X-Git-Url: http://lists.indexdata.com/cgi-bin?a=blobdiff_plain;f=test%2Ftest_http_76.res;h=4d7509de10f21b7fa38374e9a59c9c5be6199c35;hb=f7733f023b8eaad737939e63be5b31096e3a0f4a;hp=57983c5844b5b7b6c01bdff72ecd32d2698ef6a6;hpb=b026a4535c9ce5e0d371f23f19f9a337963bc908;p=pazpar2-moved-to-github.git
diff --git a/test/test_http_76.res b/test/test_http_76.res
index 57983c5..4d7509d 100644
--- a/test/test_http_76.res
+++ b/test/test_http_76.res
@@ -6,76 +6,126 @@
0
4
-
-Computer science & technology
-proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976
-1977
-Optical pattern recognition
-Computer science & technology
-proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976
-1977
-Optical pattern recognition
-XXXXXXXXXX
-test-usersetting-2 data:
- YYYYYYYYY
-57536
-content: title computer science technology author medium book
+ Computer science & technology
+ proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976
+ 1977
+ Optical pattern recognition
+
+ Computer science & technology
+ proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976
+ 1977
+ Optical pattern recognition
+ XXXXXXXXXX
+ test-usersetting-2 data:
+ YYYYYYYYY
+ Optical pattern recognition
+ PAZPAR2_NULL_b
+ PAZPAR2_NULL_c
+
+ 1
+ 102165
+
+field=title content=Computer science & technology :;
+computer: w[1] += w(6) / (1+log2(1+lead_decay(0.000000) * length(0)));
+computer: tf[1] += w[1](6) / length(3) (2.000000);
+relevance = 0;
+idf[1] = log(((1 + total(4))/termoccur(3));
+computer: relevance += 100000 * tf[1](2.000000) * idf[1](0.510826) (102165);
+score = relevance(102165);
+
+ content: title computer science technology author medium book
-
-The Computer Bible
-1973-1980
-Bible. O.T
-Bible
-Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates
-The Computer Bible
-1973-1980
-Bible. O.T
-Bible
-Hebrew and Greek; introductions in English
-Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates
-XXXXXXXXXX
-test-usersetting-2 data:
- YYYYYYYYY
-57536
-content: title the computer bible author medium book
+ The Computer Bible
+ 1973-1980
+ Bible. O.T
+ Bible
+ Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates
+
+ The Computer Bible
+ 1973-1980
+ Bible. O.T
+ Bible
+ Hebrew and Greek; introductions in English
+ Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates
+ XXXXXXXXXX
+ test-usersetting-2 data:
+ YYYYYYYYY
+
+ 1
+ 102165
+
+field=title content=The Computer Bible /;
+computer: w[1] += w(6) / (1+log2(1+lead_decay(0.000000) * length(1)));
+computer: tf[1] += w[1](6) / length(3) (2.000000);
+relevance = 0;
+idf[1] = log(((1 + total(4))/termoccur(3));
+computer: relevance += 100000 * tf[1](2.000000) * idf[1](0.510826) (102165);
+score = relevance(102165);
+
+ content: title the computer bible author medium book
-
-The use of passwords for controlled access to computer resources
-1977
-Wood, Helen M
-Computers
-The use of passwords for controlled access to computer resources
-1977
-Wood, Helen M
-Computers
-XXXXXXXXXX
-test-usersetting-2 data:
- YYYYYYYYY
-17260
-content: title the use of passwords for controlled access to computer resources author wood helen m medium book
+ The use of passwords for controlled access to computer resources
+ 1977
+ Wood, Helen M
+ Computers
+
+ The use of passwords for controlled access to computer resources
+ 1977
+ Wood, Helen M
+ Computers
+ XXXXXXXXXX
+ test-usersetting-2 data:
+ YYYYYYYYY
+ Computers
+ PAZPAR2_NULL_b
+ PAZPAR2_NULL_c
+
+ 1
+ 30649
+
+field=title content=The use of passwords for controlled access to com ...;
+computer: w[1] += w(6) / (1+log2(1+lead_decay(0.000000) * length(8)));
+computer: tf[1] += w[1](6) / length(10) (0.600000);
+relevance = 0;
+idf[1] = log(((1 + total(4))/termoccur(3));
+computer: relevance += 100000 * tf[1](0.600000) * idf[1](0.510826) (30649);
+score = relevance(30649);
+
+ content: title the use of passwords for controlled access to computer resources author wood helen m medium book
-
-Reconstruction tomography in diagnostic radiology and nuclear medicine
-proceedings of the workshop
-1977
-Tomography
-Includes bibliographical references and index
-Reconstruction tomography in diagnostic radiology and nuclear medicine
-proceedings of the workshop
-1977
-Tomography
-Includes bibliographical references and index
-XXXXXXXXXX
-test-usersetting-2 data:
- YYYYYYYYY
-0
-content: title reconstruction tomography in diagnostic radiology and nuclear medicine author medium book
+ Reconstruction tomography in diagnostic radiology and nuclear medicine
+ proceedings of the workshop
+ 1977
+ Tomography
+ Includes bibliographical references and index
+
+ Reconstruction tomography in diagnostic radiology and nuclear medicine
+ proceedings of the workshop
+ 1977
+ Tomography
+ Includes bibliographical references and index
+ XXXXXXXXXX
+ test-usersetting-2 data:
+ YYYYYYYYY
+ Tomography
+ PAZPAR2_NULL_b
+ PAZPAR2_NULL_c
+
+ 1
+ 0
+
+relevance = 0;
+idf[1] = log(((1 + total(4))/termoccur(3));
+computer: relevance += 100000 * tf[1](0.000000) * idf[1](0.510826) (0);
+score = relevance(0);
+
+ content: title reconstruction tomography in diagnostic radiology and nuclear medicine author medium book
\ No newline at end of file