Decentralization of ERD
CTRL + 0 ~ 9 --- formation
Shift + 0 ~ 9 --- join the formation
Ctrl + F (1 ~ 4) --- set building number
Ctrl --- forced attack. Attack the phantom and prevent self injury
Ctrl + Shift --- mobile attack. It can be used to increase the chance of killing the other dog when exploring the way, and can also be used to deal with the sea of spiders and flying soldiers
ALT --- forced movement. To suppress soldiers and evade French artillery
Alt + Z --- pressure. COOL!
Ctrl + Alt --- protect other units
d --- deployment. Especially for the American soldiers and the air defense vehicles equipped with radiation troops
G --- alert. Especially good for phantom
x --- scatter. Mainly used for American soldiers
s --- stop action. It can make the troops stop moving quickly, which is concive to luring the enemy into your superior firepower. It can also make a quick reaction and kill the dog of the other side when they collide with the dog
Ctrl + direction key --- move to the bottom of the screen. It's very good for exploring roads in the early stage
f --- follow the camera
Z --- set movement and attack routes
multi player combat mode key:
tab --- diplomacy menu
A --- alliance
C --- cheers
Enter --- talk to all observers. Press enter to start the conversation function. After entering a message, press enter to send the message. Press the right mouse button to cancel the message
home --- talk to all allies
end --- talk to all players
b --- Set beacon. Press B key, press enter to input message, press enter to send message, and press del to cancel message
Ctrl + F1 ~ F4 --- Set bookmark
F1 ~ F4 --- go to the bookmark location
F5 ~ F12 --- send preset sound effect messages to other players
The common methods are: D expand, H return to the main base, t select all. CTRL + NNM (1 ~ 9) is the number. G is automatic alert{rrrrrrr}
extended materials
game mode
the game has two modes, each mode can set three kinds of difficulty, and all the original game modes are used:
1, plot mode, which can unlock the plot and watch the story in the game. The two sides are fixed and cannot be changed
2. In encounter, players can freely set up both sides and limit weapons, and can freely change the map. Kill all characters except yourself
resource system
players in the game need to proce resources in order to carry out a series of operations. There is only one kind of currency for resources, which follows all the settings of the original version. Players need to use the mining truck to mining or oil wells. Money is the main resource. Money is used to build new buildings, training units or to enable special services
building system
in the game, according to different buildings, it can be divided into the following categories. All the original buildings are used in the game:
1. Base, which can build buildings
Mining equipment, including stopes and oil wells, can make money to buy equipment Barracks, in a broad sense, include airfield, soldier barracks, chariot factory, etc., which can build units Power plant, power plant can rece the cooling time between proction units5. Combat laboratory can unlock more advanced arms, but it will also rece the efficiency of power plant
6. Defense facilities can resist foreign invasion
Super weapons, including nuclear bombs, have great lethality8. Neutral buildings can be protected by garrison. All neutral buildings have their own capacity, and soldiers from both sides are not allowed to enter neutral buildings at the same time
R & D system
in the game, more advanced arms can be unlocked by building all kinds of buildings. Among them, a large number of arms can be built in the combat laboratory, and more than 80 arms can be developed in the game:
< P > 1, soldier, barracks2, engineer, barracks + mining yard
3, police dog, barracks
4, rocket pilot, barracks + air finger Department
5, spy, Barracks + battle lab
6. Seal troops, barracks + battle lab
7. Tanya, barracks + battle lab
8. Hyperspace corps, barracks + battle lab
9. Air defense infantry, barracks + radar
10. Magnetic explosive infantry, barracks
11. Crazy Ivan, barracks + radar
12. Yuri, Barracks + operational Laboratory
according to the relevant provisions of Article 3 of the measures for the implementation of computer technology and software professional and technical qualification (level) examination:
in principle, the computer professional and technical qualification (level) examination shall be held twice a year in the second quarter and the fourth quarter of each year
the registration time of each place is determined by the local examination institution of the place where candidates apply for the examination< (1) computer and software engineering knowledge, the examination time is 150 minutes, written examination, multiple-choice questions
(2) software design, examination time is 150 minutes, written examination, question and answer
subjects include
(1) knowledge of computer and software engineering. The examination time is 150 minutes, with written examination
(2) software design, examination time is 150 minutes, written examination< 2. Examination scope
examination subject 1: computer and software engineering knowledge
1. Fundamentals of computer science
1.1 number system and its conversion
binary, decimal, hexadecimal and other common number systems and their mutual conversion
1.2 data representation
number representation (original code, inverse code, complement code, shift code representation, integer and real number representation inside the computer, Precision and overflow)
non numeric representation (character and Chinese character representation, sound representation, image representation)
verification method and check code (parity check code, Hamming check code (cyclic rendancy check code)
1.3 arithmetic operation and logic operation
binary number operation method in computer
basic operation of logic algebra and simplification of logic expression
1.4 basic knowledge of mathematics
basic knowledge of propositional logic, predicate logic and formal logic
common numerical calculation (error, matrix and determinant, approximate equation solving, interpolation Numerical integration)
