X-Git-Url: http://git.indexdata.com/?a=blobdiff_plain;f=test%2Ftest_http_76.res;h=4d7509de10f21b7fa38374e9a59c9c5be6199c35;hb=975af84a25e086c3063390e03ff620beb2981b52;hp=ba0f84847cd5704907aca4185f3807ad457f2d6d;hpb=942a772d08b2e0eb14ad66549daa08bbb0c1fe94;p=pazpar2-moved-to-github.git diff --git a/test/test_http_76.res b/test/test_http_76.res index ba0f848..4d7509d 100644 --- a/test/test_http_76.res +++ b/test/test_http_76.res @@ -6,72 +6,126 @@ 0 4 - -Computer science & technology -proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976 -1977 -Optical pattern recognition -Computer science & technology -proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976 -1977 -Optical pattern recognition -XXXXXXXXXX -test-usersetting-2 data: - YYYYYYYYY -57536 -content: title computer science technology author medium book + Computer science & technology + proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976 + 1977 + Optical pattern recognition + + Computer science & technology + proceedings of a workshop held at the National Bureau of Standards, Gaithersburg, MD, June 3-4, 1976 + 1977 + Optical pattern recognition + XXXXXXXXXX + test-usersetting-2 data: + YYYYYYYYY + Optical pattern recognition + PAZPAR2_NULL_b + PAZPAR2_NULL_c + + 1 + 102165 + +field=title content=Computer science & technology :; +computer: w[1] += w(6) / (1+log2(1+lead_decay(0.000000) * length(0))); +computer: tf[1] += w[1](6) / length(3) (2.000000); +relevance = 0; +idf[1] = log(((1 + total(4))/termoccur(3)); +computer: relevance += 100000 * tf[1](2.000000) * idf[1](0.510826) (102165); +score = relevance(102165); + + content: title computer science technology author medium book - -The Computer Bible -1973-1980 -Bible. O.T -Bible -Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates -The Computer Bible -1973-1980 -Bible. O.T -Bible -Hebrew and Greek; introductions in English -Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates -XXXXXXXXXX -test-usersetting-2 data: - YYYYYYYYY -57536 -content: title the computer bible author medium book + The Computer Bible + 1973-1980 + Bible. O.T + Bible + Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates + + The Computer Bible + 1973-1980 + Bible. O.T + Bible + Hebrew and Greek; introductions in English + Vols. 2, 8: Missoula, Mont. : Published by Scholars Press for Biblical Research Associates + XXXXXXXXXX + test-usersetting-2 data: + YYYYYYYYY + + 1 + 102165 + +field=title content=The Computer Bible /; +computer: w[1] += w(6) / (1+log2(1+lead_decay(0.000000) * length(1))); +computer: tf[1] += w[1](6) / length(3) (2.000000); +relevance = 0; +idf[1] = log(((1 + total(4))/termoccur(3)); +computer: relevance += 100000 * tf[1](2.000000) * idf[1](0.510826) (102165); +score = relevance(102165); + + content: title the computer bible author medium book - -The use of passwords for controlled access to computer resources -1977 -Wood, Helen M -Computers -The use of passwords for controlled access to computer resources -1977 -Wood, Helen M -Computers -XXXXXXXXXX -test-usersetting-2 data: - YYYYYYYYY -17260 -content: title the use of passwords for controlled access to computer resources author wood helen m medium book + The use of passwords for controlled access to computer resources + 1977 + Wood, Helen M + Computers + + The use of passwords for controlled access to computer resources + 1977 + Wood, Helen M + Computers + XXXXXXXXXX + test-usersetting-2 data: + YYYYYYYYY + Computers + PAZPAR2_NULL_b + PAZPAR2_NULL_c + + 1 + 30649 + +field=title content=The use of passwords for controlled access to com ...; +computer: w[1] += w(6) / (1+log2(1+lead_decay(0.000000) * length(8))); +computer: tf[1] += w[1](6) / length(10) (0.600000); +relevance = 0; +idf[1] = log(((1 + total(4))/termoccur(3)); +computer: relevance += 100000 * tf[1](0.600000) * idf[1](0.510826) (30649); +score = relevance(30649); + + content: title the use of passwords for controlled access to computer resources author wood helen m medium book - -Reconstruction tomography in diagnostic radiology and nuclear medicine -proceedings of the workshop -1977 -Tomography -Includes bibliographical references and index -Reconstruction tomography in diagnostic radiology and nuclear medicine -proceedings of the workshop -1977 -Tomography -Includes bibliographical references and index -XXXXXXXXXX -test-usersetting-2 data: - YYYYYYYYY -0 -content: title reconstruction tomography in diagnostic radiology and nuclear medicine author medium book + Reconstruction tomography in diagnostic radiology and nuclear medicine + proceedings of the workshop + 1977 + Tomography + Includes bibliographical references and index + + Reconstruction tomography in diagnostic radiology and nuclear medicine + proceedings of the workshop + 1977 + Tomography + Includes bibliographical references and index + XXXXXXXXXX + test-usersetting-2 data: + YYYYYYYYY + Tomography + PAZPAR2_NULL_b + PAZPAR2_NULL_c + + 1 + 0 + +relevance = 0; +idf[1] = log(((1 + total(4))/termoccur(3)); +computer: relevance += 100000 * tf[1](0.000000) * idf[1](0.510826) (0); +score = relevance(0); + + content: title reconstruction tomography in diagnostic radiology and nuclear medicine author medium book \ No newline at end of file