 compartment. This allows V2 to invade the V1 endemic system, for large enough values of α2 and ϵc. The co-transmission probability, ϵc, affects the value of RI, since it changes the rate at which co-infected ticks transmit V1 and V2 to susceptible ticks, m0. These rates are δ1+ϵcδ2 and δ2+ϵcδ1, respectively. Therefore a higher probability of co-transmission enables both strains to be transmitted more often. For the normalised invasion reproduction number in panel (a), RI=1 when α2=α1, for every value of ϵc, given its definition. When α2α1, RI does depend on ϵc, but less so than for the model of panel (a), since lim21RI increases with ϵc. In panel (c), showing the invasion reproduction number for Alizon's model, when ϵc=12 (equal to ϵ1 and ϵ2), RI=1 for α2=α1. As ϵc increases, so does the value of RI, since a higher co-transmission probability enables V2 to be transmitted along with V1 more often. The invasion reproduction number of the two-slot model in panel (d) behaves in a similar fashion. However, increasing ϵc does not give as much of an advantage to the invasive strain, since co-transmission events can result in the transmission of two copies of V1.

5. Discussion and conclusions

In this paper, we consider the role of different transmission routes for a single vector-borne virus in a population of ticks and vertebrate hosts. We then study co-infection and co-transmission of two circulating vector-borne viral strains in a population of co-feeding ticks. We define and compute both the basic reproduction number and the invasion reproduction number, which provides the conditions under which a new variant can emerge (possibly endogenously from genomic reassortment). We illustrate how a classic and intuitive model of invasion was not, in fact, neutral with respect to the invading strain; that is, using this model to understand, for example, the minimum selective advantage that needs to be present for a invading strain to take hold of an endemic population (with the resident one) will privilege one strain over the other. This is not a problem per se, as it might be the correct model from a mechanistic perspective. However, it is important to characterise the underlying properties of a mathematical model, especially if it is intended to be used as part of an inference procedure. We also presented several alternative formulations of co-infection and co-transmission models that are, by definition neutral. We have shown that each model has distinct and specific behaviour concerning the invasion reproduction number. The take-home message of this review is that the assumptions used to model these important and complex infection systems matter, specially when making inferences about pathogens of potential pandemic emergence. In the real world, the choice of model, from the different alternatives presented and discussed here, will clearly depend on the virus, as well as the immunology and ecology of the hosts those viruses infect.

In conclusion, we note that while we have focused on deterministic models of tick-borne disease transmission, stochastic analogous may be considered instead, particularly when studying the invasion potential of a rare circulating viral strain [15, 51, 52]. In a stochastic framework, the reproduction number is defined as a random variable rather than as an average [53], since its distribution encodes the probability of an epidemic occurring if a pathogen is introduced into a fully susceptible population by a small number of infected individuals [53]. Thus, future work should include a study of the invasion reproduction number probability distribution, as well as an exploration of the issue of non-neutrality making use of stochastic approaches [54]. Finally, given recent reports which indicate an increase in the number of Zika and Dengue virus co-infection cases in expanding co-endemic regions [55], it is of utmost importance to have suitable within-host mathematical models to study the impact of co-infection on viral infection dynamics.

Highlights.

  • We introduce a mathematical model of a single vector-borne virus in a population of ticks and hosts, with three different transmission routes, and derive its basic reproduction number.

  • We study the dynamics of two different co-circulating viruses, or viral strains, in a tick population making use of a classic co-infection model.

  • After performing an invasion analysis, we compute the invasion reproduction number, explain the issue of its non-neutrality, and propose five neutral alternatives.

  • We conclude the paper with a summary of our proposals, their applicability and limitations.

Acknowledegements

We thank Dr. Jonathan Carruthers (UKHSA) for preparing Figure 1, and Dr. Macauley Locke (LANL) for research discussions on model development and parameterisation.

Funding

This work was supported by the Biotechnology and Biological Sciences Research Council Research Council [grant number BB/W010755/1] (B.W., Z.V., M.L.-G., and G.L.). This study was supported by the National Institutes of Health/National Institute of Allergy and Infectious Diseases grant R01AI087520 to T.L., and grant R01AI167048 to E.R.-S., T.L. and C.M.-P. This project has received funding from the European Union’s Horizon 2020 research and innovation program under the Marie Sk∤odowska-Curie Grant, agreement number 764698 (G.B., G.L. and C.M.-P.). Y.L.’s research was partially supported by the NSF of China [12071393].

Appendix A. Parameters from network approach

Since CCHFV infection is asymptomatic in ticks and vertebrate hosts, we assume that it does not affect their death rates; that is, μ0=μ1μ and ν0=ν1ν. Moreover, for the purposes of this section, we fix the values of some parameters within the ranges in Table 1 as follows: ΦH=1 host per day, ΦT=2 ticks per day, φ1=1/6 per day, and μ=103 per day. We now derive plausible ranges for the other model parameters making use of the results from Ref. [48]. From Ref. [48, Equation (19)], we identify

RTT=σνlnkout=α1ΦTν0ν1.

