EpiK Protocol is a collaborative knowledge graph platform comprised of 5 core participants: Knowledge Experts (KEs), Knowledge Nodes (KNs), Knowledge Gateways (KGs), Bounty Hunters, and EKP holders that has been jointly built, trusted, and safe decentralised knowledge graph collaborative platform with sharing benefits. A single user can perform many roles without interfering with each other.

Holders of EPK Tokens can vote for KEs or have access to EpiK’s information.

The Knowledge Gateway (KG) is the interface via which you can access and retrieve information from the Knowledge Vault. Knowledge from EpiK Network will be accessible to AI applications via the Knowledge Gateway (KG).

Knowledge Nodes (KN) give data storage capacity to help the Knowledge Vault download and preserve knowledge. To boost their “Storage Power,” Knowledge Nodes (KNs) might choose to store these data (the data can be kept by many KNs).

Domain experts known as Knowledge Experts (KE) will categorise and polish knowledge into several categories before uploading it to the Knowledge Vault. In the Knowledge Graphs, KEs will contribute to their particular areas of knowledge.

Bounty Hunters assist the KEs with chores in exchange for token rewards. KEs can create jobs for Bounty Hunters to accomplish and be compensated with EPK Tokens if they complete them.

KEs and Bounty Hunters, for example, are in charge of supplying knowledge, processing unstructured data into high-quality structured knowledge graph data, and maintaining data quality; KNs are in charge of continuously storing EpiK’s structured knowledge graph data in a decentralized network, ensuring its availability.

KGs make knowledge available by efficiently indexing knowledge graph data on a decentralized network and enabling tamper-proofing traceability. EPK holders are accountable for the EpiK blockchain ecosystem’s functioning and governance.

Knowledge Supply

Because the accuracy of the knowledge graph’s data has a direct impact on the data’s application value, KEs and Bounty Hunters are present to ensure the knowledge graph’s data quality.

KEs are responsible for providing reliable and quality knowledge, confirming and uploading it to EpiK’s knowledge graph, and finishing the knowledge supply process with the help of Bounty Hunters.

Only KEs are authorised to upload Knowledge data into the system. Information about the KEs will be made public to verify data accuracy, and all uploaded data will be traced back to the respective KEs. This puts the work of KEs under the scrutiny of the international world.

KEs are in charge of creating, verifying, and uploading knowledge, but producing high-quality data isn’t easy. The process of information extraction, fusion, and refinement to generate knowledge in Resource Description Frameworks (RDF) statement format is still relatively labour demanding due to the limits of automated technologies. Bounty Hunter can contribute to EpiK’s ecosystem in this way.

Knowledge Storage

One of the needs of the EpiK Protocol’s knowledge graph is to store knowledge in an immutable environment, and decentralised storage technology is the most innovative and efficient way to do so permanently across time. In the same way that Filecoin uses sectors as the unit of storage, EpiK Protocol will use proof-of-replication (PoRep) and proof-of-spacetime (PoSt) to assure comprehensive data storage in a decentralised setting.

Filecoin scenarios are generally universal storage scenarios that are used by huge files. While little bin-log files are produced by micro-collaboration with high frequency in EpiK Protocol’s knowledge graph collaborative scenarios, in order to make the most of network resources, EpiK Protocol plans to build a Layer2 storage network tailored for knowledge graph collaborative platforms.

Anyone with 1,000 EPK can be a Knowledge Node on the EpiK Protocol Layer 2 network (KN).
KNs must supply KEs with data storage services. Before uploading data, KEs must first send an on-chain message to register the data, after which they must look for online KNs for free storage (Deal). The KN then receives the knowledge data.

KNs are obliged to transmit an on-chain message announcing the sector where the related data is stored, telling the entire network that a complete copy of the data has been stored after they have stored the data locally and completed the PoRep.

KNs are obliged to transmit on-chain messages and broadcast the active sector’s PoSt on a regular basis, informing the network of the data’s integrity. To minimise wasting storage capacity, each piece of knowledge graph data is meant to be minimal, with each sector size set to 8MB by default.

Domain experts can use the knowledge node to store their data for free. The knowledge node can get computational power after storing the material uploaded by domain experts. Knowledge nodes that have finished file storage in the first N locations can obtain double the processing power for each new file supplied by domain experts.

About EpiK Protocol

EpiK Protocol is a decentralised knowledge graph data sharing network based on blockchain technology. EpiK’s open source knowledge graph database allows anybody to contribute their knowledge, allowing users to act as both providers and consumers in the network.

Website: www.epik-protocol.io

Twitter: https://twitter.com/EpikProtocol

Discord: https://discord.com/channels/740760785487265815/740772402941657169

Telegram: https://t.me/EpikProtocol

creative designer | crypto enthusiast

creative designer | crypto enthusiast