Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Environmental Sciences (229)
- Natural Resources and Conservation (210)
- Environmental Monitoring (138)
- Computer Sciences (79)
- Mathematics (74)
-
- Natural Resources Management and Policy (73)
- Water Resource Management (72)
- Social and Behavioral Sciences (64)
- Sociology (56)
- Information Security (55)
- Criminology (54)
- Criminology and Criminal Justice (54)
- Legal Studies (54)
- Forensic Science and Technology (50)
- Physics (44)
- Chemistry (28)
- Earth Sciences (23)
- Geology (12)
- Education (11)
- Life Sciences (10)
- Astrophysics and Astronomy (8)
- Applied Mathematics (6)
- Curriculum and Instruction (6)
- Biochemistry, Biophysics, and Structural Biology (5)
- Oil, Gas, and Energy (5)
- Psychology (5)
- Science and Mathematics Education (5)
- Statistics and Probability (5)
- Environmental Chemistry (4)
- Keyword
-
- Natural resource management (70)
- Natural resources (70)
- Taunton River (70)
- Water conservation projects (70)
- Thesis (18)
-
- Cybercrime (14)
- Cybersecurity (12)
- Mathematics (11)
- Cyberbullying (8)
- Newsletter (8)
- Chemistry (7)
- Physics (7)
- Orthophotomaps (6)
- Geology (5)
- Gravitational lensing (5)
- Astrophysics (4)
- Cyberterrorism (4)
- Technology (4)
- DNA (3)
- Forecasting (3)
- Graph Theory (3)
- Massachusetts (3)
- Optical Tweezers (3)
- Statistics (3)
- Awareness (2)
- Bridgewater State University (2)
- COVID-19 (Disease) (2)
- Computer Science (2)
- Computer science (2)
- Computers (2)
- Publication Year
- Publication
-
- Watershed Access Lab Projects (138)
- Honors Program Theses and Projects (97)
- Undergraduate Review (55)
- International Journal of Cybersecurity Intelligence & Cybercrime (54)
- Public Meetings (25)
-
- Bridgewater Review (23)
- Phase II Final Report (18)
- Phase I Final Report (14)
- Mathematics Faculty Publications (12)
- Physics Faculty Publications (11)
- Department of Mathematics Newsletter (10)
- Reference Documents (7)
- Maps (6)
- Chemical Sciences Faculty Publications (3)
- Computer Science Faculty Publications (3)
- Geological Sciences Faculty Publications (3)
- Master’s Theses and Projects (3)
- The Graduate Review (2)
- Archives & Special Collections Finding Aids (1)
- Center for Sustainability Magazine (1)
- Management Faculty Publications (1)
- Publication Type
Articles 1 - 30 of 487
Full-Text Articles in Physical Sciences and Mathematics
Navigating The Digital Frontier: The Intersection Of Cybersecurity Challenges And Young Adult Life, Hannarae Lee
Navigating The Digital Frontier: The Intersection Of Cybersecurity Challenges And Young Adult Life, Hannarae Lee
International Journal of Cybersecurity Intelligence & Cybercrime
Papers from this issue advocate for empowering young adults with knowledge and tools to navigate cyberspace safely, emphasizing the necessity of heightened cybersecurity measures and proactive education. As we advance into the digital abyss, this call becomes imperative, ensuring that the young adults' experience remains a journey of growth and enlightenment, unaffected by the shadows of unseen online threats.