From Ref. [48] kout=ΦTν, with kout=2×102, from which we obtain ν=102 per day, given the fixed value of ΦT. Ref. [48 also provides the following values: σ=0.1 and νln=2.4×103 or νln=2×102 depending on the disease [48, Table 2]. Thus, we derive α1=σνlnν, so that we conclude α1=2.4×106 or α1=2×105 per day per tick, respectively. From here, we assume values of α1 in the interval [10−6, 10−4].

We now turn to the transmission parameters (tick-to-host) β1 and (host-to-tick) γ1. From Ref. [48, Equations (6) and (7)], we have

RTH=σνhn=β1ΦHμ0ν1,RHT=νlhkout=γ1ΦTν0μ1+φ1.

Thus, we can write β1=σμννhn106, from which we define a plausible range for β1 as [10−7, 10−5]. Finally, γ1=νlhμ+φ1. As the value of νlh depends on the disease (it is either νlh=1.9×103 or νlh=7.3×102), we consider the interval [10−5, 10−2] for γ1.

Appendix B. Within-host invasion model

Following the same steps as those provided in Section 3.2, the next-generation matrix for the within-host invasion model is given by

Kb11b12b21b22,

where

b11=α2m0α1ϕ12m1+ν2+α1ϕ12m1α1ϕ12m1+ν2δ21ϵcm0νc,
b12=δ21ϵcm0νc,
b21=α2ϕ21m1α1ϕ12m1+ν2+α1ϕ12m1α1ϕ12m1+ν2δ1+δ2ϵcm0+ϕ21m1+δ21ϵcϕ21m1νc,
b22=δ1+δ2ϵcm0+ϕ21m1+δ21ϵcϕ21m1νc.

When considering neutrality (i.e., the invasive strain is the same as the resident strain), all infected tick populations (m1, m2, and mc) are infected with the same viral strain. Thus, we have ν2=νc=ν1 and α2=α1. We also set δ1=δ2=α12, representing that ticks in the mc compartment will transmit virus at the same overall rate as ticks in the m1 compartment (i.e., δ1+δ2=α1). Furthermore, we would expect ϕ12=ϕ21=0, since in the within-host environment (a tick) the transmitted strain is likely to be rare compared to the established strain and if the resident strain is the same as the invasive strain, then both strains have the same within-host fitness, implying that the rare transmitted strain will have no within-host advantage over the established strain, and will be unable to establish co-infection in the host (tick). With these limits, the elements of the next-generation matrix become

b11=α1m0ν1,
b12=α11ϵcm02ν1,
b21=0,
b22=α1ϵcm0ν1.

The eigenvalues are then b11 and b22, which are equal to 1 and ϵc, respectively, since m0=ν1α1. Thus, we can conclude that RI=1, given ϵc[0,1].

Appendix C. Alizon’s proposal

Alizon [37] proposed a model with doubly infected hosts (with the same viral strain), and which seemed a sufficient approach to achieve neutrality. We have considered a generalisation of the model originally proposed in Ref. [37], and which is described by the ODE system (13). By setting dm0dt=dm1dt=dM1dt=0, and m2=mc=M2=0, one obtains the endemic equilibrium for the resident strain E~1=m~0,m~1,0,0,M~1,0. We then compute the invasion reproduction number of the invasive strain by considering the invasive sub-system, linearised around the resident strain endemic equilibrium, E~1:

dm2dt=ν2m2+m~0λ2m2(α1m~1+2κ1M~1),
dmcdt=νcmc+m~0λ1,c+λ2,c+m~1λ2+λ2,c+Λ2+m2(α1m~1+2κ1M~1),
dM2dt=v2M2+m~0Λ2.

The Jacobian matrix of the invasive sub-system is

J˜ν2+m˜0α2(α1m˜1+2κ1M˜1)m˜0δ2(1ϵc)2m˜0κ21ϵ2m˜1α2+α1m˜1+2κ1M˜1νc+m˜0δ1+δ2ϵc+m˜1δ22m˜1κ200v2+2m˜0κ2ϵ2,

and can be decomposed as follows

T~m~0α2m~0δ21ϵc2m~0κ21ϵ2m~1α2m~0δ1+δ2ϵc+m~1δ22m~1κ2002m~0κ2ϵ2,andV~ν2(α1m~1+2κ1M~1)00α1m~1+2κ1M~1νc000v2.

Finally, the next-generation matrix, KT~[V~]1, is given by

KABCDEFGHI,

where

A=α2m~0ν2+α1m~1+2κ1M~1+α1m~1+2κ1M~1ν2+α1m~1+2κ1M~1δ21ϵcm~0νc,
B=δ21ϵcm~0νc,
C=2κ21ϵ2m~0v2,
D=α2m~1ν2+α1m~1+2κ1M~1+α1m~1+2κ1M~1ν2+α1m~1+2κ1M~1δ1+δ2ϵcm~0+δ2m~1νc,
E=δ1+δ2ϵcm~0+δ2m~1νc,
F=2κ2m~1v2,
G=0,
H=0,
I=2κ2ϵ2m~0v2.

The invasion reproduction number, RI, is given by the largest eigenvalue of K. One eigenvalue is given by the matrix element I. The other eigenvalues are those of the sub-matrix

K2×2ABDE,

with the largest of the two given by

RI=(A+E)+(A+E)24(AEBD)2.

