گل سنا غزالاں والی
اس محبوب دی چالاں والی
ہن محبوب کدی نہیں ملدے
پئی جدائی سالاں والی
پرینہہ دی گل سارے سن گئے
کیتی گل کمالاں والی
اکھ ترکھی پلکاں سوئیاں
صورت سوہنی لعلاں والی
کیتیاں آخر اگے آئیاں
آئی گھڑی زوالاں والی
Work-family conflict is a conflict between societal expectations and the interaction of interrelated work and family domains. It is essential to understand the impact of COVID-19 on working women's physical and mental health in Pakistan to advise better health policy. This research aims to determine work-family conflict’s impact on working women’s physical and mental health. Through non-probability sampling, 100 working women were sampled online across different cities of Pakistan. The participants were selected from different working fields. Only women above the age of 20 years were eligible for participation in this study. The study found that work-family conflict positively correlates with the fear of COVID19, blood pressure, depression, and anxiety symptoms. Psychologists, counselors, and general physicians for primary and preventive care in Pakistan need to work towards counselling and supporting the health needs of working women to prevent biopsychosocial problems related to work-family conflict and fear of COVID-19. Keywords: anxiety, blood pressure, depression, fear of covid-19, work-family conflict.
WSNs may be described as self-composed networks without the emergence of any fundamental regulator. Because of this property, protection and power consumption are main issues of WSNs. The security attacks are triggered by the malicious nodes which enter the network. Two categories of safety intrusions are active and passive. Sinkhole intrusion comes in the category of active intrusion. During sinkhole attack, the malicious nodes spoof identity of the base station and act like base station. The sensor nodes start transmitting data to malicious nodes instead of base station. In the existing system, the technique of monitor mode and mutual authentication are proposed for isolating the malicious nodes present in WSN. In the projected study, a novel approach is designed for detection and isolation of attacker sensor nodes from the system. Identity verification is the base of projected approach. Ns2 is used for the implementation of algorithm and results are analyzed in by means of throughput, package trouncing and power. Various investigations indicated that throughput of the projected technique is high in comparison with presented technique. The energy consumption of projected technique is fewer in comparison with accessible technique. Packet loss in case of existing technique is high as compared to proposed technique.