The Need For A Cybersecurity Education Program For Internet Users With Limited English Proficiency: Results From A Pilot Study, Fawn T. Ngo, Rustu Deryol, Brian Turnbull, Jack Drobisz
The Need For A Cybersecurity Education Program For Internet Users With Limited English Proficiency: Results From A Pilot Study, Fawn T. Ngo, Rustu Deryol, Brian Turnbull, Jack Drobisz
International Journal of Cybersecurity Intelligence & Cybercrime
According to security experts, cybersecurity education and awareness at the user level are key in combating cybercrime. Hence, in the U.S., cybersecurity and Internet safety workshops, classes, and resources targeting children, adolescents, adults, and senior citizens abound. However, most cybercrime prevention programs are only available in English, thus, ignoring a substantial proportion of Internet users and potential cybercrime victims—Internet users with limited English proficiency (LEP). Yet, successfully combating cybercrime requires that all computer and Internet users, regardless of their language abilities and skills, have access to pertinent cybersecurity information and resources to protect themselves online. This paper presents the results …
Book Review: Tracers In The Dark: The Global Hunt For The Crime Lords Of Cryptocurrency, Marion Jones
Book Review: Tracers In The Dark: The Global Hunt For The Crime Lords Of Cryptocurrency, Marion Jones
International Journal of Cybersecurity Intelligence & Cybercrime
Doubleday released Andy Greenberg’s Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency in November 2022. Through vivid case studies of global criminal investigations, the book dispels myths about the anonymizing power of cryptocurrency. The book details how the ability to identify cryptocurrency users and payment methods successfully brought down several large criminal empires, while also highlighting the continuous cat-and-mouse game between law enforcement officials and criminal actors using cryptocurrency. The book is an excellent resource for law enforcement officials, academics, and general cybersecurity practitioners interested in cryptocurrency-related criminal activities and law enforcement techniques.
Computing An Image Of Objects Hiding Behind A Black Hole, Shannon Harding
Computing An Image Of Objects Hiding Behind A Black Hole, Shannon Harding
Honors Program Theses and Projects
Gravitational lensing is the bending of light rays around a black hole. The goal of this project was to produce a computer code that would model light rays coming from a grid of objects set behind a rotating black hole. Using these light rays, we produced an image illustrating how this background of objects would appear to an observer on Earth. This was done by creating a MATLAB code to model the paths of multiple light rays at a time. This code was then used to help check and correct a C++ code that produced an image. Over the semester, …
Investigation Of Electron Transfer In The Ksha-Kshb-R286a Protein Complex From Mycobacterium Tuberculosis, Elyse Tavares
Investigation Of Electron Transfer In The Ksha-Kshb-R286a Protein Complex From Mycobacterium Tuberculosis, Elyse Tavares
Honors Program Theses and Projects
With drug-resistant bacteria such as Mycobacterium tuberculosis being a serious public health problem, infected individuals have minimal treatment options. By investigating the electron transfer within 3-ketosteroid-9��-hydroxylase (KshAB), a protein involved in the energy production pathway of this bacteria, it will allow for potential inhibitors of this enzyme to be designed as antibiotics against tuberculosis. The purpose of this project is to stop the interaction between the KshA and KshB complexes to prevent the bacteria from gaining energy by breaking down steroids like cholesterol. To achieve this goal, an arginine at the 286th position of the KshB protein was mutated to …
Harnessing Large Language Models To Simulate Realistic Human Responses To Social Engineering Attacks: A Case Study, Mohammad Asfour, Juan Carlos Murillo
Harnessing Large Language Models To Simulate Realistic Human Responses To Social Engineering Attacks: A Case Study, Mohammad Asfour, Juan Carlos Murillo
International Journal of Cybersecurity Intelligence & Cybercrime
The research publication, “Generative Agents: Interactive Simulacra of Human Behavior,” by Stanford and Google in 2023 established that large language models (LLMs) such as GPT-4 can generate interactive agents with credible and emergent human-like behaviors. However, their application in simulating human responses in cybersecurity scenarios, particularly in social engineering attacks, remains unexplored. In addressing that gap, this study explores the potential of LLMs, specifically the Open AI GPT-4 model, to simulate a broad spectrum of human responses to social engineering attacks that exploit human social behaviors, framing our primary research question: How does the simulated behavior of human targets, based …
Understanding The Use Of Artificial Intelligence In Cybercrime, Katalin Parti, Thomas Dearden, Sinyong Choi
Understanding The Use Of Artificial Intelligence In Cybercrime, Katalin Parti, Thomas Dearden, Sinyong Choi
International Journal of Cybersecurity Intelligence & Cybercrime
Artificial intelligence is one of the newest innovations which offenders exploit to satisfy their criminal desires. Although understanding cybercrime that is associated with this relatively new technology is essential in developing proper preventive measures, little has been done to examine this area. Therefore, this paper provides an overview of the two articles featured in the special issue of the International Journal of Cybersecurity Intelligence and Cybercrime, one about deepfakes in the metaverse and the other about social engineering attacks. The articles were written by the winners of the student paper competition at the 2023 International White Hat Conference.