Appendix C.1. Proof of neutrality

When considering neutrality (i.e., the invasive strain is the same as the resident strain), we set ν2=ν1=ν, v2=v1=v, α2=α1=α, δ2=κ2=δ1=κ1=κ, and ϵc=ϵ2=ϵ1=ϵ. Here we will show that under these neutrality conditions, RI=1, for the particular case where ν0=v=ν and κ=α/2. We make the simplifying assumption that infection does not affect the death rates since infection with CCHFV is asymptomatic in its animal hosts. The assumption that κ=α/2 is realistic because we are considering viral infection. As Alizon mentioned in Ref. [37], if a host infected by a given strain is re-infected by the exact same strain, we do not expect to see a change in viral load (and hence in transmission rate); that is, a singly infected tick can become doubly infected with the same strain in this model, but becoming doubly infected does not affect its viral load. Under these conditions, the endemic equilibrium for the resident strain satisfies

m~0+m~1+M~1=Φν, (C.1)

with

m~0=να, (C.2)
m~1=m~0(1ϵ)αΦν2αΦν2ϵ. (C.3)

Hence, we have

ν+α(m~1+M~1)=αΦν. (C.4)

Making use of Eqs. (C.1), (C.2), and (C.4), the relevant elements of the next-generation matrix simplify to

A=αm~0ν+α(m~1+M~1)+α(m~1+M~1)ν+α(m~1+M~1)α(1ϵ)m~02ν,=1Φνm~0+12ν(1ϵ)Φνm~0,
B=α(1ϵ)m~02ν=12(1ϵ),
D=αm~1ν+α(m~1+M~1)+α(m~1+M~1)ν+α(m~1+M~1)αϵm~0+12αm~1ν,=1Φνm~1+νϵ+α2νm~1Φνm~0,
E=αϵm~0+12αm~1ν=ϵ+α2νm~1,
I=αϵm~0ν=ϵ.

Since I=ϵ1, we need to show that

RI=(A+E)+(A+E)24(AEBD)2=1.

It can be shown that this is true if and only if

A+E(AEBD)=1. (C.5)

Thus, in order to show that RI=1, it is sufficient to show that Eq. (C.5) holds. We have,

AEBD=1Φϵνm~0+12m~1.

Thus, we can write

A+E(AEBD)=1Φνm~0+12ν(1ϵ)Φνm~0+Φϵ+αΦ2νm~1ϵνm~0+12m~1,=1Φ12νm~0(1ϵ)+Φ2(1+ϵ)+12νm~1(αΦν2ϵ).

Substituting m~1 with its expression from Eq. (C.3) gives

A+EAEBD=1ΦαΦ2νm~01ϵ+Φ21+ϵ.

Finally, by substituting Eq. (C.2) in the previous equation, we have

A+E(AEBD)=1.

Appendix D. The two-slot model of co-infection and co-transmission

Appendix D.1. Transmission events

We list here the transmission events which lead to the two-slot mathematical model introduced in Eq. (15) grouped by the type of transmission. T0 denotes a susceptible tick, T1 and T2 denote a singly infected tick with V1 and V2, respectively, T11 and T22 denote a doubly infected tick with V1 and V2, respectively, and Tc denotes a co-infected tick (with V1 and V2).

  • Transmission from a singly infected tick to a susceptible tick:

    T0+T1T1+T1 with rate α1m0m1,

    T0+T2T2+T2 with rate α2m0m2.

  • Transmission from a singly infected tick to a singly infected tick:

    T1+T1T11+T1 with rate α1m1m1,

    T1+T2Tc+T2 with rate α2m1m2,

    T2+T1Tc+T1 with rate α1m2m1,

    T2+T2T22+T2 with rate α2m2m2.

  • Transmission from a doubly infected tick to a susceptible tick:

    T0+T11T1+T11 with rate 1ϵ12κ1m0M1,

    T0+T11T11+T11 with rate ϵ12κ1m0M1.

    T0+T22T2+T22 with rate 1ϵ22κ2m0M2,

    T0+T22T22+T22 with rate ϵ22κ2m0M2.

  • Transmission from a co-infected tick to a susceptible tick:

    T0+TcT1+Tc with rate 1ϵcδ1m0mc,

    T0+TcT2+Tc with rate 1ϵcδ2m0mc,

    T0+TcTc+Tc with rate 2δ1δ2δ1+δ2ϵcm0mc,

    T0+TcT11+Tc with rate δ12δ1+δ2ϵcm0mc,

    T0+TcT22+Tc with rate δ22δ1+δ2ϵcm0mc.

  • Transmission from a co-infected tick to a singly infected tick:

    T1+TcT11+Tc with rate δ1m1mc,

    T1+TcTc+Tc with rate δ2m1mc.

    T2+TcT22+Tc with rate δ2m2mc,

    T2+TcTc+Tc with rate δ1m2mc.

  • Transmission from a doubly infected tick to a singly infected tick:

    T1+T11T11+T11 with rate 2κ1m1M1,

    T2+T22T22+T22 with rate 2κ2m2M2,

    T1+T22Tc+T22 with rate 2κ2m1M2,

    T2+T11Tc+T11 with rate 2κ1m2M1.

