We considered sand flies in the susceptible (SF), latent (EF, not infectious), or infectious (IF) stages. Flies can become infected by blood meals taken on infectious humans (IHP, IHD, IHS, IHT1, IHT2, IHL). The infection rate λF of flies is determined by the following: 1) the biting rate β, 2) the infection probabilities of flies dependent on the infection status of the hosts (pF1 to pF4, see Table 2) and 3) the numbers of infectious hosts. We assumed that each blood meal of a susceptible sand fly leads to a sand fly infection if taken from a symptomatically infected human (pF3 = 100% for KA patients IHS, IHT1, IHT2 and pF4 = 100% for PKDL patients IHL). For a sensitivity analysis, see Results. The probability that a fly becomes infected when feeding on asymptomatically infected hosts of type IHP or IHD was estimated with the model as follows. The infection probability pF2 of late asymptomatically infected humans (IHD) was estimated, whereby we assumed that the infectivity of hosts increases monotonically from the time of infection until the late asymptomatic state IHD. We defined an intermediate infection probability for flies originating from hosts in the early asymptomatic state IHP as pF1 = pF2/2.
Infection probabilities of flies dependent on the infection status of the hosts (pF1 to pF4)
dependent variables
Infection rate λF of flies
control variables
Numbers of infectious hosts
controls
For a sensitivity analysis, see Results section.
Annotations
Based on most similar protocols
Etiam vel ipsum. Morbi facilisis vestibulum nisl. Praesent cursus laoreet felis. Integer adipiscing pretium orci. Nulla facilisi. Quisque posuere bibendum purus. Nulla quam mauris, cursus eget, convallis ac, molestie non, enim. Aliquam congue. Quisque sagittis nonummy sapien. Proin molestie sem vitae urna. Maecenas lorem.
As authors may omit details in methods from publication, our AI will look for missing critical information across the 5 most similar protocols.
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to
get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required