Victimization By Deepfake In The Metaverse: Building A Practical Management Framework, Julia Stavola, Kyung-Shick Choi
Victimization By Deepfake In The Metaverse: Building A Practical Management Framework, Julia Stavola, Kyung-Shick Choi
International Journal of Cybersecurity Intelligence & Cybercrime
Deepfake is digitally altered media aimed to deceive online users for political favor, monetary gain, extortion, and more. Deepfakes are the prevalent issues of impersonation, privacy, and fake news that cause substantial damage to individuals, groups, and organizations. The metaverse is an emerging 3-dimensional virtual platform led by AI and blockchain technology where users freely interact with each other. The purpose of this study is to identify the use of illicit deep fakes which can potentially contribute to cybercrime victimization in the metaverse. The data will be derived from expert interviews (n=8) and online open sources to design a framework …
An Exposition From Four-Vector To Quantum Field Theory, Weverton Dos Santos Alves
An Exposition From Four-Vector To Quantum Field Theory, Weverton Dos Santos Alves
Honors Program Theses and Projects
The goal of this thesis is to research leading mass-generation theoretical models in particle physics; Which is the physics that fundamentally imparts mass on the known elementary particles. Before these mechanisms, all particles are massless quantum fields. As part of a 2021 REU (Research Experience for Undergraduates) and a team investigating quark mass at Jefferson National Lab, I worked on a mechanical design of the Lepton Direction Electromagnetic calorimeter part of the detector upgrade for the Brookhaven National Laboratory. As integral as this effort is, because the theoretical aspects of mass generation and quark mass physics are traditionally beyond what …
An Investigation Into The Use Of Ionic Liquid Solvents As Potential Therapeutic Agents To Help Alleviate Disease Caused By The Formation Of Insoluble Plaque Or Depositions, Sundus Alchaar
Honors Program Theses and Projects
Many diseases are caused or worsened by the formation of insoluble aggregates inside the human body, most of which are currently treated by maintenance medication or surgery. Biocompatible Ionic Liquids (ILs) have been explored for use as therapeutic agents, and are also excellent solvents, due to their versatile physical and chemical properties. The aim of this project was to conduct a preliminary exploration of the use of ILs to dissolve different types of depositions, such as kidney stones and crystal-induced arthropathies, and plaques. An imidazolium-based IL and four biocompatible choline amino acid-based ILs ([Ch][AA]-ILs) were synthesized, which are 1-methyl-3-butyl-methylimidazolium iodide …
Atlantic Zambezi Global, Dabana Intenque
Atlantic Zambezi Global, Dabana Intenque
Honors Program Theses and Projects
The purpose of “Atlantic Zambesi Global” is to offer an online marketplace that does not exist in my home country. People in Guinea struggle when they want something that does not exist in the region. The current way they get the product they want: 1. Either by someone getting the product for them 2. By traveling to get the product themselves. I created an online delivery system that will help people get their basic needs products at home and spend less.
Optimizing Photosystem I And Plastocyanin Isolation To Develop A Photosystem I-Catalyst System For Photochemical Hydrogen Production, Angelina Vuong
Optimizing Photosystem I And Plastocyanin Isolation To Develop A Photosystem I-Catalyst System For Photochemical Hydrogen Production, Angelina Vuong
Honors Program Theses and Projects
Over the course of many years, greenhouse gases such as carbon dioxide (CO2) and methane (CH4) have formed in large amounts in the atmosphere, which has contributed to global warming. Global warming can lead to extreme weather conditions or have an impact on living organisms, for example, wildfires, droughts, limited amount of food sources, and respiratory issues from pollution. This is mainly due to the use of burning fossil fuel as an energy source, which emits greenhouse gases into the air and traps heat into the atmosphere. Thus, the aim of this study is to assemble and characterize a system …
The Process Of Using Unity To Create A 2d Video Game, Sean Tammelleo
The Process Of Using Unity To Create A 2d Video Game, Sean Tammelleo
Honors Program Theses and Projects
No abstract provided.
