I. Introduction
It is well-established that the majority of systems in service will run into various constraints to maintain the security and stability of the system performance for achieving regular operation [1], [2]. These constraints may often be divided into two groups: capability-related and performance-related constraints, such as input saturation and user-specified convergence rates. Since these two constraints are contradictory, it is possible that some constraints cannot be satisfied at the same time [3]. Therefore, it makes sense to explore an appropriate control method to accomplish the trade-off between these two constraints in both practice and theory.