X-Git-Url: http://jsfdemo.indexdata.com/?a=blobdiff_plain;f=test%2Ftest_http_76.res;h=f539920395acee4d92ea896ea9f0fb495c3181a4;hb=0bb0ee0e00d750808e228b991c78cb4838bc989d;hp=d626a78caecf177330b1854da3493c331b3cd144;hpb=7096509dc853b279d96d5cd1a9c7c395d470ca81;p=pazpar2-moved-to-github.git diff --git a/test/test_http_76.res b/test/test_http_76.res index d626a78..f539920 100644 --- a/test/test_http_76.res +++ b/test/test_http_76.res @@ -23,10 +23,12 @@ 1 102165 -computer: mult[1] += local_mult(6) / (1+log2(1+lead_decay(0.000000) * length(0))); -computer: field=title vecf[1] += mult[1](6) / length(3); +field=title content=Computer science & technology :; +computer: w[1] += w(6) / (1+log2(1+lead_decay(0.000000) * length(0))); +computer: tf[1] += w[1](6) / length(3) (2.000000); +relevance = 0; idf[1] = log(((1 + total(4))/termoccur(3)); -computer: relevance += 100000 * vecf[1](2.000000) * idf[1](0.510826) (102165); +computer: relevance += 100000 * tf[1](2.000000) * idf[1](0.510826) (102165); score = relevance(102165); content: title computer science technology author medium book @@ -52,10 +54,12 @@ score = relevance(102165); 1 102165 -computer: mult[1] += local_mult(6) / (1+log2(1+lead_decay(0.000000) * length(1))); -computer: field=title vecf[1] += mult[1](6) / length(3); +field=title content=The Computer Bible /; +computer: w[1] += w(6) / (1+log2(1+lead_decay(0.000000) * length(1))); +computer: tf[1] += w[1](6) / length(3) (2.000000); +relevance = 0; idf[1] = log(((1 + total(4))/termoccur(3)); -computer: relevance += 100000 * vecf[1](2.000000) * idf[1](0.510826) (102165); +computer: relevance += 100000 * tf[1](2.000000) * idf[1](0.510826) (102165); score = relevance(102165); content: title the computer bible author medium book @@ -78,10 +82,12 @@ score = relevance(102165); 1 30649 -computer: mult[1] += local_mult(6) / (1+log2(1+lead_decay(0.000000) * length(8))); -computer: field=title vecf[1] += mult[1](6) / length(10); +field=title content=The use of passwords for controlled access to com ...; +computer: w[1] += w(6) / (1+log2(1+lead_decay(0.000000) * length(8))); +computer: tf[1] += w[1](6) / length(10) (0.600000); +relevance = 0; idf[1] = log(((1 + total(4))/termoccur(3)); -computer: relevance += 100000 * vecf[1](0.600000) * idf[1](0.510826) (30649); +computer: relevance += 100000 * tf[1](0.600000) * idf[1](0.510826) (30649); score = relevance(30649); content: title the use of passwords for controlled access to computer resources author wood helen m medium book @@ -106,8 +112,9 @@ score = relevance(30649); 1 0 +relevance = 0; idf[1] = log(((1 + total(4))/termoccur(3)); -computer: relevance += 100000 * vecf[1](0.000000) * idf[1](0.510826) (0); +computer: relevance += 100000 * tf[1](0.000000) * idf[1](0.510826) (0); score = relevance(0); content: title reconstruction tomography in diagnostic radiology and nuclear medicine author medium book