X-Git-Url: http://jsfdemo.indexdata.com/?a=blobdiff_plain;f=test%2Ftest_http_76.res;h=f539920395acee4d92ea896ea9f0fb495c3181a4;hb=0bb0ee0e00d750808e228b991c78cb4838bc989d;hp=d626a78caecf177330b1854da3493c331b3cd144;hpb=7096509dc853b279d96d5cd1a9c7c395d470ca81;p=pazpar2-moved-to-github.git
diff --git a/test/test_http_76.res b/test/test_http_76.res
index d626a78..f539920 100644
--- a/test/test_http_76.res
+++ b/test/test_http_76.res
@@ -23,10 +23,12 @@
1
102165
-computer: mult[1] += local_mult(6) / (1+log2(1+lead_decay(0.000000) * length(0)));
-computer: field=title vecf[1] += mult[1](6) / length(3);
+field=title content=Computer science & technology :;
+computer: w[1] += w(6) / (1+log2(1+lead_decay(0.000000) * length(0)));
+computer: tf[1] += w[1](6) / length(3) (2.000000);
+relevance = 0;
idf[1] = log(((1 + total(4))/termoccur(3));
-computer: relevance += 100000 * vecf[1](2.000000) * idf[1](0.510826) (102165);
+computer: relevance += 100000 * tf[1](2.000000) * idf[1](0.510826) (102165);
score = relevance(102165);
content: title computer science technology author medium book
@@ -52,10 +54,12 @@ score = relevance(102165);
1
102165
-computer: mult[1] += local_mult(6) / (1+log2(1+lead_decay(0.000000) * length(1)));
-computer: field=title vecf[1] += mult[1](6) / length(3);
+field=title content=The Computer Bible /;
+computer: w[1] += w(6) / (1+log2(1+lead_decay(0.000000) * length(1)));
+computer: tf[1] += w[1](6) / length(3) (2.000000);
+relevance = 0;
idf[1] = log(((1 + total(4))/termoccur(3));
-computer: relevance += 100000 * vecf[1](2.000000) * idf[1](0.510826) (102165);
+computer: relevance += 100000 * tf[1](2.000000) * idf[1](0.510826) (102165);
score = relevance(102165);
content: title the computer bible author medium book
@@ -78,10 +82,12 @@ score = relevance(102165);
1
30649
-computer: mult[1] += local_mult(6) / (1+log2(1+lead_decay(0.000000) * length(8)));
-computer: field=title vecf[1] += mult[1](6) / length(10);
+field=title content=The use of passwords for controlled access to com ...;
+computer: w[1] += w(6) / (1+log2(1+lead_decay(0.000000) * length(8)));
+computer: tf[1] += w[1](6) / length(10) (0.600000);
+relevance = 0;
idf[1] = log(((1 + total(4))/termoccur(3));
-computer: relevance += 100000 * vecf[1](0.600000) * idf[1](0.510826) (30649);
+computer: relevance += 100000 * tf[1](0.600000) * idf[1](0.510826) (30649);
score = relevance(30649);
content: title the use of passwords for controlled access to computer resources author wood helen m medium book
@@ -106,8 +112,9 @@ score = relevance(30649);
1
0
+relevance = 0;
idf[1] = log(((1 + total(4))/termoccur(3));
-computer: relevance += 100000 * vecf[1](0.000000) * idf[1](0.510826) (0);
+computer: relevance += 100000 * tf[1](0.000000) * idf[1](0.510826) (0);
score = relevance(0);
content: title reconstruction tomography in diagnostic radiology and nuclear medicine author medium book