Exploring The Interaction Of Minor-Groove-Binder Netropsin With Dna Using Optical Tweezers, Irbazhusain Shaikh
Exploring The Interaction Of Minor-Groove-Binder Netropsin With Dna Using Optical Tweezers, Irbazhusain Shaikh
Honors Program Theses and Projects
Netropsin is an antibiotic that binds in the minor grooves of DNA, which also exhibits anticancer properties. There have been many previous studies that explored the binding of this drug to DNA using traditional methods where an ensemble averaging is used. In this study we explore the interaction of Netropsin with DNA at a single molecule level using dual beam optical tweezers. We trapped and stretched a single DNA molecule using optical tweezers to measure the force experienced by the DNA as a function of extension in the absence and presence of various concentrations of Netropsin. Our results show the …
Time Series Analysis Of Major League Baseball Organizations’ Fan Attendance, Joseph Molis
Time Series Analysis Of Major League Baseball Organizations’ Fan Attendance, Joseph Molis
Honors Program Theses and Projects
Throughout baseball’s rich and long history, fans have been one of the most integral parts of the game. However, in recent years, baseball has seen a decrease in fans, allegedly due to the pace of play, or the length of games. Baseball games can take up to four hours to complete, and in today’s fast-moving society where all information is at one’s fingertips, it is believed that baseball’s slower pace turns people away from the game. However, how true is that? The primary goal of this project is to build models to accurately forecast fan attendance for every Major League …
Use Of Social Media During The Covid-19 Pandemic Of 2020, Aliya Goncalves Almeida
Use Of Social Media During The Covid-19 Pandemic Of 2020, Aliya Goncalves Almeida
Honors Program Theses and Projects
Nowadays billions of people use social media platforms as a way to keep in touch with family and friends, fill spare time, find content, find inspiration for things to do and buy, share, and discuss opinions with others, and the list goes on. This project focused and investigated on the use of social media during the years, in particular during quarantine/lockdown. Utilizing the public source data, I explored several research questions including how many hours people spent on social media, the popularity of social media apps, as well as what age group uses social media platforms (teenagers, young adults, adults). …
Understanding Quantum Field Theory And Standard Model To Explore Beyond Standard Model Physics, Alize Sucsuzer
Understanding Quantum Field Theory And Standard Model To Explore Beyond Standard Model Physics, Alize Sucsuzer
Honors Program Theses and Projects
Motivated by the goal of participating in astroparticle physics research in graduate school, we aimed to understand the Standard Model of particle physics and the Feynman diagrams through which particle interactions are described, so that we could learn about the properties of certain astroparticles. The axiomatic principle that governs fundamental physics is manifest covariance, implying that the mathematical forms of the physical laws are the same to all observers. Maintaining covariance requires 4-vector representation using group theoretical techniques based on symmetries, as well as a transition from single-particle quantum physics to many-particle quantum field theory (QFT). The Standard Model of …
Threat Construction And Framing Of Cyberterrorism In The U.S. News Media, Mehmet F. Bastug, Ismail Onat, Ahmet Guler
Threat Construction And Framing Of Cyberterrorism In The U.S. News Media, Mehmet F. Bastug, Ismail Onat, Ahmet Guler
International Journal of Cybersecurity Intelligence & Cybercrime
This research aims to explore the influence of news media on the fear of cyberterrorism and how cyberterrorism is framed in the media. Using a mixed-method approach as a research strategy, this paper reports on two studies that explore the influence of news reading on the fear of cyberterrorism. The first study analyzed survey responses from 1,190 participants and found that increased exposure to reading news media was associated with increased fear of cyberterrorism. The second study, built on the first, sought to investigate how cyberterrorism is framed and constructed as a threat by the US local and national newspapers. …
Prevalence And Trends Of Depression Among Cyberbullied Adolescents - Youth Risk Behavior Survey, United States, 2011 – 2019, Jason Nicholson, Catherine Marcum, George E. Higgins
Prevalence And Trends Of Depression Among Cyberbullied Adolescents - Youth Risk Behavior Survey, United States, 2011 – 2019, Jason Nicholson, Catherine Marcum, George E. Higgins
International Journal of Cybersecurity Intelligence & Cybercrime
The difference in depression between non-cyberbullied and cyberbullied youth is not well understood. To describe the prevalence and trends in depression among cyberbullied adolescents. Using cross-sectional, nationally-representative data from the YRBS 2011 - 2019, we estimated the prevalence and trends of depression across the total years and within cyberbullied groups that include biological sex and race and ethnicity among adolescents. The results indicated the prevalence of depression was higher among those that were cyberbullied. Within the cyberbullied groups the total trend was higher than the non-cyberbullied, females had a higher prevalence of depression than males, and Hispanics had a higher …
New Knowledge, Better Decisions: Promoting Effective Policymaking Through Cybercrime Analysis, Austen D. Givens
New Knowledge, Better Decisions: Promoting Effective Policymaking Through Cybercrime Analysis, Austen D. Givens
International Journal of Cybersecurity Intelligence & Cybercrime
This editorial introduction will present an overview of the four articles contained in this issue of the International Journal of Cybersecurity Intelligence and Cybercrime. The articles examine the profiling of hackers, the role of the media in shaping public perceptions of cyberterrorism, research trends in cybersecurity and cybercrime, as well as the impacts of cyberbullying.