permutation and combination, probability theory application, Application Statistics (statistical analysis of data)
basic operation methods (prediction and decision-making, linear programming, network diagram, simulation)
1.5 common data structures
array (static array, dynamic array), linear list, linked list (one-way linked list, two-way linked list, circular linked list), queue, stack, tree (binary tree Search tree, balance tree, clue tree, clue tree, heap), graph definition, storage and operation
hash (storage address calculation, conflict handling)
1.6 common algorithms
sorting algorithm, search algorithm, numerical calculation method, string processing method, data compression algorithm, recursive algorithm, graph related algorithm
the relationship between algorithm and data structure, algorithm efficiency Algorithm design, algorithm description (flow chart, pseudo code, decision table), algorithm complexity
2. Computer system knowledge
2.1 hardware knowledge
2.1.1 composition, architecture classification and characteristics of computer system
composition, performance and basic working principle of CPU and memory
performance of common I / O equipment and communication equipment, And basic working principle
I / O interface function, type and characteristics
I / O control mode (interrupt system, DMA, I / O processor mode)
CISC / RISC, pipeline operation, multiprocessor, parallel processing
2.1.2 storage system
working principle of main memory cache storage system
basic working principle of virtual memory, Performance and price of multi-level storage system
raid type and characteristics
2.1.3 basic knowledge of security, reliability and system performance evaluation
diagnosis and fault tolerance
system reliability analysis and evaluation
computer system performance evaluation method
2.2 software knowledge
2.2.1 operating system knowledge
kernel (interrupt control), process, memory, memory, etc Thread concept
processor management (state transition, sharing and mutual exclusion, time sharing rotation, preemption, deadlock)
storage management (main memory protection, dynamic connection allocation, segmentation, paging, virtual memory)
device management (I / O control, spooling)
file management (file directory, file organization, access method, access control Recovery processing)
Job Management (job scheling, job control language (JCL), multiprogramming)
Chinese character processing, multimedia processing, human-computer interface
basic knowledge of network operating system and embedded operating system
configuration of operating system
2.2.2 knowledge of programming language and language processing program
assembly, compilation, operation and maintenance Explain the basic knowledge and working principle of the system
basic components of programming language: data, operation, control and transmission, process (function) call
main features and applicability of various programming languages
2.3 computer network knowledge
Network Architecture (network topology, OSI / RM, basic network protocol)
transmission medium, transmission technology, network management, etc Transmission method, transmission control
common network equipment and various communication equipment
client / server structure, browser / server structure
LAN topology, access control, LAN networking, LAN connection, Lan-wan connection
basic knowledge and application of Internet
network software
network management
network performance analysis
2.4 database knowledge
functions and characteristics of database management system
database model (conceptual model, external model, internal model)
data model, ER diagram, first paradigm, second paradigm, and The third paradigm
data operation (set operation and relational operation)
database language (SQL)
control function of database (concurrency control, recovery, security, integrity)
basic knowledge of data warehouse and distributed database
2.5 multimedia knowledge
basic knowledge of multimedia system, performance characteristics of multimedia devices, Common multimedia file formats
simple graphics drawing, image file processing methods
Application of audio and video information
multimedia application development process
2.6 system performance knowledge
performance indicators (response time, throughput, turnaround time) and performance design
performance testing and performance evaluation
reliability indicators and calculation Reliability design
reliability testing and reliability evaluation
2.7 basic knowledge of computer application
basic knowledge of information management, data processing, aided design, automatic control, scientific computing, artificial intelligence
basic knowledge of remote communication service
common application systems
3. System development and operation knowledge
3.1 software engineering, software engineering, software engineering, software engineering, software engineering, software engineering, software engineering, software engineering, software engineering, software engineering, software engineering, software engineering, software engineering, software engineering, software engineering, software engineering, software engineering, software engineering Knowledge of software process improvement and software development project management
knowledge of software engineering
objectives and tasks of each stage of software development life cycle
basic knowledge of software development project management (time management, cost management, quality management, human resource management, risk management, etc.) and its common management tools
main software development methods (life cycle method, prototype method Object oriented method, case)
knowledge of software development tools and environment
knowledge of software process improvement
knowledge of software quality management
basic knowledge of software development process evaluation and software capability maturity evaluation
3.2 basic knowledge of system analysis
purpose and task of system analysis
structured analysis method (data flow diagram (DFD), data dictionary (DD),
basic knowledge of system analysis Entity relationship diagram (ERD), structured language for describing processing and processing
