X-Git-Url: http://git.indexdata.com/?a=blobdiff_plain;f=test%2Ftest_http_76.res;h=4d7509de10f21b7fa38374e9a59c9c5be6199c35;hb=2e17f8b4117fdbefd1c1b6452c7a39c1dab03207;hp=368584d60b746ef60baa45e59bcfa496b37f6015;hpb=5b31ba8413c62e860eba83a58852d2af37af4397;p=pazpar2-moved-to-github.git
diff --git a/test/test_http_76.res b/test/test_http_76.res
index 368584d..4d7509d 100644
--- a/test/test_http_76.res
+++ b/test/test_http_76.res
@@ -19,13 +19,19 @@
XXXXXXXXXX
test-usersetting-2 data:
YYYYYYYYY
+ Optical pattern recognition
+ PAZPAR2_NULL_b
+ PAZPAR2_NULL_c
1
102165
-computer: field=title vecf[1] += mult(6) / length(3);
+field=title content=Computer science & technology :;
+computer: w[1] += w(6) / (1+log2(1+lead_decay(0.000000) * length(0)));
+computer: tf[1] += w[1](6) / length(3) (2.000000);
+relevance = 0;
idf[1] = log(((1 + total(4))/termoccur(3));
-computer: relevance += 100000 * vecf[1](2.000000) * idf[1](0.510826) (102165);
+computer: relevance += 100000 * tf[1](2.000000) * idf[1](0.510826) (102165);
score = relevance(102165);
content: title computer science technology author medium book
@@ -51,9 +57,12 @@ score = relevance(102165);
1
102165
-computer: field=title vecf[1] += mult(6) / length(3);
+field=title content=The Computer Bible /;
+computer: w[1] += w(6) / (1+log2(1+lead_decay(0.000000) * length(1)));
+computer: tf[1] += w[1](6) / length(3) (2.000000);
+relevance = 0;
idf[1] = log(((1 + total(4))/termoccur(3));
-computer: relevance += 100000 * vecf[1](2.000000) * idf[1](0.510826) (102165);
+computer: relevance += 100000 * tf[1](2.000000) * idf[1](0.510826) (102165);
score = relevance(102165);
content: title the computer bible author medium book
@@ -72,13 +81,19 @@ score = relevance(102165);
XXXXXXXXXX
test-usersetting-2 data:
YYYYYYYYY
+ Computers
+ PAZPAR2_NULL_b
+ PAZPAR2_NULL_c
1
30649
-computer: field=title vecf[1] += mult(6) / length(10);
+field=title content=The use of passwords for controlled access to com ...;
+computer: w[1] += w(6) / (1+log2(1+lead_decay(0.000000) * length(8)));
+computer: tf[1] += w[1](6) / length(10) (0.600000);
+relevance = 0;
idf[1] = log(((1 + total(4))/termoccur(3));
-computer: relevance += 100000 * vecf[1](0.600000) * idf[1](0.510826) (30649);
+computer: relevance += 100000 * tf[1](0.600000) * idf[1](0.510826) (30649);
score = relevance(30649);
content: title the use of passwords for controlled access to computer resources author wood helen m medium book
@@ -99,12 +114,16 @@ score = relevance(30649);
XXXXXXXXXX
test-usersetting-2 data:
YYYYYYYYY
+ Tomography
+ PAZPAR2_NULL_b
+ PAZPAR2_NULL_c
1
0
+relevance = 0;
idf[1] = log(((1 + total(4))/termoccur(3));
-computer: relevance += 100000 * vecf[1](0.000000) * idf[1](0.510826) (0);
+computer: relevance += 100000 * tf[1](0.000000) * idf[1](0.510826) (0);
score = relevance(0);
content: title reconstruction tomography in diagnostic radiology and nuclear medicine author medium book