Appendix D.2. Existence of the endemic equilibrium of V1

In Appendix C.1 we have shown the endemic equilibrium (EE) of V1 can be written as E~1=(m~0,m~1,0,0,M~1,0). We have also shown the neutrality of the invasion reproduction number in Alizon’s model under the assumption κ=α/2. This assumption simplifies the next-generation matrix and helps to prove neutrality. Our two-slot model, as an extension of Alizon’s model, shares the same resident strain EE. In this section, we will discuss the existence of the resident strain EE when κα/2, referring to Appendix C.1 for the case κ=α/2. We, thus, write the EE as E1=m0,m1,0,0,M1,0. We then compute the invasion reproduction number R1 and prove the neutrality in Appendix D.3 and Appendix D.4, respectively.

First, we consider the resident sub-system, where m2=mC=M2=0 and assume ν0=ν1=ν2=νc=v1=v2=ν, without loss of generality. We have

dm0dt=Φνm0α1m1+2κ1M1m0,dm1dt=νm1α1m1+2κ1M1m1+α1m1+2κ11ϵ1M1m0,dM1dt=νM1+α1m1+2κ1M1m1+2ϵ1κ1M1m0. (D.1)

We compute the basic reproduction number of this sub-system at the VFE

E0=m0,0,0,0,0,0, where m0=Φν. We can write

R1=maxΦα1ν2,2Φϵ1κ1ν2. (D.2)

By setting dm1+M1dt=0 and dm0dt=0, we obtain the following equations:

α1m1+2κ1M1=m1+M1νm0, (D.3)
m1+M1=Φνm0. (D.4)

From Eq. (D.4), we have m0<Φν to ensure positive m1 and M1. By combining Eqs. (D.3) and (D.4), we then get

α1m1+2κ1M1=Φm0ν. (D.5)

By solving Eq. (D.4) and Eq. (D.5), one obtains

m1=Φνm02κ1α11m0α1ν,andM1=Φνm0α12κ11m02κ1ν. (D.6)

We conclude that to ensure positive values for m1 and M1, we require the following conditions:

  • if α1>2κ1, να1<m0<ν2κ1, or

  • if α1<2κ1, ν2κ1<m0<να1.

If 2κ1=α1, we refer to Appendix C.1. Substituting Eqs. (D.5) and (D.6) into dM1dt=0, we derive the following cubic equation for m0:

Qm0=A3m03+A2m02+A1m0+A0=0,

where A3=2κ1ϵ1α1, A2=2κ1ϵ1ν2κ1ν+α1ν, A1=2Φκ1, and A0=Φν. It is easy to observe that A3<0,Q(0)<0, and Q(0)>0. We therefore have one negative root for Qm0=0 and two critical points (i.e., where Qm0=0) distributed at different sides of the y-axis. From Eqs. (D.4) and (D.6), we have three important values for m0:Φν,να1, and ν2κ1.

We then have the following values:

QΦν=Φν1Φν2κ1ϵ1νΦνα1ν1,
Qνα1=ν2Φννα12κ1α11,
Qν2κ1=ν32κ1α12κ111ϵ1.

We can now discuss the existence of a real and positive m0, when R1>1 and 0ϵ11. We need to consider the following cases:

  1. when 2κ1ϵ1Φν21<α1Φν2, then R1=α1Φν2, QΦν0 and να1<Φν, ν2κ1ϵ1Φν. We need to consider two separate cases:
    1. if α1>2κ1, that is, να1<m0<ν2κ1, then Qνα1<0, and Qν2κ10. We thus have a unique solution for Qm0=0 on να1,minν2κ1,Φν.
    2. if α1<2κ1, that is, ν2κ1<m0<να1 and 2κ1ϵ1<α1<2κ1, then Qνα1>0 and Qν2κ10. We thus have a unique solution on ν2κ1,να1.
  2. when α1Φν21<2κ1ϵ1Φν2, then R1=2κ1ϵ1Φν2, α1<2κ1ϵ1<2κ1, ν2κ1<ϵ1Φν, and να1Φν, since α1<2κ1; that is, ν2κ1<m0<να1. Then we can further constrain the solution to ν2κ1<m0<Φν, and we have Qν2κ10, and QΦν>0. Thus a unique solution can be found on ν2κ1,Φν.

  3. when α1Φν2>1 and 2κ1ϵ1Φν2>1, then να1<Φν, ν2κ1<ϵ1Φν, and QΦν<0. We need to consider two different cases:
    1. if α1>2κ1, that is να1<m0<ν2κ1, then Qνα1<0 and Qν2κ10. We thus have a unique solution on να1,ν2κ1.
    2. if α1<2κ1, that is ν2κ1<m0<να1, then Qνα1>0 and Qν2κ10. We thus have a unique solution on ν2κ1,να1.

Therefore, when R1>1 and 0ϵ11, a unique real and non-negative solution of E1=m0,m1,0,0,M1,0 is guaranteed. We can ensure three real roots (i.e., one negative and two positive roots) for Qm0=0, such that we identify the value of m0 which is real and positive, with m1 and M1 real and positive as well. To do so we make use of the general formula for a cubic equation (with A30) [56]:

m0=13A3A2+Δ+Δ0Δ, (D.7)

with

Δ0=A223A1A3Δ1=2A239A1A2A3+27A0A32Δ=1+322Δ1+Δ124Δ0321/3.