unified modeling language (UML)
system specification
3.3 system design knowledge
purpose and task of system design
structured design methods and tools (system flow chart, HIPO diagram, control flow chart)
overall structure design (overall layout, design principle Mole structure design, data storage design, system configuration scheme)
system detailed design (code design, database design, user interface design, process design)
system design specification
3.4 system implementation knowledge
main tasks of system implementation
structured program design, object-oriented program design Visual programming
programming style
choice of programming language
purpose and type of system test, system test method (black box test, white box test, gray box test)
test design and management (error curve, error elimination, convergence, injection fault, test case design, error detection, error detection, etc.) System test report)
basic knowledge of system transformation
3.5 basic knowledge of system operation and maintenance
basic knowledge of system operation and management
basic knowledge of system maintenance
basic knowledge of system evaluation
3.6 object oriented development method
object oriented development concept (class, object, attribute, encapsulation, inheritance, polymorphism Object oriented design method (architecture, class design, user interface design)
object oriented implementation method (programming language selection, class implementation, method implementation, user interface implementation, user interface implementation, user interface implementation, user interface implementation, user interface implementation, user interface implementation, user interface implementation, user interface implementation, user interface implementation, user interface implementation, user interface implementation, user interface implementation, user interface implementation, user interface implementation, user interface implementation, user interface implementation, user interface implementation, user interface implementation, user interface implementation, user interface implementation, user interface implementation, user interface Preparation of test data)
basic mechanism of object-oriented programming languages (such as C + +, Java, visual basic, Visual C + +)
concept of object-oriented database and distributed object
4. Security knowledge
basic concept of security
prevention of computer virus and computer crime
access control, intrusion prevention and control Security management measures
encryption and decryption mechanism
risk analysis, risk types, anti risk measures and internal control
5. Standardization knowledge
standardization awareness, standardization development, standard formulation process
basic knowledge of international standards, national standards, instry standards and enterprise standards
code standards, file format standards, security standards Knowledge of software development specification and document standard
standardization organization
6. Basic knowledge of informatization
informatization awareness
global informatization trend, national informatization strategy, enterprise informatization strategy and strategy
relevant laws and regulations
distance ecation, e-commerce E-government and other basic knowledge
enterprise information resource management basic knowledge
7. Computer professional English
master the basic vocabulary of computer technology
be able to correctly read and understand the English materials in the computer field
examination subject 2: software design
1. External design
1.1 understand the system requirements
1.2 preparation for system development
select the development method Prepare the development environment and make the development plan
1.3 design the system function
select the system structure, design the function and interface of each subsystem, design the security strategy, requirements and implementation method, formulate the detailed workflow and data flow
1.4 design the data model
design the ER model and data model
1.5 write the external design documents
system configuration diagram Each subsystem diagram, system flow chart, system function specification, input and output specification, data specification, user manual framework
design system test requirements
1.6 Design Review
2. Internal design
2.1 design software structure
decompose by component, Determine the functional specifications of components and the interfaces between components
use middleware and tools
2.2 to design input and output
screen interface design, design input and output check method and check information
2.3 to design physical data
analyze data characteristics, determine logical data organization mode and storage medium, Design record format and processing method
replace logical data structure with physical data structure, calculate capacity and optimize
2.4 component creation and implementation
2. Thermochemical data and common maps http://webbook.nist.gov/
3 http://china.chemnet.com/
4. China Patent Search (State Intellectual Property Office) http://www.sipo.gov.cn/sipo/zljs/default.htm
5. US patents http://www.uspto.gov/patft/index.html
6 http://ull.chemi Try. Uakron. E / ERD / index. PHP
7 http://www.sigmaaldrich.com/catalog/search/AdvancedSearchPage
8. Response retrieval http://www.stolaf.e/depts/chem ... tie / medialib / data /
9 http://www.ncbi.nlm.nih.gov
10. Chemical properties http://chemfinder.cambridgesoft.com/
11 Interest http://www.surfip.gov.sg/sip/site/sip_ Home. HTM
12. Look up organic syntheses http://www.orgsyn.org/
13. Network translation http://www.worldlingo.com/wl/tra ... er_ Translation. HTML
14 http://www.syntheticpages.com/
15 http://chem.sis.nlm.nih.gov/chemidplus/
16 http://www.thieme-connect.com/ejournals/home.html
17. My mobile hard disk http://www.mofile.com/ ID saltyf mm: wlh1126
18 :
http://www.aist.go.jp/RIODB/SDBS/menu-e.html A free database containing 49800 IR spectra
was established http://www.wpi.e/Academics/Dep ... h2670 / infrared.html IR spectral basis
http://chipo.chem.uic.e/web1/ocol/spec/IR.htm
infrared basis, There are exercises to solve.
