Details

Marx po marksizmu : o tendenčnem padanju profitne mere, kapitalističnih krizah in blagovnem fetišizmu
ID Rutar, Tibor (Author), ID Vodovnik, Žiga (Mentor) More about this mentor... This link opens in a new window

URLURL - Presentation file, Visit http://dk.fdv.uni-lj.si/magistrska_dela_2/pdfs/mb22_rutar-tibor.pdf This link opens in a new window

Language:Slovenian
Work type:Master's thesis/paper
Typology:2.09 - Master's Thesis
Organization:FDV - Faculty of Social Sciences
Place of publishing:Ljubljana
Publisher:[T. Rutar]
Year:2013
Number of pages:72 str.
PID:20.500.12556/RUL-21171 This link opens in a new window
UDC:330.1(043)
COBISS.SI-ID:32040029 This link opens in a new window
Publication date in RUL:11.07.2014
Views:5503
Downloads:277
Metadata:XML DC-XML DC-RDF
:
RUTAR, Tibor, 2013, Marx po marksizmu : o tendenčnem padanju profitne mere, kapitalističnih krizah in blagovnem fetišizmu [online]. Master’s thesis. Ljubljana : T. Rutar. [Accessed 16 April 2025]. Retrieved from: http://dk.fdv.uni-lj.si/magistrska_dela_2/pdfs/mb22_rutar-tibor.pdf
Copy citation
Share:Bookmark and Share

Similar documents

Similar works from RUL:
  1. Soft sensor of bath temperature in an electric arc furnace based on a data-driven Takagi-Sugeno fuzzy model
  2. Development of the analytical electric arc furnace model for the refining phase using parameter optimization
  3. Comprehensive electric arc furnace electric energy consumption modeling
  4. Arc quality index based on three-phase Cassie–Mayr electric arc model of electric arc furnace
  5. Short-term forecasting of electric energy consumption by using fuzzy Takagi-Sugeno models
Similar works from other Slovenian collections:
  1. Electric-arc-furnace productivity optimization
  2. ELECTRIC ARC FURNACE AUTOMATION
  3. Indoor positioning system based on bluetooth low energy technology and a nature-inspired optimization algorithm
  4. TIMETABELING USING SWARM INTELLIGENCE ON MOBILE PLATFORM ANDROID
  5. Binary division fuzzy C-means clustering and particle swarm optimization based efficient intrusion detection for e-governance systems

Back