X-Git-Url: http://lists.indexdata.com/cgi-bin?a=blobdiff_plain;f=test%2Ftest_http_76.res;h=4d7509de10f21b7fa38374e9a59c9c5be6199c35;hb=19d800fbf2333cd7f0eecbcfaf2ba3b696424af7;hp=154ce246b5253fa14cc4481965e5f1b5f1db4a85;hpb=ee40230fd0e997212b707fafcdec0da154fd1b21;p=pazpar2-moved-to-github.git
diff --git a/test/test_http_76.res b/test/test_http_76.res
index 154ce24..4d7509d 100644
--- a/test/test_http_76.res
+++ b/test/test_http_76.res
@@ -6,99 +6,126 @@
0
4
-
-Computer science & technology
-proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976
-1977
-Optical pattern recognition
-Computer science & technology
-proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976
-1977
-Optical pattern recognition
-XXXXXXXXXX
-test-usersetting-2 data:
- YYYYYYYYY
-102165
-
-computer: field=title vecf[1] += mult(6) / length(3);
+ Computer science & technology
+ proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976
+ 1977
+ Optical pattern recognition
+
+ Computer science & technology
+ proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976
+ 1977
+ Optical pattern recognition
+ XXXXXXXXXX
+ test-usersetting-2 data:
+ YYYYYYYYY
+ Optical pattern recognition
+ PAZPAR2_NULL_b
+ PAZPAR2_NULL_c
+
+ 1
+ 102165
+
+field=title content=Computer science & technology :;
+computer: w[1] += w(6) / (1+log2(1+lead_decay(0.000000) * length(0)));
+computer: tf[1] += w[1](6) / length(3) (2.000000);
+relevance = 0;
idf[1] = log(((1 + total(4))/termoccur(3));
-computer: relevance += 100000 * vecf[1](2.000000) * idf[1](0.510826) (102165);
+computer: relevance += 100000 * tf[1](2.000000) * idf[1](0.510826) (102165);
score = relevance(102165);
-
-content: title computer science technology author medium book
+
+ content: title computer science technology author medium book
-
-The Computer Bible
-1973-1980
-Bible. O.T
-Bible
-Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates
-The Computer Bible
-1973-1980
-Bible. O.T
-Bible
-Hebrew and Greek; introductions in English
-Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates
-XXXXXXXXXX
-test-usersetting-2 data:
- YYYYYYYYY
-102165
-
-computer: field=title vecf[1] += mult(6) / length(3);
+ The Computer Bible
+ 1973-1980
+ Bible. O.T
+ Bible
+ Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates
+
+ The Computer Bible
+ 1973-1980
+ Bible. O.T
+ Bible
+ Hebrew and Greek; introductions in English
+ Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates
+ XXXXXXXXXX
+ test-usersetting-2 data:
+ YYYYYYYYY
+
+ 1
+ 102165
+
+field=title content=The Computer Bible /;
+computer: w[1] += w(6) / (1+log2(1+lead_decay(0.000000) * length(1)));
+computer: tf[1] += w[1](6) / length(3) (2.000000);
+relevance = 0;
idf[1] = log(((1 + total(4))/termoccur(3));
-computer: relevance += 100000 * vecf[1](2.000000) * idf[1](0.510826) (102165);
+computer: relevance += 100000 * tf[1](2.000000) * idf[1](0.510826) (102165);
score = relevance(102165);
-
-content: title the computer bible author medium book
+
+ content: title the computer bible author medium book
-
-The use of passwords for controlled access to computer resources
-1977
-Wood, Helen M
-Computers
-The use of passwords for controlled access to computer resources
-1977
-Wood, Helen M
-Computers
-XXXXXXXXXX
-test-usersetting-2 data:
- YYYYYYYYY
-30649
-
-computer: field=title vecf[1] += mult(6) / length(10);
+ The use of passwords for controlled access to computer resources
+ 1977
+ Wood, Helen M
+ Computers
+
+ The use of passwords for controlled access to computer resources
+ 1977
+ Wood, Helen M
+ Computers
+ XXXXXXXXXX
+ test-usersetting-2 data:
+ YYYYYYYYY
+ Computers
+ PAZPAR2_NULL_b
+ PAZPAR2_NULL_c
+
+ 1
+ 30649
+
+field=title content=The use of passwords for controlled access to com ...;
+computer: w[1] += w(6) / (1+log2(1+lead_decay(0.000000) * length(8)));
+computer: tf[1] += w[1](6) / length(10) (0.600000);
+relevance = 0;
idf[1] = log(((1 + total(4))/termoccur(3));
-computer: relevance += 100000 * vecf[1](0.600000) * idf[1](0.510826) (30649);
+computer: relevance += 100000 * tf[1](0.600000) * idf[1](0.510826) (30649);
score = relevance(30649);
-
-content: title the use of passwords for controlled access to computer resources author wood helen m medium book
+
+ content: title the use of passwords for controlled access to computer resources author wood helen m medium book
-
-Reconstruction tomography in diagnostic radiology and nuclear medicine
-proceedings of the workshop
-1977
-Tomography
-Includes bibliographical references and index
-Reconstruction tomography in diagnostic radiology and nuclear medicine
-proceedings of the workshop
-1977
-Tomography
-Includes bibliographical references and index
-XXXXXXXXXX
-test-usersetting-2 data:
- YYYYYYYYY
-0
-
+ Reconstruction tomography in diagnostic radiology and nuclear medicine
+ proceedings of the workshop
+ 1977
+ Tomography
+ Includes bibliographical references and index
+
+ Reconstruction tomography in diagnostic radiology and nuclear medicine
+ proceedings of the workshop
+ 1977
+ Tomography
+ Includes bibliographical references and index
+ XXXXXXXXXX
+ test-usersetting-2 data:
+ YYYYYYYYY
+ Tomography
+ PAZPAR2_NULL_b
+ PAZPAR2_NULL_c
+
+ 1
+ 0
+
+relevance = 0;
idf[1] = log(((1 + total(4))/termoccur(3));
-computer: relevance += 100000 * vecf[1](0.000000) * idf[1](0.510826) (0);
+computer: relevance += 100000 * tf[1](0.000000) * idf[1](0.510826) (0);
score = relevance(0);
-
-content: title reconstruction tomography in diagnostic radiology and nuclear medicine author medium book
+
+ content: title reconstruction tomography in diagnostic radiology and nuclear medicine author medium book
\ No newline at end of file