We note that m0 is real even though Δ is a complex number. Another expression for the solution of m0 making use of trigonometric functions can be found in Ref. [57]

Appendix D.3. Invasion reproduction number

We can now compute the invasion reproduction number, RI, of V2 for the invasion sub-system, linearised around the endemic equilibrium E1. We have the following Jacobian matrix:

Jνα1m1+α2m02κ1M1δ21ϵcm02κ21ϵ2m0α1+α2m1+2κ1M1ν+δ22δ1ϵcδ1+δ2m0+m12κ2m10δ22ϵcδ1+δ2m0ν+2ϵ2κ2m0,

which can be decomposed as follows

Tα2m0δ21ϵcm02κ21ϵ2m0α2m1δ22δ1ϵcδ1+δ2m0+m12κ2m10δ22ϵcδ1+δ2m02ϵ2κ2m0,

and

Vνα1m12κ1M100α1m1+2κ1M1ν000ν.

We can compute the next-generation matrix, K=TV1, given by:

Kd11d12d13d21d22d23d31d32d33,

where

d11=α2m0+δ21ϵcm1+M1Φm0,
d12=δ2ν1ϵcm0,
d13=2κ2ν1ϵ2m0,
d21=α2Φm0m1+δ2Φ2δ1ϵcδ1+δ2m0+m1m1+M1,
d22=δ2ν2ϵcδ1δ1+δ2m0+m1,
d23=2κ2νm1,
d31=δ2Φϵcδ2δ1+δ2m0m1+M1,
d32=δ2νϵcδ2δ1+δ2m0,
d33=2ϵ2κ2νm0.

We can obtain the invasion reproduction number, RI, as a function of m0 by substituting Eq. (D.6) into K and computing its largest eigenvalue.

Appendix D.4. Proof of neutrality

We consider the following limits: α1,α2α,κ1,κ2,δ1,δ2κ,andϵ1,ϵ2,ϵcϵ. In this limit, we can write the invasion reproduction number, RI, at neutrality as follows:

RI=m02νΦΦαϵm02{2Φ2κ+Φν(α2κ(1ϵ))m0Φαϵκ(1+ϵ)m02αϵν(ακ(1ϵ))m03+4Φαϵκνm0Φαϵm02Φ(3+ϵ)+m0ν(1ϵ)+2αϵm0+2Φ2κ+m0(Φν(α2κ(1ϵ))ϵαm0(1+ϵ)Φκ+νm0(α(1ϵ)κ)21/2. (D.8)

Now we can prove the neutrality of RI in two scenarios:

  1. when κ=α/2, the expression for RI reduces to
    RI=αm02ΦΦ+ϵνm0ϵα(1+ϵ)Φ+νm0m024ΦνΦϵαm02+αm0ϵm02ϵαm0+(1ϵ)νm0(3ϵ)Φ2νΦΦϵαm02+2Φ2+ϵm02Φναm0(1+ϵ)Φ+νm04ΦνΦϵαm0221/2.

    By substituting m0=m~0=ν/α as in Eq. (C.2), we obtain RI1, as desired.

  2. when κα/2, the expression for RI cannot be easily simplified. In this case, we perform a numerical study, making use of Mathematica to prove neutrality, which requires the expression of m0 from Eq. (D.7).

Data availability statement

Numerical codes (Python) to reproduce Figure 2 and Figure 4, as well as the Mathematica notebook to reproduce proofs and results from Appendix D, are deposited at https://github.com/MolEvolEpid/coinfection_cotransmission_cofeeding_in_ticks.