http://www.chem.ucalgary.ca/cour ... ch13-ir-4.html the interpretation of several IR spectra
http://www.sienahts.e/~swathen ... es/IR_ oil_ 2002. HTML IR spectrum of fats and oils http://www.chem.ucla.e/~webspectra/ An online problem solving library. Suitable for beginners! There are nearly a hundred exercises and answers< br /> http://www.organic.wsu.e/chem341/IRProblemSet.pdf IR absorption frequency table and exercises (PDF)
http://www.dq.fct.unl.pt/qoa/jas/ir.html IR network resources, may be useful to you.
http://wwwchem.csustan.e/Tutorials/INFRARED.HTM The interpretation of infrared spectrum is very good, The vibration of functional groups were all marked
http://www.sigmaaldrich.com/Bran ... s / solvents. HTML
IR solvents http://www.spectrosnow.com/Spy/pdfs/eac10815.pdf Infrared spectrum analysis, practice. (PDF file, 243K) has typical IR spectrum, data.
http://chemistry.uah.e/faculty ... 331chap12-ir.pdf an IR courseware (PDF), with pictures, Brief attribution of the peak.
20. European Patents http://ep.espacenet.com/search97 ... late = EP / en / home. HTS
21. Organic syntheses http://www.chemport.ru/index.php?cid=47
22. Boiling point conversion tools under different pressures http://www.ch.cam.ac.uk/magnus/boil.html
23 Database http://202.127.145.134/ ID: tf123456 mm: 654321
24 http://www.pat2pdf.org/
25. China Derui digital multimedia center http://ebook.hzrtvu.e.cn/dlib/defaults.asp
26. classic organic chemistry : http://www.chempensoftware.com/organicreactions.htm
27 a website for online query of reaction routes, Organic synthesis is a good place to go< br /> http://www.stolaf.e/depts/chem ... tie / medialib / data /
these are good!
in China, the Nanjing Massacre is often an important concern of nationalism. In Japan, however, the public's understanding of the Nanjing massacre has a wide range of different emotions and views. In particular, some far right Japanese believe that the Nanjing Massacre is an exaggerated or even fabricated Anti Japanese diplomatic tool. Some also believe that the denial of the Nanjing Massacre is a manifestation of historical revisionism and denial. Because the Japanese have different opinions on the Nanjing Massacre, depending on the views of the speakers, the Nanjing Massacre may be called "Nanjing Massacre", "Nanjing Massacre", and "Nanjing Incident". The understanding of Nanjing Massacre is one of the problems in the diplomatic and people's relations between China and Japan
in western countries such as Europe and the United States, the Nanjing Massacre is generally translated into English as Nanjing massacre or rape of Nanjing, but on the whole, people's understanding of it is often far less than that of the Nazi genocide
few Chinese and Japanese who witnessed and witnessed the Nanjing massacre are still alive, and those who can witness will soon die with the time. However, this unprecedented tragedy in Chinese history is still pending. Let us alive, especially the generation who witnessed this period of history, have the responsibility to thoroughly clarify the Nanjing Massacre, the most outstanding Japanese military crime in the second Sino Japanese War, so as to vindicate our ancestors, set an example for our descendants, and even more for the 340000 compatriots who died in the Nanjing Massacre
date and place: ring the trial in Nanjing (from January 1946 to November 1948), he personally experienced the "Nanjing Massacre" and was once a "member of the International Committee of Nanjing security zone", pastor Meiqi (after returning to the United States, he served as the resident pastor of Yale University), Professor Bates (Professor of history, Jinling University, later vice president of the University), After returning to the United States, he served as professor of New York United Theological College and vice president of Nanjing Red Cross Society. Bedes said: "after the fall of Nanjing, the terror reached its peak in two and a half to three weeks, and the terror was serious from the sixth to the seventh week." In addition, the treasurer and Secretary of the International Committee of Nanjing security zone, Professor of Sociology of Jinling University, Mr. Smith, also told the Nanjing trial court that "in the first six weeks, he protested twice a day." Thus, the Far East International Military Court ruled that "in the first six weeks after the Japanese occupation, the total number of civilians and prisoners slaughtered in and around Nanjing was more than 200000.". Therefore, most scholars and ordinary people follow the "Nanjing Massacre" for only six weeks“ The "Nanjing Massacre" is not just six weeks, although the massacre in these six weeks is the most serious