Research Trends In Cybercrime And Cybersecurity: A Review Based On Web Of Science Core Collection Database, Ling Wu, Qiong Peng, Michael Lembke
Research Trends In Cybercrime And Cybersecurity: A Review Based On Web Of Science Core Collection Database, Ling Wu, Qiong Peng, Michael Lembke
International Journal of Cybersecurity Intelligence & Cybercrime
Studies on cybercrime and cybersecurity have expanded in both scope and breadth in recent years. This study offers a bibliometric review of research trends in cybercrime and cybersecurity over the past 26 years (1995-2021) based on Web of Science core collection database. Specifically, we examine the growth of scholarship and the expanded scope of subject categories and relevant journals. We also analyze the research collaboration network based on authors’ affiliated institutions and countries. Finally, we identify major topics within the fields, how each topic relates to – and diverges from – one another, and their evolution over time. Overall, we …
Understanding The Connection Between Hackers And Their Hacks: Analyzing Usdoj Reports For Hacker Profiles, Joshua Gerstenfeld
Understanding The Connection Between Hackers And Their Hacks: Analyzing Usdoj Reports For Hacker Profiles, Joshua Gerstenfeld
International Journal of Cybersecurity Intelligence & Cybercrime
Recently, it seems as if hacking-related stories can be found in the news every day. To study, and hopefully prevent, this new type of crime, the field of cyber criminology has emerged. This study adds to the existing cybercrime literature by examining hacking behavior specifically. It determines if there is a relationship between the age, gender, and nationality of hackers and characteristics of the cyberattacks that they perpetrate. To do this, this study analyzes 122 United States Department of Justice (USDOJ) press reports from January 2019 to December 2021. Some key results include the finding that older hackers and international …
Understanding Deviance And Victimization In Cyber Space Among Diverse Populations, Insun Park
Understanding Deviance And Victimization In Cyber Space Among Diverse Populations, Insun Park
International Journal of Cybersecurity Intelligence & Cybercrime
Recent years have witnessed a growing academic interest in deviance and victimization in the cyber space. The current issue of the International Journal of Cybersecurity Intelligence and Cybercrime features three empirical research articles on online behavior of traditionally under-researched populations and a review of much waited book on digital forensics and investigation. This paper was prepared to introduce these important scholarly works in the context of newly emerging scholarship that focuses on the experiences of diverse subgroups in cyberspace.
Aggressive Reality Docuseries And Cyberbullying: A Partial Test Of Glaser’S Differential Identification Theory, J. Ra’Chel Fowler, Darren R. Beneby, Kenethia L. Fuller
Aggressive Reality Docuseries And Cyberbullying: A Partial Test Of Glaser’S Differential Identification Theory, J. Ra’Chel Fowler, Darren R. Beneby, Kenethia L. Fuller
International Journal of Cybersecurity Intelligence & Cybercrime
Reality docuseries have dominated primetime airwaves for the greater part of three decades. However, little is known about how viewers who are enamored with the genre’s most aggressive characters are influenced. Using Glaser’s (1956) theory of differential identification, this study employs survey data from 210 college students at a historically Black college and university to explore whether identification with characters from aggressive reality docuseries (ARDs) and the frequency of viewing ARD are positively associated with cyberbullying. Results of multivariate analyses revealed that men were more likely than women to publicly shame others and air other’s dirty laundry online. Additionally, the …
Emerging Trends In Cybercrime Awareness In Nigeria, Ogochukwu Favour Nzeakor, Bonaventure N. Nwokeoma, Ibrahim Hassan, Benjamin Okorie Ajah, John T. Okpa
Emerging Trends In Cybercrime Awareness In Nigeria, Ogochukwu Favour Nzeakor, Bonaventure N. Nwokeoma, Ibrahim Hassan, Benjamin Okorie Ajah, John T. Okpa
International Journal of Cybersecurity Intelligence & Cybercrime
The study examined the current trend in cybercrime awareness and the relationship such trend has with cybercrime vulnerability or victimization. Selecting a sample of 1104 Internet users from Umuahia, Abia State, Nigeria, We found that: 1) awareness of information security was high in that about 2 in every 3 (68%) participants demonstrated a favorable awareness of information security and cybercrime. It was, however, revealed that such a high level of awareness could be partial and weak. 2) most Internet users demonstrated the awareness of fraud-related cybercrime categories (39%), e-theft (15%), hacking (12%), and ATM theft (10%). However, they were rarely …
Book Review: Digital Forensics And Cyber Investigation
Book Review: Digital Forensics And Cyber Investigation
International Journal of Cybersecurity Intelligence & Cybercrime
No abstract provided.