References

  • [1].McDonald S. M., Nelson M. I., Turner P. E., Patton J. T., Reassortment in segmented RNA viruses: mechanisms and outcomes, Nature Reviews Microbiology 14 (7) (2016) 448–460. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [2].Pérez-Losada M., Arenas M., Galán J. C., Palero F., González-Candelas F., Recombination in viruses: mechanisms, methods of study, and evolutionary consequences, Infection, Genetics and Evolution 30 (2015) 296–307. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [3].Negredo A., Sánchez-Arroyo R., Díez-Fuertes F., De Ory F., Budiño M. A., Vázquez A., Garcinuño Á., Hernández L., de C. la Hoz González, A. Gutiérrez-Arroyo, et al. , Fatal case of Crimean-Congo hemorrhagic fever caused by reassortant virus, Spain, 2018, Emerging Infectious Diseases 27 (4) (2021) 1211. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [4].Gerrard S. R., Li L., Barrett A. D., Nichol S. T., Ngari virus is a Bunyamwera virus reassortant that can be associated with large outbreaks of hemorrhagic fever in Africa, Journal of virology 78 (16) (2004) 8922–8926. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [5].Cline T. D., Karlsson E. A., Freiden P., Seufzer B. J., Rehg J. E., Webby R. J., Schultz-Cherry S., Increased pathogenicity of a reassortant 2009 pandemic H1N1 influenza virus containing an H5N1 hemagglutinin, Journal of virology 85 (23) (2011) 12262–12270. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [6].https://www.who.int/blueprint/en/.
  • [7].Portillo A., Palomar A. M., Santibáñez P., Oteo J. A., Epidemiological aspects of Crimean-Congo hemorrhagic fever in Western Europe: what about the future?, Microorganisms 9 (3) (2021) 649. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [8].Fanelli A., Buonavoglia D., Risk of Crimean-Congo haemorrhagic fever virus introduction and spread in CCHF-free countries in Southern and Western Europe: A semi-quantitative risk assessment, One Health 13 (2021) 100290. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [9].Mosquera J., Adler F. R., Evolution of virulence: a unified framework for co-infection and super-infection, Journal of Theoretical Biology 195 (3) (1998) 293–313. [DOI] [PubMed] [Google Scholar]
  • [10].Allen L. J., Kirupaharan N., Asymptotic dynamics of deterministic and stochastic epidemic models with multiple pathogens, International Journal of Numerical Analysis and Modeling 2 (3) (2005) 329–344. [Google Scholar]
  • [11].Zhang X.-S., De Angelis D., White P. J., Charlett A., Pebody R. G., McCauley J., Co-circulation of influenza a virus strains and emergence of pandemic via reassortment: the role of cross-immunity, Epidemics 5 (1) (2013) 20–33. [DOI] [PubMed] [Google Scholar]
  • [12].Slater H. C., Gambhir M., Parham P. E., Michael E., Modelling coinfection with malaria and lymphatic filariasis, PLoS Computational Biology 9 (6) (2013) e1003096. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [13].Yakob L., Williams G. M., Gray D. J., Halton K., Solon J. A., Clements A. C., Slaving and release in co-infection control, Parasites & Vectors 6 (2013) 1–9. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [14].Lass S., Hudson P. J., Thakar J., Saric J., Harvill E., Albert R., Perkins S. E., Generating super-shedders: coinfection increases bacterial load and egg production of a gastrointestinal helminth, Journal of the Royal Society Interface 10 (80) (2013) 20120588. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [15]. Maliyoni M., Chirove F., Gaff H. D., Govinder K. S., A stochastic epidemic model for the dynamics of two pathogens in a single tick population, Theoretical Population Biology 127 (2019) 75–90, (*). Maliyoni et al. [15] proposed a stochastic model for the dynamics of two tick-transmitted pathogens in a single tick population. The model, a continuous-time Markov chain based on a deterministic tick-borne disease model, was used to investigate the duration of possible pathogen co-existence and the probability of pathogen extinction.
  • [16]. Cutler S. J., Vayssier-Taussat M., Estrada-Peña A., Potkonjak A., Mihalca A. D., Zeller H., Tick-borne diseases and co-infection: Current considerations, Ticks and tick-borne diseases 12 (1) (2021) 101607, (*). Cutler et al. [16] reviewed current understanding of co-infection in tick-borne diseases affecting both tick and vertebrate host populations, highlighting the need for more research on pathogen interactions.
  • [17].Pabon-Rodriguez F. M., Brown G. D., Scorza B. M., Petersen C. A., Bayesian multivariate longitudinal model for immune responses to Leishmania: A tick-borne co-infection study, Statistics in Medicine (2023). [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [18].Gao D., Porco T. C., Ruan S., Coinfection dynamics of two diseases in a single host population, Journal of mathematical analysis and applications 442 (1) (2016) 171–188. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [19].Lou Y., Liu L., Gao D., Modeling co-infection of Ixodes tick-borne pathogens, Mathematical Biosciences & Engineering 14 (5&6) (2017) 1301. [DOI] [PubMed] [Google Scholar]
  • [20]. Vogels C. B., Rückert C., Cavany S. M., Perkins T. A., Ebel G. D., Grubaugh N. D., Arbovirus coinfection and co-transmission: A neglected public health concern?, PLoS biology 17 (1) (2019) e3000130, (*). Vogels et al. [20] reviewed the impact of co-infection on clinical disease in humans, discussed the possibility for co-transmission from mosquito to human, and described a role for modeling transmission dynamics at various levels of co-transmission with the aim of understanding whether virus co-infections should be viewed as a serious concern for public health.
  • [21].Cross P. C., Lloyd-Smith J. O., Johnson P. L. F., Getz W. M., Duelling timescales of host movement and disease recovery determine invasion of disease in structured populations, Ecology Letters 183 (2005) 587–595. doi: 10.1111/j.1461-0248.2005.00760.x. [DOI] [Google Scholar]