if we need to specify the most serious stage of the Nanjing Massacre, it should be from the fall of Nanjing on December 13, 1937 to the arrival of the new Japanese garrison commander, naojiro Tanya, on February 5, 1938. Two days later, shigen Matsui, commander in chief of Japan's Shanghai Garrison, ordered the restoration of order in Nanjing. Despite the promises of general Matsui and major general Tiangu, the Japanese massacre, rape, plunder and arson in Nanjing did not improve significantly. At that time, the administrative secretary of the Nazi German Embassy in China, George W; Rosen's telegram from Nanjing to the Ministry of foreign affairs in Berlin on February 10, 1938 also said: "the Japanese terror rule in Nanjing has reached an unprecedented level." In his telegram on March 4, he made a clearer analysis of the Japanese atrocities: "the situation in and around Nanjing has been somewhat stable in February and this month... The number of Japanese atrocities has decreased, but the nature has not changed." Rosen also mentioned that until the day he started writing a letter (March 4), there was no Chinese store in Nanjing. Professor Smith said in his 1938 book "a portrait of the disaster of war in Nanjing" that in March 1938, many gates in Nanjing were still sealed. In addition, Falkenhausen, head of Chiang Kai Shek's German Advisory Group, stayed in Nanjing at that time and worked in the German Embassy. His manuscript records that "a Japanese soldier raped a girl in an American church on March 19.". The terrorist situation of Nanjing in February and March reported by the westerners who stayed in Nanjing is completely in line with the description made by many Chinese who stayed in Beijing. On February 15, 1938, Jin shengpan, the director of the field rescue department, and Jiang gonggu, the section chief, made their first tour of the urban area after the fall of Nanjing in the car of liges, an American overseas Chinese. In his march of the fall of Nanjing, Jiang recorded the following: "out of Xinjiekou, through Taiping Road, Confucius Temple, turn to Zhongshan Road, there are no houses along the way, Except for the enemy soldiers, the pedestrians can never see anyone else. We can't bear to see the desolate scene again. "
commander Guo Qi of the Central Military Academy of Chiang Kai Shek's Guard Corps fled three months after the fall of Nanjing. He wrote a record of blood and tears in the fallen capital, which was serialized in xijingping daily in August 1938. After the war, Guo appeared in court to testify in China's military court for the trial of war criminals and confronted Gu Shoufu, head of the sixth division of the Japanese army, as the crazy executioner of the Nanjing Massacre. Guo wrote: "it's said that the beast soldiers always shoot, rape and kill in the first three days after they come in... As a result, it doesn't stop after a week, and it doesn't stop after three months!" Niu Xianming, another battalion commander of the Corps, graated from the Japanese Sergeant school. At the beginning of the Anti Japanese War, he was studying in the French military academy and immediately returned to serve his country. After being trapped in the enemy's rear, Niu Luofa became a monk. He had lived in Nanjing for eight months before escaping. Now he is still living in Los Angeles, USA. In his book "return to vulgarity", he describes the scene of a masquerade monk escaping from danger by taking the Beijing Shanghai train: "at that time, Beijing and Shanghai had been occupied for more than half a year. In order to ensure their rule, the Japanese military gendarmes were no longer able to kill openly in public places,... Under the surveillance of the devils, I dare not look around too much; So I took back my sight, closed my eyes, and rubbed the Buddha beads on my neck with one hand to chant Buddha Li kechen, a cultural man, fled from Nanjing on June 3, 1938, after more than two months of refuge in the countryside in the west of Nanjing. He wrote the May story of falling into Beijing, which was serialized in Hankou Ta Kung Pao in July 1938. Li described what he saw in Nanjing: "recently, although it is rare for Japanese soldiers to rape women in the daytime, it is still very common at night. When my female compatriots were walking in the street, the Japanese soldiers came forward to stop them. In the name of inspection, they felt all over their bodies, molested and played with them at will. But they had to bear humiliation and listen to their actions. Otherwise, they would raise their bayonets and stab them to death immediately. Therefore, there was no woman in the street ring the day. "