Kerberoasting: Case Studies Of An Attack On A Cryptographic Authentication Technology, D Demers, Hannarae Lee
Kerberoasting: Case Studies Of An Attack On A Cryptographic Authentication Technology, D Demers, Hannarae Lee
International Journal of Cybersecurity Intelligence & Cybercrime
Kerberoasting, an attack vector aimed at the Kerberos authentication protocol, can be used as part of an adversary’s attack arsenal. Kerberos is a type of network authentication protocol that allows a client and server to conduct a mutual verification before providing the requested resource to the client. A successful Kerberoasting attack allows an adversary to leverage the architectural limitations of Kerberos, providing access to user password hashes that can be subject to offline cracking. A cracked user password could give a bad actor the ability to maintain persistence, move laterally, or escalate privileges in a system. Persistence or movement within …
Understanding The Challenges Of Cryptography-Related Cybercrime And Its Investigation, Sinyong Choi, Katalin Parti
Understanding The Challenges Of Cryptography-Related Cybercrime And Its Investigation, Sinyong Choi, Katalin Parti
International Journal of Cybersecurity Intelligence & Cybercrime
Cryptography has been applied to a range of modern technologies which criminals also exploit to gain criminal rewards while hiding their identity. Although understanding of cybercrime involving this technique is necessary in devising effective preventive measures, little has been done to examine this area. Therefore, this paper provides an overview of the two articles, featured in the special issue of the International Journal of Cybersecurity Intelligence and Cybercrime, that will enhance our understanding of cryptography-related crime, ranging from cryptocurrency and darknet market to password-cracking. The articles were presented by the winners of the student paper competition at the 2022 International …
Dynamics Of Dark Web Financial Marketplaces: An Exploratory Study Of Underground Fraud And Scam Business, Bo Ra Jung, Kyung-Shick Choi, Claire Seungeun Lee
Dynamics Of Dark Web Financial Marketplaces: An Exploratory Study Of Underground Fraud And Scam Business, Bo Ra Jung, Kyung-Shick Choi, Claire Seungeun Lee
International Journal of Cybersecurity Intelligence & Cybercrime
The number of Dark Web financial marketplaces where Dark Web users and sellers actively trade illegal goods and services anonymously has been growing exponentially in recent years. The Dark Web has expanded illegal activities via selling various illicit products, from hacked credit cards to stolen crypto accounts. This study aims to delineate the characteristics of the Dark Web financial market and its scams. Data were derived from leading Dark Web financial websites, including Hidden Wiki, Onion List, and Dark Web Wiki, using Dark Web search engines. The study combines statistical analysis with thematic analysis of Dark Web content. Offering promotions …
Vertex-Magic Graphs, Karissa Massud
Vertex-Magic Graphs, Karissa Massud
Honors Program Theses and Projects
In this paper, we will study magic labelings. Magic labelings were first introduced by Sedláček in 1963 [3]. At this time, the labels on the graph were only assigned to the edges. In 1970, Kotzig and Rosa defined what are now known as edge-magic total labelings, where both the vertices and the edges of the graph are labeled. Following this in 1999, MacDougall, Miller, Slamin, and Wallis introduced the idea of vertex-magic total labelings. There are many different types of magic labelings. In this paper will focus on vertex-magictotal labelings.