  • [22]. Meehan M. T., Cope R. C., McBryde E. S., On the probability of strain invasion in endemic settings: accounting for individual heterogeneity and control in multi-strain dynamics, Journal of Theoretical Biology 487 (2020) 110109, (*). Meehan et al. [22] investigated the stochastic dynamics of the emergence of a novel disease strain, which is introduced into a population in which it competes with a resident endemic strain. The analysis is carried out by means of a branching process approximation to calculate the probability that the new strain becomes established.
  • [23].Alizon S., De Roode J. C., Michalakis Y., Multiple infections and the evolution of virulence, Ecology Letters 16 (4) (2013) 556–567. [DOI] [PubMed] [Google Scholar]
  • [24]. Allen L. J., Bokil V. A., Cunniffe N. J., Hamelin F. M., Hilker F. M., Jeger M. J., Modelling vector transmission and epidemiology of co-infecting plant viruses, Viruses 11 (12) (2019) 1153, (*). Allen et al. [24] formulated a general epidemiological model for one vector species and one plant species with potential co-infection in the host plant by two viruses. First, the basic reproduction number is derived, and thus, conditions for successful invasion of a single virus are determined. Then, a new invasion threshold is derived to provide conditions for successful invasion of a second virus.
  • [25]. White A., Schaefer E., Thompson C. W., Kribs C. M., Gaff H., Dynamics of two pathogens in a single tick population, Letters in Biomathematics 6 (1) (2019) 50, (*). White et al. [25] proposed a mathematical model for a two-pathogen, one-tick, one-host system with the aim of determining how long an invading pathogen persists within a tick population in which a resident pathogen is already established.
  • [26].Bushman M., Antia R., A general framework for modelling the impact of co-infections on pathogen evolution, Journal of the Royal Society Interface 16 (155) (2019) 20190165. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [27].Kermack W. O., McKendrick A. G., A contribution to the mathematical theory of epidemics, Proceedings of the Royal Society of London, Series A 115 (772) (1927) 700–721. [Google Scholar]
  • [28].Pfab F., Nisbet R. M., Briggs C. J., A time-since-infection model for populations with two pathogens, Theoretical Population Biology 144 (2022) 1–12. [DOI] [PubMed] [Google Scholar]
  • [29]. Rovenolt F. H., Tate A. T., The impact of coinfection dynamics on host competition and coexistence, The American Naturalist 199 (1) (2022) 91–107, (*). Rovenolt et al. [29] developed a model of two co-infected host species to understand under which conditions co-infection can interfere with parasite-mediated apparent competition among hosts.
  • [30]. Le T. M. T., Madec S., Gjini E., Disentangling how multiple traits drive two strain frequencies in SIS dynamics with coinfection, Journal of Theoretical Biology 538 (2022) 111041, (*). Le et al. [30] studied a Susceptible-Infected-Susceptible (SIS) compartmental model with two strains and co-infection/co-colonization, incorporating five strain fitness dimensions under the same framework to understand coexistence and competition mechanisms.
  • [31].Saad-Roy C. M., Grenfell B. T., Levin S. A., Pellis L., Stage H. B., Van Den Driessche P., Wingreen N. S., Superinfection and the evolution of an initial asymptomatic stage, Royal Society Open Science 8 (1) (2021) 202212. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [32].McLaughlin A. A., Hanley-Bowdoin L., Kennedy G. G., Jacobson A. L., Vector acquisition and co-inoculation of two plant viruses influences transmission, infection, and replication in new hosts, Scientific Reports 12 (1) (2022) 20355. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [33].Chapwanya M., Matusse A., Dumont Y., On synergistic co-infection in crop diseases. the case of the Maize Lethal Necrosis Disease, Applied Mathematical Modelling 90 (2021) 912–942. [Google Scholar]
  • [34].Miller J., Burch-Smith T. M., Ganusov V. V., Mathematical modeling suggests cooperation of plant-infecting viruses, Viruses 14 (4) (2022) 741. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [35].Lipsitch M., Colijn C., Cohen T., Hanage W. P., Fraser C., No coexistence for free: neutral null models for multistrain pathogens, Epidemics 1 (1) (2009) 2–13. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [36]. Alizon S., Co-infection and super-infection models in evolutionary epidemiology, Interface Focus 3 (6) (2013) 20130031, (**). 9. Alizon [36] discussed how multiple infections have been modelled in evolutionary epidemiology, presenting within-host models, super-infection frameworks, co-infection models, and some perspectives for the study of multiple infections in evolutionary epidemiology. In particular, he showed that a widely used co-infection model is not neutral as it confers a frequency-dependent advantage to rare neutral mutants.
  • [37]. Alizon S., Parasite co-transmission and the evolutionary epidemiology of virulence, Evolution 67 (4) (2013) 921–933, (*). Alizon [37] studied the effect of co-transmission on virulence evolution when parasites compete for host resources.
  • [38]. Bhowmick S., Kasi K. K., Gethmann J., Fischer S., Conraths F. J., Sokolov I. M., Lentz H. H., Ticks on the run: A mathematical model of Crimean-Congo Haemorrhagic Fever (CCHF) – key factors for transmission, Epidemiologia 3 (1) (2022) 116–134, (*). Bhowmick et al. [38] developed a compartment-based non-linear ordinary differential equation system to model the disease transmission cycle including blood-sucking ticks, livestock and humans. Sensitivity analysis of the basic reproduction number shows that decreasing the tick survival time is an efficient method to control the disease. They concluded that in the case of CCHFV transmission due to co-feeding, as well as trans-stadial and trans-ovarial transmission, are important routes to sustain the disease cycle.