the terror situation in Nanjing lasted until the summer of 1938, although it was obvious that after the middle of March, the extent of massacre and altery graally decreased. It can be said that the period from the middle of March to the end of May is the "small Massacre". The most powerful proof is that two charities (Nanjing Branch of the World Red Cross and Nanjing Branch of the Chinese Red Cross) buried 806 people in May 1938. Lin Na explained the reason in her "a tale of blood and tears in Jinling": "from the time the Japanese soldiers entered the city to the time I left - May 20 - the work of burying the corpses never stopped. In fact, they could not be buried either. One batch of them were buried, and another batch of them were added immediately." Although the self governing Committee of traitors was established in Nanjing as early as January 1, 1938, with Tao Baoqing and sun Shurong as the chairman and vice chairman, it failed to delay the burning, killing, rape and plundering of the Japanese army, so that the "small Massacre" continued until the summer of 1938. The order of Nanjing was not restored until November 1938, when Liang Hong's "reform government" (established in Shanghai in March) was still in Nanjing. Objectively speaking, the time limit of "Nanjing Massacre" should be said to be "half a year", or three months of "massacre" and three months of "small Massacre"“ In the first six weeks after the Japanese occupation, more than 200000 civilians and prisoners were slaughtered in Nanjing and its vicinity, the judgment of the Tokyo Trial said And he said, "people outside the city are a little better than those inside. All the villages within 200 Li (66 miles) around Nanjing are in the same state in general. "“ "200 Li around Nanjing" should be referred to as "Nanjing and its vicinity". It starts from Wulong mountain in the northeast of Nanjing City in the East, on the South Bank of the Yangtze River, passes through yaohuamen, xianhemen, qilinmen, Maqun, cangbomen, gaoqiaomen, shangshangzhen, crosses the Qinhuai River in the East, goes to huashentemple and Jijiawa in the west, crosses the Jiangnan (Beijing Jiangxi) Railway in the west, and goes to Shanghe town opposite Jiangxinzhou in the northeast. In fact, this is the defense line for Nanjing, mainly in the southeast of Nanjing, which is also a densely populated area. At the same time, this area was the battlefield of Nanjing's defense, and most villagers fled before the Japanese army arrived. Most of them were old and weak, women and children. Few of the Japanese who failed to escape were spared
the Japanese army slaughtered the city all the way to Nanjing
the Japanese army forced 200000 troops to Nanjing, slaughtered the city all the way, raped, built houses and ruins, and disappeared. After landing at Jinshanwei in Hangzhou Bay on November 5, the sixth division of the Japanese army went directly north to break Songjiang city. According to Tian Bolie, a famous journalist of the British "Manchester Guardian", reported a telegram sent by a British journalist after his personal visit to Songjiang on January 14, 1938: "the whole city of Songjiang could have accommodated about 100 thousand residents, but I only saw five old Chinese hiding in a house of the French church with tears. They had cut off their food and begged me to take them to Shanghai." Suzhou, known as Venice of China, was captured by the third division of the Japanese army on November 19. According to an article in Shanghai's Miller's review in 1938, "the beautiful and elegant Suzhou city had 350000 residents, but after the Japanese army occupied the city, there were only 500 left." But the most painful thing is as follows: "the Japanese army insulted women from all walks of life. I'm afraid no one can estimate how many women have been raped by Japanese soldiers who are full of animal lust. " In his recent book Chinese women as Japanese army comfort women, Su Zhenqi said: "after the fall of Suzhou City, more than 2000 women were taken captive." In her article "the founding of the people's Republic of China ring the Anti Japanese War and women's issues" published in Chongqing's Central Daily on January 15, 1939, Chiang Kai Shek's wife, Song Meiling, confirmed that the Japanese army not only gave the number of the abcted women for altery, but also "stripped them of their clothes and stabbed them on their shoulders" in public. On the one hand, it shames our female compatriots and prevents them from running away. On the other hand, it serves as a tool for their animal desire. " Wuxi, known as "little Shanghai", is an instrial center with a population of 900000 at ordinary times. Since late October 1937, it has been bombed by Japanese planes almost every day. According to the above-mentioned article in Miller's review, on November 10, the Japanese army dropped more than 160 bombs in one day, causing rubble to the factories and commercial areas of the city and casualties to the military and the people
