Search

9703 results for: ‘Discuz电影论坛源码 电影资源网 电影分享网站模版 整站带数据✅项目合作 二开均可 TG:saolei44✅.BZWlTvqcDcYejq’

  • Five reasons why we need to look at childbirth and the media

    An academic from our University has discussed ways in which the media shapes society’s perceptions, anxieties and emotions arising out of birth.

  • Socio-legal Studies

    The Socio-Legal research cluster at Leicester Law School provides a setting for colleagues to explore and discuss their research in the field of socio-legal studies, as broadly understood.

  • Publications

    University of Leicester Violence Hub Key Publications

  • Clinical Trials

    Module code: MD7451 This module will provide an outline of the principles of clinical trial design and conduct. The role and importance of statistical techniques will be discussed in the context of clinical trial design, analysis and interpretation.

  • Qualitative Research

    Module code: MD7462 In this module you will examine the basic features of a range of qualitative methods and identify those commonly used.

  • Language, Gender and Sexuality

    Module code: EN7233 This module explores the relationship between the social construct of gender and the language used in its representation.

  • Clinical Trials

    Module code: MD7451 This module will provide an outline of the principles of clinical trial design and conduct. The role and importance of statistical techniques will be discussed in the context of clinical trial design, analysis and interpretation.

  • Foundations of Cybersecurity

    Module code: CO7099 How can computer systems defend themselves against network attacks? How can we ensure that our data has not been tampered with, or disclosed without our consent? How can we be sure of the identity of the party whom we are communicating...

  • Sparta and the Greek World

    Module code: AH3015 Tutor: Dan Stewart Sparta was one of the greatest – and most perplexing – societies of the ancient world.

  • Foundations of Cybersecurity

    Module code: CO7099 How can computer systems defend themselves against network attacks? How can we ensure that our data has not been tampered with, or disclosed without our consent? How can we be sure of the identity of the party whom we are communicating...

Back to top
MENU