  • [39].Gonzalez J.-P., Camicas J.-L., Cornet J.-P., Faye O., Wilson M., Sexual and transovarian transmission of Crimean-Congo haemorrhagic fever virus in Hyalomma truncatum ticks, Research in Virology 143 (1992) 23–28. [DOI] [PubMed] [Google Scholar]
  • [40].Matser A., Hartemink N., Heesterbeek H., Galvani A., Davis S., Elasticity analysis in epidemiology: an application to tick-borne infections, Ecology Letters 12 (12) (2009) 1298–1305. [DOI] [PubMed] [Google Scholar]
  • [41].Gargili A., Estrada-Peña A., Spengler J. R., Lukashev A., Nuttall P. A., Bente D. A., The role of ticks in the maintenance and transmission of Crimean-Congo hemorrhagic fever virus: A review of published field and laboratory studies, Antiviral esearch 144 (2017) 93–119. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [42].Spengler J. R., Bergeron É., Spiropoulou C. F., Crimean-Congo hemorrhagic fever and expansion from endemic regions, Current Opinion in Virology 34 (2019) 70–78. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [43].Gonzalez J.-P., Camicas J.-L., Cornet J.-P., Wilson M., Biological and clinical responses of West African sheep to Crimean-Congo haemorrhagic fever virus experimental infection, Research in Virology 149 (6) (1998) 445–455. [DOI] [PubMed] [Google Scholar]
  • [44]. Hoch T., Breton E., Vatansever Z., Dynamic modeling of Crimean-Congo hemorrhagic fever virus (cchfv) spread to test control strategies, Journal of Medical Entomology 55 (5) (2018) 1124–1132, (*). Hoch et al. [44] proposed a dynamic mechanistic model that takes into account the major processes involved in tick population dynamics and pathogen transmission with the aim of testing potential scenarios for pathogen control.
  • [45].Van den Driessche P., Watmough J., Reproduction numbers and subthreshold endemic equilibria for compartmental models of disease transmission, Mathematical Biosciences 180 (1–2) (2002) 29–48. [DOI] [PubMed] [Google Scholar]
  • [46].Diekmann O., Heesterbeek J. A. P., Metz J. A., On the definition and the computation of the basic reproduction ratio R0 in models for infectious diseases in heterogeneous populations, Journal of Mathematical Biology 28 (4) (1990) 365–382. [DOI] [PubMed] [Google Scholar]
  • [47].Heesterbeek J., Roberts M., The type-reproduction number T in models for infectious disease control, Mathematical Biosciences 206 (1) (2007) 3–10. [DOI] [PubMed] [Google Scholar]
  • [48]. Johnstone-Robertson S. P., Diuk-Wasser M. A., Davis S. A., Incorporating tick feeding behaviour into R0 for tick-borne pathogens, Theoretical Population Biology 131 (2020) 25–37, (**). 13. Johnstone et al. [48] derived expressions for the basic reproduction number and the related tick type-reproduction number accounting for the observation that larval and nymphal ticks tend to aggregate on the same minority of hosts (tick co-aggregation and co-feeding). The pattern of tick blood meals is represented as a directed, acyclic, bipartite contact network.
  • [49].Sorvillo T. E., Rodriguez S. E., Hudson P., Carey M., Rodriguez L. L., Spiropoulou C. F., Bird B. H., Spengler J. R., Bente D. A., Towards a sustainable one health approach to Crimean-Congo hemorrhagic fever prevention: Focus areas and gaps in knowledge, Tropical Medicine and Infectious Disease 5 (3) (2020) 113. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [50].Mpeshe S. C., Haario H., Tchuenche J. M., A mathematical model of Rift Valley fever with human host, Acta Biotheoretica 59 (3) (2011) 231–250. [DOI] [PubMed] [Google Scholar]
  • [51]. Belluccini G., Stochastic models of cell population dynamics and tick-borne virus transmission, Ph.D. thesis, University of Leeds, (*) (2023). Belluccini [51] proposed both deterministic and stochastic models of co-infection with tick-borne viruses to investigate the role that different routes of transmission play in the spread of infectious diseases and to study the probability and timescale of co-infection events.
  • [52]. Maliyoni M., Gaff H. D., Govinder K. S., Chirove F., Multipatch stochastic epidemic model for the dynamics of a tick-borne disease, Frontiers in Applied Mathematics and Statistics 9 (2023) 1122410, (*). Maliyoni et al. [52] investigated the impact of between-patch migration on the dynamics of a tick-borne disease on disease extinction and persistence making use of a system of stochastic differential equations.
  • [53].Artalejo J. R., Lopez-Herrero M. J., On the exact measure of disease spread in stochastic epidemic models, Bulletin of Mathematical Biology 75 (2013) 1031–1050. [DOI] [PubMed] [Google Scholar]
  • [54].Yuan Y., Allen L. J., Stochastic models for virus and immune system dynamics, Mathematical Biosciences 234 (2) (2011) 84–94. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [55]. Lin D. C.-D., Weng S.-C., Tsao P.-N., Chu J. J. H., Shiao S.-H., Coinfection of dengue and Zika viruses mutually enhances viral replication in the mosquito Aedes aegypti, Parasites & Vectors 16 (1) (2023) 1–14, (*). 16. Lin et al. [55] studied the impact of Zika and Dengue virus co-infection on viral infection, examining viral replication activity in cells infected simultaneously, or sequentially.
  • [56].Cardano G., Witmer T. R., Ore O., The rules of algebra: Ars Magna, Vol. 685, Courier Corporation, 2007. [Google Scholar]
  • [57].Zwillinger D., CRC standard mathematical tables and formulas, CRC press, 2018. [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

Numerical codes (Python) to reproduce Figure 2 and Figure 4, as well as the Mathematica notebook to reproduce proofs and results from Appendix D, are deposited at https://github.com/MolEvolEpid/coinfection_cotransmission_cofeeding_in_ticks.


Articles from ArXiv are provided here courtesy of arXiv

RESOURCES