**6. Conclusion**

**Figure 25.** Final test results

446 Radio Frequency Identification from System to Applications

**Table 7.** Basic dependency between sets of readability and situations

transition between sets of antennas is relative stable (81% to 95%)

**Set situation 1 situation 2 situation 3 situation 4 average** A 47,35% 89,40% 62,05% 2,05% 50,2% B 89,74% **100,00%** 98,12% 51,11% 84,7% C 76,75% 99,83% **100,00%** 92,65% 92,3%

The overall success of the method of transition as the distance of antennas for different speed ranges from 81% - 87%, and has a major impact on readability, similar to the way the RFID technology is still growing up and there is several type of application, which you can use in condition of the postal processes. This chapter deals with type of application that are common uses in postal sector such as mail bag, letter trays, roll cages and vehicle tracking and managing application. All these application are useful for the track and trace system and it presents added value for costumers. Most postal services provide at least a limited form of track and trace, particularly for premium delivery services. Today, tracking uses bar codes. Switching to RFID tags can lower tracking labor by eliminating the need for most manual piece handling. RFID is a very useful and exciting technology. It seems that every‐ where one looks there is some article about RFID and the huge benefits its technology prom‐ ises. Moreover, there are many examples that demonstrate how this technology is fulfilling its potential.

Based on the measurements it can be concluded, with some exceptions that prove the rule, the closer they are to each antenna, the greater the success of reading RFID tags. Given the large dispersion of values it can be concluded that some elements are simply eliminated They can, for example using multiple counting gates, respectively antennas (eliminating the position of shipments), or the use of such specialty (bubble) envelopes for magnification air gap between consignments (as by set C)

This article deals with identification of postal items and transport units in logistic chain of postal operators. It described scheme of the transport process, including planned technology and there is also simulated a real postal process in conditions close to operational. Article is part of the projects described below, which, together with the afore-mentioned application, will improve the learning process at the Department of Communications.

The benefits of RFID technology can be reaped if RFID events give realtime visibility to the business processes either already in place or to new ones. The backend systems give a busi‐ ness context to the RFID events collected from the RFID data collection tools and then in‐ voke the right business process in real time (or near real time). Protecting the backend system is vital from the various security threats at the network level (attacking ONS or net‐ work communication between data collection tool and backend system) or at the data level (spurious events).The network level attacks can be prevented by using secured communica‐ tions between various processes. The data attacks are hard to deal with, and application de‐ signers must take special care to differentiate spurious events from good events and then act on the good ones almost in real time. Since data is collected using automated data collection techniques, application designers must clean the repository where good RFID events are stored.

**Author details**

**References**

Juraj Vaculík, Peter Kolarovszki and Jiří Tengler

Department of Communications, Slovakia

ISBN-13: 978-04701072007.

ISBN 978-0849385261, 2007

2008. ISBN 978-1-59693-194-7.

1-59749-047-4.

Syngres, 2007. 215 s. ISBN 978-08493301086.

J. Ross Publishing, Inc., 2006. 243 s. ISBN 1-932159-47-9.

074.342.885-A4-Post-Norway-Case-Story.pdf, 2008

loads/074.719.731-Post-DK-Case-Story-.pdf, 2008

bice : Univerzita Pardubice, 2006. 136 s. ISBN 80 – 7194 – 911 – 6

\*Address all correspondence to: juvac@fpedas.uniza.sk

University of Zilina, Faculty of Operation and Economics of Transport and Communications,

Possibility of RFID in Conditions of Postal Operators

http://dx.doi.org/10.5772/53285

449

[1] Hunt V. D., Puglia a. , Puglia m., RFID: A Guide to Radio Frequency Identification,

[2] Jones, ERIC, Chung, CHRISTOPHER : RFID in Logistics: A Practical Introduction,

[3] Finkenzeller, K.: *Fundamentals and Applications in Contactless Smart Cards and Identifi‐*

[4] LEHPAMER, H.: *RFID Design Principles*. Artech House, Inc, Norwood, MA, USA,

[5] Myerson Judith M., *RFID in the Supply Chain: A Guide to Selection and Implementation*,

[6] Poirier Charles, RFID *Strategic Implementation and ROI* : *A Practical Roadmap to Success*,

[7] Švadlenka L. a kol. Transportation and communication system, První vydání. Pardu‐

[8] ŠVADLENKA, Libor. RFID in postal and courier services. In PRASAD, B. V. S. , KA‐ LAI , Selvan. Supply chain management in services industry : an introduction. 1st ed‐

[10] THORNTON, F. a kol.: RFID Security, Rockland: Syngres Publishing 2006. ISBN

[11] Zelik P.: Mobile technology in postal transport, University of Žilina, Faculty of eco‐ nomical and operation of f transport and communication, dissertation work

[12] Post Norway-Case Story. Located on: http://www.lyngsoesystems.com/Downloads/

[13] Post Denmark – Case study. Located on: http://www.lyngsoesystems.com/Down‐

ition. Hyderabad (India) : Icfai Books, 2007. s. 68-74. ISBN 81-314-0756-X. [9] Thornton F.,Haines B., Bhargava H., *RFID Security*, ISBN 1-59749-047-4, 2005.

*cation.* In: RFID Handbook. John Wiley & Sons, 2006. ISBN 0-470-84402-7.

Costs of the security regarding RFID technology got implemented in a company´s infra‐ structure still presents relatively expensive attribute in the eye of CEO´s. Although the price of active and passive tags is still being reduced and RF technology becomes continuously more and more popular in a field of logistics, supply chains, toll systems, postal services, retailers or asset management, the relevance has to be put on a confrontation of costs of RFID implementation and its explicit use towards the eventual probability of attack.

In the relation on main aim of this article was focus on options of implementation mobile technology includes RFID technology into postal transport area. The content of introductory chapter is approximation the best terms of category and theoretical knowledge, which is used in this article. Further there are characterized the postal transport network, individual transport units, which is use in this area.

By optimal settings in real conditions the average maximum reading percentage is about 91.71%. Significant effect to increase the readability, RFID tags have been pointing toward a flat antenna and the antenna by sensing the top. Very significant impact on increasing or re‐ ducing the readability of the number of letters had the crate. For the purposes of measure‐ ment was used in 31 letters. The real use of the crate contained a much higher number of letters, which would likely significantly reduce readability.

Based on these results, identification of letters in the crate, RFID technology is not yet, given the technical conditions for real. Achievements, however, were relatively high. Some uncer‐ tainties should be possible to eliminate appropriate technical configuration (number of gates and Antennas, their location, etc.). On the other side some, particularly the operating ele‐ ments (separation of cardboard) can be solved as special packaging elements (bubble enve‐ lope to increase the air gap), etc.) can ensure a desired level of reliability required reading. Therefore, we expect that further testing with a larger number of antennas other types of an‐ tennas, readers and RFID tags in our AIDC laboratory.
