X-Git-Url: http://git.indexdata.com/?a=blobdiff_plain;f=test%2Ftest_http_76.res;h=4d7509de10f21b7fa38374e9a59c9c5be6199c35;hb=2e17f8b4117fdbefd1c1b6452c7a39c1dab03207;hp=154ce246b5253fa14cc4481965e5f1b5f1db4a85;hpb=ee40230fd0e997212b707fafcdec0da154fd1b21;p=pazpar2-moved-to-github.git diff --git a/test/test_http_76.res b/test/test_http_76.res index 154ce24..4d7509d 100644 --- a/test/test_http_76.res +++ b/test/test_http_76.res @@ -6,99 +6,126 @@ 0 4 - -Computer science & technology -proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976 -1977 -Optical pattern recognition -Computer science & technology -proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976 -1977 -Optical pattern recognition -XXXXXXXXXX -test-usersetting-2 data: - YYYYYYYYY -102165 - -computer: field=title vecf[1] += mult(6) / length(3); + Computer science & technology + proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976 + 1977 + Optical pattern recognition + + Computer science & technology + proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976 + 1977 + Optical pattern recognition + XXXXXXXXXX + test-usersetting-2 data: + YYYYYYYYY + Optical pattern recognition + PAZPAR2_NULL_b + PAZPAR2_NULL_c + + 1 + 102165 + +field=title content=Computer science & technology :; +computer: w[1] += w(6) / (1+log2(1+lead_decay(0.000000) * length(0))); +computer: tf[1] += w[1](6) / length(3) (2.000000); +relevance = 0; idf[1] = log(((1 + total(4))/termoccur(3)); -computer: relevance += 100000 * vecf[1](2.000000) * idf[1](0.510826) (102165); +computer: relevance += 100000 * tf[1](2.000000) * idf[1](0.510826) (102165); score = relevance(102165); - -content: title computer science technology author medium book + + content: title computer science technology author medium book - -The Computer Bible -1973-1980 -Bible. O.T -Bible -Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates -The Computer Bible -1973-1980 -Bible. O.T -Bible -Hebrew and Greek; introductions in English -Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates -XXXXXXXXXX -test-usersetting-2 data: - YYYYYYYYY -102165 - -computer: field=title vecf[1] += mult(6) / length(3); + The Computer Bible + 1973-1980 + Bible. O.T + Bible + Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates + + The Computer Bible + 1973-1980 + Bible. O.T + Bible + Hebrew and Greek; introductions in English + Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates + XXXXXXXXXX + test-usersetting-2 data: + YYYYYYYYY + + 1 + 102165 + +field=title content=The Computer Bible /; +computer: w[1] += w(6) / (1+log2(1+lead_decay(0.000000) * length(1))); +computer: tf[1] += w[1](6) / length(3) (2.000000); +relevance = 0; idf[1] = log(((1 + total(4))/termoccur(3)); -computer: relevance += 100000 * vecf[1](2.000000) * idf[1](0.510826) (102165); +computer: relevance += 100000 * tf[1](2.000000) * idf[1](0.510826) (102165); score = relevance(102165); - -content: title the computer bible author medium book + + content: title the computer bible author medium book - -The use of passwords for controlled access to computer resources -1977 -Wood, Helen M -Computers -The use of passwords for controlled access to computer resources -1977 -Wood, Helen M -Computers -XXXXXXXXXX -test-usersetting-2 data: - YYYYYYYYY -30649 - -computer: field=title vecf[1] += mult(6) / length(10); + The use of passwords for controlled access to computer resources + 1977 + Wood, Helen M + Computers + + The use of passwords for controlled access to computer resources + 1977 + Wood, Helen M + Computers + XXXXXXXXXX + test-usersetting-2 data: + YYYYYYYYY + Computers + PAZPAR2_NULL_b + PAZPAR2_NULL_c + + 1 + 30649 + +field=title content=The use of passwords for controlled access to com ...; +computer: w[1] += w(6) / (1+log2(1+lead_decay(0.000000) * length(8))); +computer: tf[1] += w[1](6) / length(10) (0.600000); +relevance = 0; idf[1] = log(((1 + total(4))/termoccur(3)); -computer: relevance += 100000 * vecf[1](0.600000) * idf[1](0.510826) (30649); +computer: relevance += 100000 * tf[1](0.600000) * idf[1](0.510826) (30649); score = relevance(30649); - -content: title the use of passwords for controlled access to computer resources author wood helen m medium book + + content: title the use of passwords for controlled access to computer resources author wood helen m medium book - -Reconstruction tomography in diagnostic radiology and nuclear medicine -proceedings of the workshop -1977 -Tomography -Includes bibliographical references and index -Reconstruction tomography in diagnostic radiology and nuclear medicine -proceedings of the workshop -1977 -Tomography -Includes bibliographical references and index -XXXXXXXXXX -test-usersetting-2 data: - YYYYYYYYY -0 - + Reconstruction tomography in diagnostic radiology and nuclear medicine + proceedings of the workshop + 1977 + Tomography + Includes bibliographical references and index + + Reconstruction tomography in diagnostic radiology and nuclear medicine + proceedings of the workshop + 1977 + Tomography + Includes bibliographical references and index + XXXXXXXXXX + test-usersetting-2 data: + YYYYYYYYY + Tomography + PAZPAR2_NULL_b + PAZPAR2_NULL_c + + 1 + 0 + +relevance = 0; idf[1] = log(((1 + total(4))/termoccur(3)); -computer: relevance += 100000 * vecf[1](0.000000) * idf[1](0.510826) (0); +computer: relevance += 100000 * tf[1](0.000000) * idf[1](0.510826) (0); score = relevance(0); - -content: title reconstruction tomography in diagnostic radiology and nuclear medicine author medium book + + content: title reconstruction tomography in diagnostic radiology and nuclear medicine author medium book \ No newline at end of file